19,661 research outputs found

    CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment

    Get PDF
    In recent years we have witnessed the rapid advent of cloud computing, in which the remote software is delivered as a service and accessed by users using a thin client over the Internet. In particular, the traditional desktop application can execute in the remote virtual machines without re-architecture providing a personal desktop experience to users through remote display technologies. However, existing cloud desktop applications mainly achieve isolation environments using virtual machines (VMs), which cannot adequately support application-oriented collaborations between multiple users and VMs. In this paper, we propose a flexible collaboration approach, named CyberLiveApp, to enable live virtual desktop applications sharing based on a cloud and virtualization infrastructure. The CyberLiveApp supports secure application sharing and on-demand migration among multiple users or equipment. To support VM desktop sharing among multiple users, a secure access mechanism is developed to distinguish view privileges allowing window operation events to be tracked to compute hidden window areas in real time. A proxy-based window filtering mechanism is also proposed to deliver desktops to different users. To support application sharing and migration between VMs, we use the presentation streaming redirection mechanism and VM cloning service. These approaches have been preliminary evaluated on an extended MetaVNC. Results of evaluations have verified that these approaches are effective and useful

    Efficient Redundancy Techniques in Cloud and Desktop Grid Systems using MAP/G/c-type Queues

    Get PDF
    Cloud computing is continuing to prove its flexibility and versatility in helping industries and businesses as well as academia as a way of providing needed computing capacity. As an important alternative to cloud computing, desktop grids allow to utilize the idle computer resources of an enterprise/community by means of distributed computing system, providing a more secure and controllable environment with lower operational expenses. Further, both cloud computing and desktop grids are meant to optimize limited resources and at the same time to decrease the expected latency for users. The crucial parameter for optimization both in cloud computing and in desktop grids is the level of redundancy (replication) for service requests/workunits. In this paper we study the optimal replication policies by considering three variations of Fork-Join systems in the context of a multi-server queueing system with a versatile point process for the arrivals. For services we consider phase type distributions as well as shifted exponential and Weibull. We use both analytical and simulation approach in our analysis and report some interesting qualitative results

    Security Enhancement using Color Based Alphanumeric on Cloud

    Get PDF
    Cloud computing is where computing resources are accessed from a virtual machine ?cloud? rather than a local desktop or organizational data center. While enjoying the convenience brought by this cloud, users also start worrying about losing control of their own data. The only solution is authentication. The password is the most common authentication method. Text based, patterns, pictographic and graphical passwords are suffering from some security attacks. This paper uses color code authentication in which the OTP is generated after the two steps of authentication. This color scheme tests with different kinds of security attacks. It is used for secure authentication for data protection in the cloud

    A private cloud infrastructure for desktop virtualization & application delivery based on Xen

    Get PDF
    Todays computing environment requires IT departments to confront more PC management challenges than they did just a few years ago. With the increment in the complexity of software, more computing power is required for their execution resulting in cost and maintenance to surge up. Additional challenges stem from the need to access applications and data anywhere and from any device. To reduce maintenance, cost and time, desktop virtualization and application delivery come handy. Desktop virtualization prospects to offer a new, cost efficient paradigm shift to cater the demand for resources while amplifying the return on investment. Additionally, desktop virtualization can provide more dynamic streamlined management by isolating the elements of the traditional desktop computing stack. So, virtualized desktop is the key to progress towards a pervasive computing in cloud computing era. As the pace of cloud adoption accelerates, a high degree of flexibility will be the clue to architecting environments that provide for highly secure and available application delivery. This thesis describes the design, installation and deployment of a private cloud using Xen open sourced software solutions within the organization. A private cloud is setup in a virtualized environment of VMware hypervisor for virtual desktop delivery and application streaming to remote users on the LAN through a browser interface over a secured connection. The users of this service would be able to remotely login and access the virtual environment using the given authorized id over the browser

    Cloud Based Platform Design for Court File Sharing

    Get PDF
    Courts are very important organization over the whole world they have a vital roles for countries to make this organization secure reliable and flexible this organization must be related with information technology (IT).Information technology has many alternatives like we can make desktop application for the court or we can make web based application these all technologies can make the organization modernize but they have some drawback they need maintenance that can be complex for user, need very skilled person, and there will be other problems so to be over came over this problems information technology gives us another new technology that is cloud computing. In courts there are a lot of file all this files are shared by different employers in the institution.in these time the manual file sharing system is not more secure, not fast, user cannot get the file when they needed and there are a lot of complain that raised by user sometime file cannot available or there is a duplication of file so, for making this file sharing more secure, fast, on time and having a file at any time when they need the study use cloud computing technology. Open Shift Online 3.5 is used for doing the application. Keywords: File sharing, Cloud Computing, Infrastructure as a service (Iaas), Open shift, Red Hat DOI: 10.7176/CEIS/10-3-01 Publication date: April 30th 201

    Cloud Storage Performance and Security Analysis with Hadoop and GridFTP

    Get PDF
    Even though cloud server has been around for a few years, most of the web hosts today have not converted to cloud yet. If the purpose of the cloud server is distributing and storing files on the internet, FTP servers were much earlier than the cloud. FTP server is sufficient to distribute content on the internet. Therefore, is it worth to shift from FTP server to cloud server? The cloud storage provider declares high durability and availability for their users, and the ability to scale up for more storage space easily could save users tons of money. However, does it provide higher performance and better security features? Hadoop is a very popular platform for cloud computing. It is free software under Apache License. It is written in Java and supports large data processing in a distributed environment. Characteristics of Hadoop include partitioning of data, computing across thousands of hosts, and executing application computations in parallel. Hadoop Distributed File System allows rapid data transfer up to thousands of terabytes, and is capable of operating even in the case of node failure. GridFTP supports high-speed data transfer for wide-area networks. It is based on the FTP and features multiple data channels for parallel transfers. This report describes the technology behind HDFS and enhancement to the Hadoop security features with Kerberos. Based on data transfer performance and security features of HDFS and GridFTP server, we can decide if we should replace GridFTP server with HDFS. According to our experiment result, we conclude that GridFTP server provides better throughput than HDFS, and Kerberos has minimal impact to HDFS performance. We proposed a solution which users authenticate with HDFS first, and get the file from HDFS server to the client using GridFTP

    A methodology for testing virtualisation security

    Get PDF
    There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus reducing hardware costs. However, vulnerabilities in the hypervisor layer have an impact on any virtual machines running on top, making security an important part of virtualisation. In this paper, we evaluate the security of virtualisation, including detection and escaping the environment. We present a methodology to investigate if a virtual machine can be detected and further compromised, based upon previous research. Finally, this methodology is used to evaluate the security of virtual machines. The methods used to evaluate the security include analysis of known vulnerabilities and fuzzing to test the virtual device drivers on three different platforms: VirtualBox, Hyper-V and VMware ESXI. Our results demonstrate that the attack surface of virtualisation is more prone to vulnerabilities than the hypervisor. Comparing our results with previous studies, each platform withstood IOCTL and random fuzzing, demonstrating that the platforms are more robust and secure than previously found. By building on existing research, the results show that security in the hypervisor has been improved. However, using the proposed methodology in this paper it has been shown that an attacker can easily determine that the machine is a virtual machine, which could be used for further exploitation. Finally, our proposed methodology can be utilised to effectively test the security of a virtualised environment
    corecore