Open Access iconOpen Access



Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

1 Department of Intelligent Systems, Faculty of Artificial Intelligence, Al-Balqa Applied University, Al-Salt, 1705, Jordan
2 Research and Innovation Centers, Rabdan Academy, P.O. Box 114646, Abu Dhabi, United Arab Emirates
3 Department of Information Systems and Networks, The World Islamic Sciences and Education University, Amman, 11947, Jordan
4 Department of Cyber Security, Isra University, Amman, 1162, Jordan
5 Faculty of Science and Information Technology, Al-Zaytoonah University of Jordan, Amman, 11733, Jordan
6 Middle East University Research Unit, Middle East University, Amman, 11831, Jordan

* Corresponding Authors: Nader Abdel Karim. Email: email; Osama A. Khashan. Email: email

(This article belongs to the Special Issue: Multimedia Encryption and Information Security)

Computers, Materials & Continua 2024, 78(2), 2023-2045.


As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor should be examined to meet specific needs. The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine (KVM) while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs. This study evaluated the efficiency of two hypervisors, Hyper-V and KVM, in implementing six cryptographic algorithms: Rivest, Shamir, Adleman (RSA), Advanced Encryption Standard (AES), Triple Data Encryption Standard (TripleDES), Carlisle Adams and Stafford Tavares (CAST-128), BLOWFISH, and TwoFish. The study’s findings show that KVM outperforms Hyper-V, with 12.2% less Central Processing Unit (CPU) use and 12.95% less time overall for encryption and decryption operations with various file sizes. The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment, which could assist both cloud service providers and end users. Future research may focus more on how various hypervisors perform while handling cryptographic workloads.


Cite This Article

APA Style
Karim, N.A., Khashan, O.A., Abdulraheem, W.K., Alazab, M., Kanaker, H. et al. (2024). Performance comparison of hyper-v and KVM for cryptographic tasks in cloud computing. Computers, Materials & Continua, 78(2), 2023-2045.
Vancouver Style
Karim NA, Khashan OA, Abdulraheem WK, Alazab M, Kanaker H, Farfoura ME, et al. Performance comparison of hyper-v and KVM for cryptographic tasks in cloud computing. Comput Mater Contin. 2024;78(2):2023-2045
IEEE Style
N.A. Karim et al., "Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing," Comput. Mater. Contin., vol. 78, no. 2, pp. 2023-2045. 2024.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 465


  • 207


  • 0


Share Link