SlideShare a Scribd company logo
1 of 16
VIRTUALIZATION
IN
CLOUD COMPUTING
Virtualization
 Making a virtual image or version
 Server
 Operating System
 Network Devices
 It manage Workload
 It reduces hardware utilization
 saves energy and costs
 It possible to run multiple applications and various operating systems on the same
SERVER at the same time.
Need virtualization
 Isolation Among Users
• One user should be isolated from the other users so that he/she may not get information about
the others user’s data and usage and cannot even access other’s data.
 Resource Sharing
• A big resource can be fragmented into multiple virtual resources so that it can be used by
multiple users using virtualization technique.
 Dynamical Resources
• Reallocation of resources such as storage and computational resources is very difficult but if
they are virtualized then they can be easily re-allocated.
 Aggregation of Resources
• The small resources available can be increased at a large extent with the help of virtualization
Hypervisor
 Virtualization Manager
 Allows multiple operating systems to
share a single hardware host.
 Each guest operating system appears
to have the host's processor, memory,
and other resources all to itself.
 Controlling the host processor and
resources.
Types of Virtualization
 Hardware/Server Virtualization.
 Network Virtualization.
 Storage Virtualization.
 Memory Virtualization.
 Software Virtualization.
 Data Virtualization.
 Desktop Virtualization.
HOMOMORPHIC
ENCRYPTION
IN
CLOUD COMPUTING
Definition
 Homomorphism
A transformation of one set into another that preserves in the second set the relations between
elements of the first.
 Homomorphic Encryption
An operation performed on a set of ciphertexts such that decrypting the result of the operation is
the same as the result of some operation performed on the plaintexts
Why Homomorphic Encryption?
 Confidentiality problems
 Ability to compute over ciphertext instead of plaintext
 One could use information without knowing the content of that information
 Privacy guaranteed
Homomorphic Encryption
Party B does NOT requires the secret key for answering this query from A
 Definition: A crypto-system that allows another party to perform operations on cipher
text (Encrypted Text) without having knowledge of your secret key/Password.
 So if X1 and X2 are two numbers , E(X1) and E(X2) represents the encryption of these
numbers with a secret key, another party would be able to compute E(X1 + X2) or
E(X1 * X2) without knowing the secret key.
Types of Homomorphic System
1. PHE (Partially Homomorphic Encryption)
2. FHE (Fully Homomorphic Encryption)
 Plenty of encryption schemes allow partial Homomorphic encryption which let users
perform some mathematical functions on encrypted data, but not others.
 A feasible FHE Has not been developed yet.
Partially Homomorphic Encryption
 When You can only perform certain mathematical operations on the cipher text but not
others.
• RSA Cryptosystem is Partially Homomorphic with respect to Multiplication.
• Caesar Cipher is Partially Homomorphic With respect to addition.
How It Works !
 Suppose I have a file with my phone number
Message = [9, 0, 2, 6, 7, 2, 8, 1, 6, 8]
 And I encrypt it with Caesar cipher* by adding 2 to each digit, Key = 2
Cipher = [11, 2, 4, 8, 9, 4, 10, 3, 8, 10]
 Want to find the sum of all the numbers in Message.
 Sum up all the elements of Cipher and give the encrypted result. Summation(Cipher) = 69
 Summation(Message) = 49
 Remove Encryption on Summation(Cipher)
= 69 – 10*2
= 49
 This Is partially Homomorphic for only addition and subtraction.
How It Works !
 RSA Cryptosystem : basic RSA scheme is partially Homomorphic, it allows
multiplication but not addition on cipher text.
 If we denote encrypted form of message x as
 Then with encryption key pair (m, e) and encrypted message is
Then this property proves RSA is partially Homomorphic
Fully Homomorphic Encryption
 Plaintext and Ciphertext are both in 𝑧2 ring
 Function E in homomorphic for both addition and multipication if;
E(x) + E(y) = E(x + y)
E(x) * E(y) = E(x * y)

More Related Content

What's hot

What's hot (20)

Vitualisation
VitualisationVitualisation
Vitualisation
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
The kvm virtualization way
The kvm virtualization wayThe kvm virtualization way
The kvm virtualization way
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Vmware ppt
Vmware pptVmware ppt
Vmware ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 

Viewers also liked

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
Hitendra Molleti
 
Loreal Digital Game_Final_SYNERGY team
Loreal Digital Game_Final_SYNERGY teamLoreal Digital Game_Final_SYNERGY team
Loreal Digital Game_Final_SYNERGY team
Anna Konovodova, MBA
 

Viewers also liked (20)

Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Chingis Sandanov. Container virtualization
Chingis Sandanov. Container virtualizationChingis Sandanov. Container virtualization
Chingis Sandanov. Container virtualization
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
 
Server Virtualization: Success - VDI: not so much... Why?
Server Virtualization: Success - VDI: not so much... Why?Server Virtualization: Success - VDI: not so much... Why?
Server Virtualization: Success - VDI: not so much... Why?
 
Topic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationTopic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and Virtualization
 
El uso de las tic en la educación básica en mexico desde 2012.
El uso de las tic en la educación básica en mexico desde 2012.El uso de las tic en la educación básica en mexico desde 2012.
El uso de las tic en la educación básica en mexico desde 2012.
 
Компьютерные вирусы и методы защиты от них
Компьютерные вирусы и методы защиты от нихКомпьютерные вирусы и методы защиты от них
Компьютерные вирусы и методы защиты от них
 
Benefits of cloud computing
Benefits of cloud computingBenefits of cloud computing
Benefits of cloud computing
 
Loreal Digital Game_Final_SYNERGY team
Loreal Digital Game_Final_SYNERGY teamLoreal Digital Game_Final_SYNERGY team
Loreal Digital Game_Final_SYNERGY team
 
Планета Земля
Планета ЗемляПланета Земля
Планета Земля
 
Plot ideas
Plot ideasPlot ideas
Plot ideas
 
V mware v-sphere & vsa presentation
V mware   v-sphere & vsa presentationV mware   v-sphere & vsa presentation
V mware v-sphere & vsa presentation
 
Democracy is mobocracy in india
Democracy is mobocracy in indiaDemocracy is mobocracy in india
Democracy is mobocracy in india
 
Orbitz Marketing Plan "Fly For Change"
Orbitz Marketing Plan "Fly For Change"Orbitz Marketing Plan "Fly For Change"
Orbitz Marketing Plan "Fly For Change"
 
Airtel _ Icreate
Airtel _ IcreateAirtel _ Icreate
Airtel _ Icreate
 
Evoluation of Linux Container Virtualization
Evoluation of Linux Container VirtualizationEvoluation of Linux Container Virtualization
Evoluation of Linux Container Virtualization
 

Similar to Virtualization

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 

Similar to Virtualization (20)

Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 

More from Shivam Singh (9)

The problems of syrian refugees and european union
The problems of syrian refugees and european unionThe problems of syrian refugees and european union
The problems of syrian refugees and european union
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
Url manipulation
Url manipulationUrl manipulation
Url manipulation
 
Threads
ThreadsThreads
Threads
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Virtualization

  • 2. Virtualization  Making a virtual image or version  Server  Operating System  Network Devices  It manage Workload  It reduces hardware utilization  saves energy and costs  It possible to run multiple applications and various operating systems on the same SERVER at the same time.
  • 3. Need virtualization  Isolation Among Users • One user should be isolated from the other users so that he/she may not get information about the others user’s data and usage and cannot even access other’s data.  Resource Sharing • A big resource can be fragmented into multiple virtual resources so that it can be used by multiple users using virtualization technique.  Dynamical Resources • Reallocation of resources such as storage and computational resources is very difficult but if they are virtualized then they can be easily re-allocated.  Aggregation of Resources • The small resources available can be increased at a large extent with the help of virtualization
  • 4. Hypervisor  Virtualization Manager  Allows multiple operating systems to share a single hardware host.  Each guest operating system appears to have the host's processor, memory, and other resources all to itself.  Controlling the host processor and resources.
  • 5. Types of Virtualization  Hardware/Server Virtualization.  Network Virtualization.  Storage Virtualization.  Memory Virtualization.  Software Virtualization.  Data Virtualization.  Desktop Virtualization.
  • 7. Definition  Homomorphism A transformation of one set into another that preserves in the second set the relations between elements of the first.  Homomorphic Encryption An operation performed on a set of ciphertexts such that decrypting the result of the operation is the same as the result of some operation performed on the plaintexts
  • 8. Why Homomorphic Encryption?  Confidentiality problems  Ability to compute over ciphertext instead of plaintext  One could use information without knowing the content of that information  Privacy guaranteed
  • 9. Homomorphic Encryption Party B does NOT requires the secret key for answering this query from A
  • 10.  Definition: A crypto-system that allows another party to perform operations on cipher text (Encrypted Text) without having knowledge of your secret key/Password.  So if X1 and X2 are two numbers , E(X1) and E(X2) represents the encryption of these numbers with a secret key, another party would be able to compute E(X1 + X2) or E(X1 * X2) without knowing the secret key.
  • 11. Types of Homomorphic System 1. PHE (Partially Homomorphic Encryption) 2. FHE (Fully Homomorphic Encryption)  Plenty of encryption schemes allow partial Homomorphic encryption which let users perform some mathematical functions on encrypted data, but not others.  A feasible FHE Has not been developed yet.
  • 12. Partially Homomorphic Encryption  When You can only perform certain mathematical operations on the cipher text but not others. • RSA Cryptosystem is Partially Homomorphic with respect to Multiplication. • Caesar Cipher is Partially Homomorphic With respect to addition.
  • 13. How It Works !  Suppose I have a file with my phone number Message = [9, 0, 2, 6, 7, 2, 8, 1, 6, 8]  And I encrypt it with Caesar cipher* by adding 2 to each digit, Key = 2 Cipher = [11, 2, 4, 8, 9, 4, 10, 3, 8, 10]  Want to find the sum of all the numbers in Message.  Sum up all the elements of Cipher and give the encrypted result. Summation(Cipher) = 69  Summation(Message) = 49  Remove Encryption on Summation(Cipher) = 69 – 10*2 = 49  This Is partially Homomorphic for only addition and subtraction.
  • 14.
  • 15. How It Works !  RSA Cryptosystem : basic RSA scheme is partially Homomorphic, it allows multiplication but not addition on cipher text.  If we denote encrypted form of message x as  Then with encryption key pair (m, e) and encrypted message is Then this property proves RSA is partially Homomorphic
  • 16. Fully Homomorphic Encryption  Plaintext and Ciphertext are both in 𝑧2 ring  Function E in homomorphic for both addition and multipication if; E(x) + E(y) = E(x + y) E(x) * E(y) = E(x * y)