43,693 research outputs found

    CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment

    Get PDF
    In recent years we have witnessed the rapid advent of cloud computing, in which the remote software is delivered as a service and accessed by users using a thin client over the Internet. In particular, the traditional desktop application can execute in the remote virtual machines without re-architecture providing a personal desktop experience to users through remote display technologies. However, existing cloud desktop applications mainly achieve isolation environments using virtual machines (VMs), which cannot adequately support application-oriented collaborations between multiple users and VMs. In this paper, we propose a flexible collaboration approach, named CyberLiveApp, to enable live virtual desktop applications sharing based on a cloud and virtualization infrastructure. The CyberLiveApp supports secure application sharing and on-demand migration among multiple users or equipment. To support VM desktop sharing among multiple users, a secure access mechanism is developed to distinguish view privileges allowing window operation events to be tracked to compute hidden window areas in real time. A proxy-based window filtering mechanism is also proposed to deliver desktops to different users. To support application sharing and migration between VMs, we use the presentation streaming redirection mechanism and VM cloning service. These approaches have been preliminary evaluated on an extended MetaVNC. Results of evaluations have verified that these approaches are effective and useful

    Enhancing Security and Privacy on Smart City’s Collected Data: A Fog Computing Perspective

    Get PDF
    Smart cities use information and communication technologies to deliver services to their citizens. Use of ICT makes them to be more intelligent and efficient in usage of resources, resulting in cost and energy savings, improved service delivery and quality of life. Smart cities are expected to be the fundamental pillars of continued economic growth and improved services delivery. Smart City technology is having ability to constantly gather information about the city, sharing the data with people, devices and technologies or borrowing relevant data from elsewhere, for analysis to enable informed decision making. For instance internet of things has emerged as a technological driving force in real time service delivery in smart cities. These applications provide new abilities, enhancing monitoring, and provision of action oriented process on control and device management. Smart devices are a major source of big data in smart cities. With expected increase of billions of smart devices and sensors in smart city by the year 2020, more data will be generated which will reduce efficiency of cloud access, due to increased volume. Security and privacy of data is a challenge in smart city, negligence in data security and privacy can be amplified in folds resulting to faulty applications, services along with paralyzing the entire city through Denial of Service (DDoS) attack, Spear Phishing Attacksand Brute-Force Attacks among others.Fog computing FC is a new paradigm that is intended to extend cloud computing CC through deployment of processing and localized units into the network edge, enabling low latency, offering location awareness and latency sensitiveness. Homomorphism for encryption, authorization, authentication, and classification are performed on collected data in smart cities to improve security and privacy. In this paper assimilation and analysis, is performed with fog computing aspects of decentralization, different policies for datacenter transferstrategies being analyzed.Processing time, access time, request time, response time and cost analysis show system efficiency

    Cloud based testing of business applications and web services

    Get PDF
    This paper deals with testing of applications based on the principles of cloud computing. It is aimed to describe options of testing business software in clouds (cloud testing). It identifies the needs for cloud testing tools including multi-layer testing; service level agreement (SLA) based testing, large scale simulation, and on-demand test environment. In a cloud-based model, ICT services are distributed and accessed over networks such as intranet or internet, which offer large data centers deliver on demand, resources as a service, eliminating the need for investments in specific hardware, software, or on data center infrastructure. Businesses can apply those new technologies in the contest of intellectual capital management to lower the cost and increase competitiveness and also earnings. Based on comparison of the testing tools and techniques, the paper further investigates future trend of cloud based testing tools research and development. It is also important to say that this comparison and classification of testing tools describes a new area and it has not yet been done
    • …
    corecore