Secure Co-processor and Billboard Manager Based Architecture Help to Protect & Store the Citrix Xenserver Based Virtual Data

Authors

  • Sarddar D Department of Computer Science & Engineering University of Kalyani Nadia, West Bengal
  • Bose R Simplex Infrastructures Ltd. Kolkata

Keywords:

Cloud computing, virtualization, citrix xenapp/citrix xendesktop, storage, cloud data center

Abstract

Any discussion of Cloud computing typically begins with virtualization. Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner, which is what makes cloud computing so cost effective. Desktop virtualization, often called client virtualization, is a virtualization technology used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the "virtualized" desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. Desktop virtualization "virtualizes desktop computers" and these virtual desktop environments are "served" to users on the network. In this paper, we proposed a secure cloud data center architecture that made by an application virtualization product like citrix xenapp/citrix xen desktop and with a proposed model that help us to encrypt and store the data like virtualized desktop or virtualized application in a suitable storage area. Cloud computing

References

Guangda Lai, Hua Song, Xiaola Lin,A Service Based Lightweight Desktop Virtualization System,© 2010 IEEE DOI 10.1109/ICSS.2010.44

Real VNC, "Vnc," http://www.realvnc.com/.

Microsoft Corporation, "Remote Desktop Protocol,"http://msdn2.microsoft.com/en-us/library/aa383015.aspx.

Wikipedia

Citrix Corporation, "Citrix Application Delivery Infrastructure."

"Kernel Virtual Machines," http://sourceforge.net/projects/kvm.

Desktone, "Desktop as a Service," http://desktone.com/, 2008.

[DGH09] B. W. DeVries, G. Gupta, K. W. Hamlen, S. Moore, and M. Sridhar. Action Script Bytecode verification with Co-Logic Programming.

In Proc., of the ACM SIGOPLAM workshop on Programming Languagesand Analysis for Security(PLAS). June 2009

Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao , Dr.G.Srinivasa Rao,Cloud Computing: An Analysis of Its Challenges & Security Issues,International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.

Rajarshi Chakraborty, Srilakshmi Ramireddy, T.S.Raghu,H.Raghav Rao, ―The Information Assurance Practices of Cloud Computing Vendors‖, IT Pro July/August 2010, InIEEE Computer Society, p. 29-37.

M. Christodorescu, R. Sailer, D. L. Schales, D.Sgandurra, D.Zamboni. Cloud Security is not (just) Virtualization Security, CCSW’09, Nov. 13, 2009, Chicago,Illinois, USA.

C.Kishor Kumar Reddy, P.R Anisha, K.Srinivasulu Reddy, S.Surender Reddy, Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 1 (July-Aug. 2012), PP 39-46.

Praveen Ram C, Sreenivaasan G,Security as a Service (SasS),Securing User Data by Coprocessor and Distributing the Data,978-1-4244-008-0/10/$26.00 ©2010 IEEE

Citrix Corporation, "Citrix Application Delivery Infrastructure."

Microsoft Corporation, "Windows Terminal Services."

VMWare EMC, http://www.vmware.com.

Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao , Dr.G.Srinivasa Rao,Cloud Computing: An Analysis of Its Challenges & Security Issues, International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.

Kevin Hamlen,Murat Kantarcioglu,Latifur Khan,Bhavani Thuraisingham, Security Issues for Cloud Computing,International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010.

Robert Gellman, ―WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23, 2009.

Oracle White Paper in Enterprise Architecture – Architectural Strategies for Cloud Computing.

Robert Gellman, ―WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing‖, February 23, 2009.

A. Cavoukian, ―Privacy in the clouds‖, in Springer Identity in the Information Society, Published online: 18 December 2008.

Pearson, ―Taking Account of Privacy when Designing Cloud Computing Services, in Proceedings of ICSE-Cloud’09, Vancouver, 2009.

C.Kishor Kumar Reddy, P.R Anisha, K.Srinivasulu Reddy, S.Surender Reddy, Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 1 (July-Aug. 2012), PP 39-46.

Oracle White Paper in Enterprise Architecture – Architectural Strategies for Cloud Computing.

Debabrata Sarddar, Rajesh Bose, Creating a Secured Cloud Based Data Center Using Billboard Manager (BM) and Secuare Co-Processor, International Journal of Scientific & Engineering Research, Volume 4, Issue 12, December-2013.

Downloads

Published

2024-02-26

How to Cite

Sarddar, D., & Bose, R. (2024). Secure Co-processor and Billboard Manager Based Architecture Help to Protect & Store the Citrix Xenserver Based Virtual Data. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(01), 473–479. Retrieved from https://ijact.in/index.php/j/article/view/83

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.