Secure Co-processor and Billboard Manager Based Architecture Help to Protect & Store the Citrix Xenserver Based Virtual Data
Keywords:
Cloud computing, virtualization, citrix xenapp/citrix xendesktop, storage, cloud data centerAbstract
Any discussion of Cloud computing typically begins with virtualization. Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner, which is what makes cloud computing so cost effective. Desktop virtualization, often called client virtualization, is a virtualization technology used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the "virtualized" desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. Desktop virtualization "virtualizes desktop computers" and these virtual desktop environments are "served" to users on the network. In this paper, we proposed a secure cloud data center architecture that made by an application virtualization product like citrix xenapp/citrix xen desktop and with a proposed model that help us to encrypt and store the data like virtualized desktop or virtualized application in a suitable storage area. Cloud computing
References
Guangda Lai, Hua Song, Xiaola Lin,A Service Based Lightweight Desktop Virtualization System,© 2010 IEEE DOI 10.1109/ICSS.2010.44
Real VNC, "Vnc," http://www.realvnc.com/.
Microsoft Corporation, "Remote Desktop Protocol,"http://msdn2.microsoft.com/en-us/library/aa383015.aspx.
Wikipedia
Citrix Corporation, "Citrix Application Delivery Infrastructure."
"Kernel Virtual Machines," http://sourceforge.net/projects/kvm.
Desktone, "Desktop as a Service," http://desktone.com/, 2008.
[DGH09] B. W. DeVries, G. Gupta, K. W. Hamlen, S. Moore, and M. Sridhar. Action Script Bytecode verification with Co-Logic Programming.
In Proc., of the ACM SIGOPLAM workshop on Programming Languagesand Analysis for Security(PLAS). June 2009
Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao , Dr.G.Srinivasa Rao,Cloud Computing: An Analysis of Its Challenges & Security Issues,International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.
Rajarshi Chakraborty, Srilakshmi Ramireddy, T.S.Raghu,H.Raghav Rao, ―The Information Assurance Practices of Cloud Computing Vendors‖, IT Pro July/August 2010, InIEEE Computer Society, p. 29-37.
M. Christodorescu, R. Sailer, D. L. Schales, D.Sgandurra, D.Zamboni. Cloud Security is not (just) Virtualization Security, CCSW’09, Nov. 13, 2009, Chicago,Illinois, USA.
C.Kishor Kumar Reddy, P.R Anisha, K.Srinivasulu Reddy, S.Surender Reddy, Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 1 (July-Aug. 2012), PP 39-46.
Praveen Ram C, Sreenivaasan G,Security as a Service (SasS),Securing User Data by Coprocessor and Distributing the Data,978-1-4244-008-0/10/$26.00 ©2010 IEEE
Citrix Corporation, "Citrix Application Delivery Infrastructure."
Microsoft Corporation, "Windows Terminal Services."
VMWare EMC, http://www.vmware.com.
Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao , Dr.G.Srinivasa Rao,Cloud Computing: An Analysis of Its Challenges & Security Issues, International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.
Kevin Hamlen,Murat Kantarcioglu,Latifur Khan,Bhavani Thuraisingham, Security Issues for Cloud Computing,International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010.
Robert Gellman, ―WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23, 2009.
Oracle White Paper in Enterprise Architecture – Architectural Strategies for Cloud Computing.
Robert Gellman, ―WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing‖, February 23, 2009.
A. Cavoukian, ―Privacy in the clouds‖, in Springer Identity in the Information Society, Published online: 18 December 2008.
Pearson, ―Taking Account of Privacy when Designing Cloud Computing Services, in Proceedings of ICSE-Cloud’09, Vancouver, 2009.
C.Kishor Kumar Reddy, P.R Anisha, K.Srinivasulu Reddy, S.Surender Reddy, Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 1 (July-Aug. 2012), PP 39-46.
Oracle White Paper in Enterprise Architecture – Architectural Strategies for Cloud Computing.
Debabrata Sarddar, Rajesh Bose, Creating a Secured Cloud Based Data Center Using Billboard Manager (BM) and Secuare Co-Processor, International Journal of Scientific & Engineering Research, Volume 4, Issue 12, December-2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.