DOI QR코드

DOI QR Code

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi ( The World Islamic Sciences and Education University) ;
  • Waleed K. Abdulraheem ( The World Islamic Sciences and Education University) ;
  • Jafar Ababneh ( The World Islamic Sciences and Education University) ;
  • Nader Abdel Karim (Isra University)
  • Received : 2024.01.05
  • Published : 2024.01.30

Abstract

Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

Keywords

References

  1. H. Shukur, S. Zeebaree, R. Zebari, D. Zeebaree, O. Ahmed, and A. Salih, "Cloud Computing Virtualization of Resources Allocation for Distributed Systems," J. Appl. Sci. Technol. Trends, vol. 1, no. 3, pp. 98-105, 2020, doi: 10.38094/jastt1331.
  2. F. Thabit, S. Alhomdy, and S. Jagtap, "Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing," Glob. Transitions Proc., vol. 2, no. 1, pp. 100-110, 2021, doi: 10.1016/j.gltp.2021.01.014.
  3. M. Al-Shalabi, M. Anbar, T. C. Wan, and A. Khasawneh, "Variants of the low-energy adaptive clustering hierarchy protocol: Survey, issues and challenges," Electron., vol. 7, no. 8, pp. 1-28, 2018, doi: 10.3390/electronics7080136.
  4. T. G. Peter Mell, "The NIST Definition of Cloud Computing." NIST, pp. 1-3, 2011, [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-145/final.
  5. M. Al-Shalabi, M. Anbar, T. C. Wan, and Z. Alqattan, "Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm," Inf. Sci. (Ny)., vol. 500, pp. 259-273, 2019, doi: 10.1016/j.ins.2019.05.094.
  6. M. Al-Shalabi, M. Anbar, and A. Obeidat, "Alternating sensing process to prolong the lifetime of wireless sensor networks," J. Theor. Appl. Inf. Technol., vol. 97, no. 7, pp. 2132-2141, 2019.
  7. S. e Rubab, K., Azhar, T., Anwar, M., & Majeed, "Security Threats in Cloud Computing: Trend and Challenges," Int. J. Comput. Commun. Networks, vol. 2(1), no. 9783319414102, pp. 29-35, 2020, doi: 10.1007/978-3-319-41411-9_3.
  8. M. Al-Shalabi, "COVID-19 Symptoms Monitoring Mechanism using Internet of Things and Wireless Sensor Networks," IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 20, no. 8, p. 16, 2020.
  9. A. Obeidat, R. Obeidat, and M. Al-Shalabi, "The Effectiveness of Adopting e-Learning during COVID-19 at Hashemite University," Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 12, pp. 96-104, 2020, doi: 10.14569/IJACSA.2020.0111213.
  10. M. Al-Shalabi, J. Ababneh, and W. Abdulraheem, "A novel adjacent sensors-based mechanism to increase performance of wireless sensor networks," Int. J. Antennas Propag., vol. 2021, p. 9, 2021, doi: 10.1155/2021/6667123.
  11. R. Pandey, "Comparing VMware Fusion, Oracle VirtualBox, Parallels Desktop implemented as Type-2 hypervisors Comparing Type 2 Hypervisors View project Benchmarking Databases using YCSB View project Comparing VMware Fusion, Oracle VirtualBox, Parallels Desktop implemen," researchgate.net, no. September, 2020, doi: 10.13140/RG.2.2.17080.78087.
  12. M. Al-Shalabi, M. Anbar, and T. C. Wan, Proposed mechanism based on genetic algorithm to find the optimal multi-hop path in wireless sensor networks, vol. 843. Springer International Publishing, 2019.
  13. M. Al-Shalabi, M. Anbar, and T. C. Wan, "Genetic algorithm based protocols to select cluster heads and find multi-hop path in wireless sensor networks: Review," in MATEC Web of Conferences, 2018, vol. 218, doi: 10.1051/matecconf/201821803019.
  14. M. A.-S. MO Al-Shalabi, "An approach for MAC protocol in wireless sensor network-the group split property (GSP)," Sci. Ann. Comput. Sci., vol. 148, no. 1, pp. 148-162, 2012.
  15. N. Gonzalez et al., "A quantitative analysis of current security concerns and solutions for cloud computing," Proc. - 2011 3rd IEEE Int. Conf. Cloud Comput. Technol. Sci. CloudCom 2011, pp. 231-238, 2011, doi: 10.1109/CloudCom.2011.39.
  16. M. A. Al-shalabi and A. Obeidat, "New techniques to enhance the promotions in e-stores," Bus. Manag. Rev., vol. 5, no. 2, p. 2014, 2014.
  17. M. A. L. Al-Shalabi, M. Maqableh, and A. Obeidat, "THE EFFICIENCY OF ENCRYPTION ALGORITHMS IN ENCRYPTING LARGE FILES," Ann. Comput. Sci. Ser., vol. 2, no. 10, pp. 71-76, 2012.
  18. W. K. A. . Abdulrahem, H. H. O. Nasereddin, and S. M. H. Fares, "Business Continuity Based on RFID," Am. Acad. Sch. Res. J., vol. 5, no. 3, pp. 223-228, 2013.
  19. A. Zaineldeen, S., & Ate, "Review of Cryptography in Cloud Computing Review of Cryptography in Cloud Computing," Int. J. Comput. Sci. Mob. Comput., vol. 9, no. 3, pp. 211-220, 2020.
  20. R. Di Pietro and F. Lombardi, "Virtualization technologies and cloud security: Advantages, issues, and perspectives," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11170 LNCS, pp. 166-185, 2018, doi: 10.1007/978-3-030-04834-1_9.
  21. N. Bhandari, R. R., & Mishra, "CLOUD COMPUTING A CRM SERVICE BASED ON SEPARATE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM," Int. J. Recent Innov. Trends Comput. Commun., vol. 1, no. 4, p. 217*223,217*223, 2013, [Online]. Available: http://www.academia.edu/934013/Cloud_Computing_Avoids_Downfall_of_Application_Service_Providers%5Cnhttp://www.citeulike.org/user/vilneineves/article/12307335.
  22. S. S. Khan and P. . .R. Tuteja, "Security in Cloud Computing using Cryptographic Algorithms," Int. J. Innov. Res. Comput. Commun. Eng., vol. 03, no. 01, pp. 148-154, 2015, doi: 10.15680/ijircce.2015.0301035.
  23. P. Chinnasamy and P. Deepalakshmi, "HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud," J. Ambient Intell. Humaniz. Comput., no. February, 2021, doi: 10.1007/s12652-021-02942-2.
  24. S. Vinothkumar, S., Amutharaj, J., & Jeyabalan, "A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING," J. Contemp. Issues Bus. Gov., vol. 27, no. 3, pp. 1909-1923, 2021, doi: 10.47750/cibg.2021.27.03.238.
  25. A. K. Singh and D. Saxena, "A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment," J. Appl. Secur. Res., vol. 11, no. 3, pp. 1-24, 2021, doi: 10.1080/19361610.2020.1870404.
  26. R. Dwivedi, R. K., Kumar, R., & Buyya, "Secure healthcare monitoring sensor cloud with attribute-based elliptical curve cryptography.," Int. J. Cloud Appl. Comput., vol. 11, no. 3, pp. 1-18, 2021.
  27. D. Suresha and K. Karibasappa, "Enhancing Data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique," in Proceedings - 5th International Conference on Computing Methodologies and Communication, ICCMC 2021, 2021, no. Iccmc, pp. 291-299, doi: 10.1109/ICCMC51019.2021.9418486.
  28. A. Orobosade, T. Aderonke, A. Boniface, and A. J., "Cloud Application Security using Hybrid Encryption," Commun. Appl. Electron., vol. 7, no. 33, pp. 25-31, 2020, doi: 10.5120/cae2020652866.
  29. R. F. Abdel-Kader, S. H. El-Sherif, and R. Y. Rizk, "Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing," Int. J. Electr. Comput. Eng., vol. 10, no. 3, pp. 3295-3306, 2020, doi: 10.11591/ijece.v10i3.pp3295-3306.
  30. A. Mondal and R. T. Goswami, "Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security," Microprocess. Microsyst., vol. 81, p. 103719, 2021, doi: 10.1016/j.micpro.2020.103719.
  31. C. Thirumalai, S. Mohan, and G. Srivastava, "An efficient public key secure scheme for cloud and IoT security," Comput. Commun., vol. 150, pp. 634-643, 2020, doi: 10.1016/j.comcom.2019.12.015.
  32. F. S. and N. K. J. Sumit Chaudhary, "Comparative Study Between Cryptographic and Hybrid Techniques for Implementation of Security in Cloud Computing," Perform. Manag. Integr. Syst. its Appl. Softw. Eng., pp. 127-135, 2020.
  33. B. Saritha and M. Praveen, "Cryptographic Approaches for Data Assurance in Cloud," Dogo Rangsang Res. J., vol. 10, no. 01, pp. 154-158, 2020, [Online]. Available: http://drsrjournal.com/no_1_jan_20/21.pdf?i=1.
  34. M. S. Abbas, S. S. Mahdi, and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," in Proceedings of the 2020 International Conference on Computer Science and Software Engineering, CSASE 2020, 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.
  35. U. Ogiela, "Cognitive cryptography for data security in cloud computing," Concurr. Comput. Pract. Exp., vol. 32, no. 18, pp. 1-4, 2020, doi: 10.1002/cpe.5557.
  36. P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, "Efficient data security using hybrid cryptography on cloud computing," Lect. Notes Networks Syst., vol. 145, no. November, pp. 537-547, 2021, doi: 10.1007/978-981-15-7345-3_46.
  37. E. B. Barker and Q. H. Dang, "Recomendation for key management: application-specific management guidance," 2015.
  38. Y. Kiran Kumar and R. Mahammad Shafi, "An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem," Int. J. Electr. Comput. Eng., vol. 10, no. 1, pp. 530-537, 2020, doi: 10.11591/ijece.v10i1.pp530-537.
  39. W. K. AbdulRaheem, S. B. M. Yasin, N. I. B. Udzir, and M. R. bin K. Ariffin, "Improving the performance of [0,1,3]-NAF recoding algorithm for elliptic curve scalar multiplication," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 4, pp. 275-279, 2019, doi: 10.14569/ijacsa.2019.0100432.
  40. H. T. Assafli, I. A. Hashim, and A. A. Naser, "Advanced Encryption Standard (AES) acceleration and analysis using graphical processing unit (GPU)," Appl. Nanosci., no. 0123456789, pp. 1-6, 2021, doi: 10.1007/s13204-021-01985-3.
  41. W. K. AbdulRaheem, S. B. M. Yasin, N. I. B. Udzir, and M. R. B. K. Ariffin, "New quintupling point arithmetic 5P formulas for Lopez-Dahab coordinate over binary elliptic curve cryptography," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 7, pp. 397-401, 2019, doi: 10.14569/ijacsa.2019.0100754.
  42. A. Biryukov and C. Canniere, "Data encryption standard (DES)," 2006. doi: 10.1007/0-387-23483-7_94.
  43. V. Rojasree and J. Gnanajayanthi, "Cryptographic algorithms to secure networks - A technical survey on research perspectives," in Proceedings of the 3rd International Conference on Smart Systems and Inventive Technology, ICSSIT 2020, 2020, no. Icssit, pp. 159-165, doi: 10.1109/ICSSIT48917.2020.9214259.
  44. S. M. Kareem and A. M. S. Rahma, "A Modification on Key Stream Generator for RC4 Algorithm," Eng. Technol. J., vol. 38, no. 2B, pp. 54-60, 2020, doi: 10.30684/etj.v38i2b.404.
  45. A. Sevin and A. A. O. Mohammed, "A survey on software implementation of lightweight block ciphers for IoT devices," J. Ambient Intell. Humaniz. Comput., no. 0123456789, pp. 1-15, 2021, doi: 10.1007/s12652-021-03395-3.
  46. R. Abdul, H. Abdul, and A. H. S. Al-wattar, "A New Blowfish Using A Neural Network Research Article," Turkish J. Comput. Math. Educ., vol. 12, no. 7, pp. 1546-1554, 2021.
  47. K. F. Jasim, R. J. Ismail, A. A. N. Al-rabeeah, and S. Solaimanzadeh, "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of Internet of Things Devices," Cihan Univ. Sci. J., vol. 5, no. 2, pp. 13-19, 2021, doi: 10.24086/cuesj.v5n2y2021.