2022
DOI: 10.15849/ijasca.221128.02
|View full text |Cite
|
Sign up to set email alerts
|

Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems

Abstract: Cloud computing is internet-distributed computing model transferring processes from personal computers or servers to cloud servers. Nowadays, security and performance of cloud computing is considered challenging for both users and cloud service providers. Securing data on cloud computing servers will ensures privacy, confidentiality, integrity, and availability. Using cryptographic techniques is one of the major methods to ensure the data security while storing and transmission. Hypervisor in a cloud is a soft… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…Similarly, data restoration is the inverse process of sanitization (decryption). In [ 28 ] a four-step data security approach in cloud computing was proposed. They used the least significant bit of LSB approaches to integrate three cryptographic algorithms, RSA, AES, and identity-based encryption, with steganography to attain confidentiality and privacy of cloud data.…”
Section: 0 Literature Reviewmentioning
confidence: 99%
“…Similarly, data restoration is the inverse process of sanitization (decryption). In [ 28 ] a four-step data security approach in cloud computing was proposed. They used the least significant bit of LSB approaches to integrate three cryptographic algorithms, RSA, AES, and identity-based encryption, with steganography to attain confidentiality and privacy of cloud data.…”
Section: 0 Literature Reviewmentioning
confidence: 99%