As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency...To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency management of the enterprise is designed,it is based on the modular principle providing rapid modernization.The novelty of the work is the development of new and improvement of the existing methods and models,in particular:1)models for dynamic analysis of IT tools for data acquisition and processing(DAAP)in multilevel energy management systems,which are based on Petri nets;2)method of synthesis of DAAP tools in energy efficiency management information systems(EEMIS)of the enterprise which provides a reduction in hardware and time costs from 10%to 40%;3)method of conflict-free data exchange determining the minimum memory speed for the synthesis of realtime exchanges,it reduces the cost and energy consumption;4)method of calculating the signal of postsynaptic excitation of neural elements decreases the processing time of technological data two or more times.The proposed methods,models and tools have been tested while implementing the EEMIS of the intelligent mini-greenhouse,as a result,energy efficiency has increased by 12%-25%(depending on season and peculiarities of growing plants).展开更多
Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many more.It has bee...Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many more.It has been used in the internet-of-things(IoTs)applications.A method for data collecting utilizing hybrid compressive sensing(CS)is developed in order to reduce the quantity of data transmission in the clustered sensor network and balance the network load.Candidate cluster head nodes are chosen first from each temporary cluster that is closest to the cluster centroid of the nodes,and then the cluster heads are selected in order based on the distance between the determined cluster head node and the undetermined candidate cluster head node.Then,each ordinary node joins the cluster that is nearest to it.The greedy CS is used to compress data transmission for nodes whose data transmission volume is greater than the threshold in a data transmission tree with the Sink node as the root node and linking all cluster head nodes.The simulation results demonstrate that when the compression ratio is set to ten,the data transfer volume is reduced by a factor of ten.When compared to clustering and SPT without CS,it is reduced by 75%and 65%,respectively.When compared to SPT with Hybrid CS and Clustering with hybrid CS,it is reduced by 35%and 20%,respectively.Clustering and SPT without CS are compared in terms of node data transfer volume standard deviation.SPT with Hybrid CS and clustering with Hybrid CS were both reduced by 62%and 80%,respectively.When compared to SPT with hybrid CS and clustering with hybrid CS,the latter two were reduced by 41%and 19%,respectively.展开更多
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
文摘To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency management of the enterprise is designed,it is based on the modular principle providing rapid modernization.The novelty of the work is the development of new and improvement of the existing methods and models,in particular:1)models for dynamic analysis of IT tools for data acquisition and processing(DAAP)in multilevel energy management systems,which are based on Petri nets;2)method of synthesis of DAAP tools in energy efficiency management information systems(EEMIS)of the enterprise which provides a reduction in hardware and time costs from 10%to 40%;3)method of conflict-free data exchange determining the minimum memory speed for the synthesis of realtime exchanges,it reduces the cost and energy consumption;4)method of calculating the signal of postsynaptic excitation of neural elements decreases the processing time of technological data two or more times.The proposed methods,models and tools have been tested while implementing the EEMIS of the intelligent mini-greenhouse,as a result,energy efficiency has increased by 12%-25%(depending on season and peculiarities of growing plants).
基金supported by the Researchers Supporting Project(No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.
文摘Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many more.It has been used in the internet-of-things(IoTs)applications.A method for data collecting utilizing hybrid compressive sensing(CS)is developed in order to reduce the quantity of data transmission in the clustered sensor network and balance the network load.Candidate cluster head nodes are chosen first from each temporary cluster that is closest to the cluster centroid of the nodes,and then the cluster heads are selected in order based on the distance between the determined cluster head node and the undetermined candidate cluster head node.Then,each ordinary node joins the cluster that is nearest to it.The greedy CS is used to compress data transmission for nodes whose data transmission volume is greater than the threshold in a data transmission tree with the Sink node as the root node and linking all cluster head nodes.The simulation results demonstrate that when the compression ratio is set to ten,the data transfer volume is reduced by a factor of ten.When compared to clustering and SPT without CS,it is reduced by 75%and 65%,respectively.When compared to SPT with Hybrid CS and Clustering with hybrid CS,it is reduced by 35%and 20%,respectively.Clustering and SPT without CS are compared in terms of node data transfer volume standard deviation.SPT with Hybrid CS and clustering with Hybrid CS were both reduced by 62%and 80%,respectively.When compared to SPT with hybrid CS and clustering with hybrid CS,the latter two were reduced by 41%and 19%,respectively.