The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization...The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization(NFV),Software-Defined Networks(SDN),and cloud computing will be crucial in addressing various challenges that 5G networks will face,particularly adaptability,scalability,and reliability.The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms,including hypervisors,clouds,and containers,which will serve as a guide to dealing with the stimulating environment of 5G.This is particularly crucial when implementing network operations at the edge of 5G networks,where limited resources and prompt user responses are mandatory.Experimental results prove that containers outperform hypervisor-based virtualized infrastructure and cloud platforms’latency and network throughput at the expense of higher virtualized processor use.In contrast to public clouds,where a set of rules is created to allow only the appropriate traffic,security is still a problem with containers.展开更多
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
基金supported by Future University Researchers Supporting Project Number FUESP-2020/48 at Future University in Egypt,New Cairo 11845,Egypt.
文摘The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization(NFV),Software-Defined Networks(SDN),and cloud computing will be crucial in addressing various challenges that 5G networks will face,particularly adaptability,scalability,and reliability.The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms,including hypervisors,clouds,and containers,which will serve as a guide to dealing with the stimulating environment of 5G.This is particularly crucial when implementing network operations at the edge of 5G networks,where limited resources and prompt user responses are mandatory.Experimental results prove that containers outperform hypervisor-based virtualized infrastructure and cloud platforms’latency and network throughput at the expense of higher virtualized processor use.In contrast to public clouds,where a set of rules is created to allow only the appropriate traffic,security is still a problem with containers.