Submit Search
Upload
Secure Desktop Computing In the Cloud
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i1/IRJET-V10I128.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Presentation Wsta
Presentation Wsta
will4468
Presentation wsta
Presentation wsta
will4468
WSTA PRESENTATION
WSTA PRESENTATION
will4468
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
Recommended
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Presentation Wsta
Presentation Wsta
will4468
Presentation wsta
Presentation wsta
will4468
WSTA PRESENTATION
WSTA PRESENTATION
will4468
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
vrickens
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
TEWMAGAZINE
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
publishable paper
publishable paper
chaitanya451336
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
dannyijwest
Cloud computing
Cloud computing
perfectican
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
Introduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
Security in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
Cruatech Services Intro
Cruatech Services Intro
Cruatech
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Secure Desktop Computing In the Cloud
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
vrickens
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
TEWMAGAZINE
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
publishable paper
publishable paper
chaitanya451336
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
dannyijwest
Cloud computing
Cloud computing
perfectican
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
Introduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
Security in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
Cruatech Services Intro
Cruatech Services Intro
Cruatech
Similar to Secure Desktop Computing In the Cloud
(20)
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
publishable paper
publishable paper
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Ant colony Optimization: A Solution of Load balancing in Cloud
Ant colony Optimization: A Solution of Load balancing in Cloud
Cloud computing
Cloud computing
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
Introduction to aneka cloud
Introduction to aneka cloud
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Security in a Virtualised Computing
Security in a Virtualised Computing
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
Cruatech Services Intro
Cruatech Services Intro
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Recently uploaded
(20)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Secure Desktop Computing In the Cloud
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 156 Secure Desktop Computing In the Cloud Priyanka Shankar Bhingardeve1, Prajkta Mahendra Ghadge2, Asst.Dr.S.P.Jadhav3, Asst.prof.S.V.Thorat4 1stPriyanka Shankar Bhingardeve, MCA YTC, Satara 2ndPrajkta Mahendra Ghadge, MCA YTC Satara 3rdDr.S.P.Jadhav,4thProf.S.V.Thorat, Dept. of MCA Yashoda Technical Campus,Satara-415003 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Computation that employees perform on their desktop and the management of the desktop computing infrastructureto the cloud, the need for securing such cloud-hosted user computing tasks and environments become paramount. In this paper, we present Venia, a secure cloud-based desktop computing platform designed to protect against both external and internal threats. Accessible to end-users through a thin Remote Desktop Protocol (RDP) client Venia isolates end-user’s applications and data intocontainersand subjects the interactions with and among the containers to security policies. Following a principle of least privilege, Venia security policies control user’s access to containers, network and file system interaction of the containers, cross- container data sharing andalsoenablescollectionofdetailed logs for auditing purpose. Venia has been deployed to a 3rd party test environment where it demonstrated that end- users can perform the tasks they need on a daily basis, without introducing greater risk to the overall organization, and its currently undergoing security and performance evaluation by an independent evaluation team. 1. INTRODUCTION The next step within the trend of moving backend services and supporting computing infrastructure to the cloud, is to maneuver end-user computing and its supporting infrastructure to the cloud additionally. Cloud computing provides economy of scale, eliminates the headache of computer code and hardware management and maintenance, and permitson-demandscalingandpayasyou utilize rating. Properly architected, moving end-user computation to the cloud will offer a security profit. A conscientious cloud seller can offer stronger perimeter protection, specialised employees, and established tools, techniques and procedures for handling security incidents than a typical enterprise will generally deploy. However, sharing machine resources withinthecloudpresentsa brand new set of security challenges for ensurinorganization and even worse, users from completely different organizations cannot breach security to attain malicious objectives. 2. Related Work Secure Desktop computing in the cloud Current solutions for desktop computing within the cloud square measure based off of a Virtual Desktop Infrastructure (VDI) approach. VDI could be a variety of virtualization wherever entire desktop solutions are hosted within the cloud, so accessed employing a skinny consumer, usually with RDP. One such technology is Horizon seven by VMWare. in hand withthese solutions is their wholesale exporting of the desktop atmosphere to the cloud. While helping to modify the digital geographic point and providing a centralized management over resource and network access, these solutions still maintain the appliance primarily based security problems inherent in a very ancient desktop. 3. Design Goals And Approach The main style goals for Venia were: • Role-specific UCEs: UCEs for individual users ought to consist of role-specific application bundles, wherever a job defines that desktop applications and resources area unit required to perform a particular job connected operate. A single user might have multiple roles, presumably requiring use of applications from multiple operative systems (e.g., Linux and Windows) in a very single role, and resources will be shared among completely different roles. • Enterprise-specific security management and auditing: Interaction between end-user skinny consumer and UCE ought to be encrypted. Resourceaccess,data sharinganduse of UCEs ought to be subject to enterprise-specific security controls and auditing policies. • End-user expertise: End-user experienceshouldn't change drastically from exploitation desktop atmosphere, in particular, end-users shouldn't need to re-authenticate themselves for role specific resource access, ought torealize familiar applications in their UCE, and be able to cut and paste wherever allowed by the enterprise policy. • Administration: Venia ought to give a straightforward approach for administrators to outline enterprise-specific security and auditing policies, and a straightforward to outline role-specific application bundles and instantiating user-specific UCEs. To attain thesegoals,Venia wasdesigned as distinct components a collection of microservices establishing the required enterprise IT services for a useful corporate infrastructure, a User cipher atmosphere (UCE) that defines the end-user space, together with theirdesktop, keep files and applications.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 157 A. Enterprise IT Services as Microservices Enterprise IT services play a necessary and vital half in a corporate infrastructure. These services area unit liable for, among others, managing user access and authorization, and managing shared resources, like email servers,printers,and centralized filesystems. Venia contains a collection of microservices for performing aspects of those IT management functions, independent of the end-usersspace. Separating individual aspects of IT management responsibilities into distinct microservicesthatinteroperate via a well-defined Representational State Transfer (REST) Application Programming Interface (API), and subjecting these interactions to strict security controls andauditing[6] reduces the chance of abusing the UCEs through the enterprise IT services, resulting in associate degree overall reduction of the attack surface of the UCEs. Venia contains four microservices: • User Service: provides the initial entry purpose into the Venia system, via a web-portal, and contains all of the business logic for authenticating a user against a directory service, like Active Directory, and obtaining all of their out there roles. • Virtue Service: The Virtue Service coordinates communications between the opposite microservices,andis responsible for constructing the UCE. Once created, the only reference the UCE maintains back to the microservicesisfor coverage work events. This eliminates the potential for lateral attacks on the enterprise assets. • sensing element Service: The sensing element service aggregates all of the logs across the Venia system. This centralized service provides the required observance and analysis of system activities. • Admin Service: The admin service provides for the definition, management, and dissemination of policies B. User Compute Environment (UCE) UCE supports the acquainted daily interaction of the end- user to perform their daily tasks. The Venia UCE may be a single cloud based mostly machine instance that uses policy controlled containers to protect every Virtue, providing application isolation, and the ability to tightly management and monitor all actions and interactions. The UCE incorporates security mechanisms at multiple levels to ensure Associate in Nursing operational end-user expertise, whereas maintaining the goals and objectives of the policy. 4. Implementation The current version of Venia is enforced as Associate in Nursing Amazon Web Services (AWS) application. This implementation consisted of two-subnets running in a very single Virtual Private Network (VPC). The sub-nets were divided between enterprise microservices in one, and UCEs in another. The only microservices that area unit accessible outside of the VPC area unit the Admin service, for policy construction, and also the Login service, for UCE creation. A. UCE Implementation Each Virtue lives through one LXC The display of every Virtue is shared to the host’s X Server show to give a unified desktop look. The displays of every Virtue are shown within the sort of another window that identifies the containing Virtue. The Windows instance is connected throughRDP inside every Virtue onAssociateinNursingapplicationbasis. this permits Windows applications to own native support with the appearance of being on one seamless desktop among the Virtue. UNIX system applications area unit supported through the LXC containers the Virtues livetotell the tale. A writing board manager at the host level has been other to manage copy-paste options between the Virtue windows. B. Demonstrative Examples To verify our policy approach, we created and tested a few unique Virtues to exercise the capabilities of the system. Each of these Virtues were defined to address a specific security, or operational scenario. 5. Evaluation To evaluate VENIA, we have a tendency to performed a series of performance overhead tests to estimate user perceptible overhead. For these many typical user operations, and compared against a regular desktop environment. every take a look at was conducted thrice,and the average was computed For these measurements, the quality desktop system was a VM on physically native hardware with four processor cores and 8GB of memory. VENIA was running on AWS t2.xlarge with four processors and 16GB of memory. To verifyourpolicyapproach,wehave a tendency to created and tested many unique Virtues to exercise the capabilities of the system. Each of these Virtues were outlined to handle a particular security, or operational state of affairs. The automobile industry is investing in autonomous vehicles for driverless cars, which will have to analyze and make decisions on data that pertains to their surroundings for movements and directions. These vehicles need to transmit Data to the manufacturers so that they can track their usage and also get the required maintenance
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 158 alerts. The data will be transmitted through networks resulting in congestion. To achieve low latency when accessing the network, it is necessary for the manufacturers to device new effective computing ways 6. CONCLUSION As more front-end applicationsandcomputationcontinue to migrate to the cloud, the need for a secure and usable platform is paramount. With Venia, we have demonstrated an architecture for a securecloud-basedend-usercomputing solution. With this architecture, we were successful in separating enterprise IT functions from end-user tasks, which helped to reduce the amount of information available to an attacker while still providing an operable environment for the user. We further emonstrated thatenterprisespecific security controls and auditing requirementscanbe enforced on the UCEs, and provided an easy to use administrative toll to construct well defined policies for Virtues. Initial results show that running the applications in virtues within cloud- based UCEs subject to the applicable security controls and auditing policies do not drastically change the user’s perception of the applications’ response time, or constrain access to and use of information and resources they need to perform their job functions. 7. References [1] T. Ristenpart, E. Tromer, H. Shacham,andS.Savage,“Hey, you, get off of my cloud: exploring knowledge run in third- party cypher clouds,” in Proceedings of the sixteenth ACM conference on portable computer and communications security - CCS ’09, Chicago, Illinois, USA, 2009, p. 199. [2] K. Ren, C. Wang, and Q. Wang, “Security Challenges for the public Cloud,” IEEE net Comput., vol. 16, no. 1, pp. 69– 73, Jan. 2012. [3] K. Hashizume, N. Yoshioka, and E. B. Fernandez, “Misuse patterns for cloud computing,” in Proceedings of the ordinal Asian Conference on Pattern Languages of Programs - AsianPLoP ’11, Tokyo, Japan, 2011, pp. 1–6. [4] “VMware Horizon seven is that the leading platform for virtual desktops and applications.,” VMWare. [Online]. Available: https://www.vmware.com/products/horizon.html. [Accessed: 29-Apr 2019]. [5] N. Dragoni et al., “Microservices: yesterday, today, and tomorrow,” ArXiv160604036 matter, Jun. 2016. [6] T. Yarygina, “Exploring Microservice Security,” p. 144. [7] G. Nath Nayak and S.GhoshSamaddar,“Differentflavours of Man-In The-Middle attack, consequences and potential solutions,” in 2010 third International Conference on engineering and knowledge Technology, Chengdu, China, 2010, pp. 491–495. [8] S. Jeuris and J. E. Bardram, “Dedicated workspaces: quicker commencement times and reduced psychological feature load in ordered multitasking,” Comput. Hum.Behav., vol. 62, pp. 404–414, Sep. 2016. [9] S. S. Clark, A. Paulos, B. Benyo, P. Pal, and R. Schantz, “Empirical Evaluation of the A3 Environment: Evaluating Defenses Against ZeroDay Attacks,” in 2015 tenth International Conference on convenience, Reliability and Security, Toulouse, France, 2015, pp. 80–89. [10] C. Smutz and A. Stavrou, “Malicious PDF detection exploitation data and structural decisions,”inProceedingsof the twenty eighth Annual portable computer Security Applications Conference on - ACSAC ’12, Orlando, Florida, 2012, p. 239. [11] R. Sandhu, V. Bhamidipati, and Q. Munawer, “The ARBAC97 model for role-based administration of roles,” ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, p. 31. [12] D. R. Kuhn, E. J. Coyne, and T. R. Weil,“AddingAttributes to RoleBased Access management,” IEEE Comput., vol. 43, no. 6, p. 4, 2010. [13] D. Thomsen and E. Bertino, “Network Policy human action exploitation Transactions: The heavy particle Approach,” in Proceedings of the 23nd ACM on conference on Access management Models and Technologies - SACMAT ’18, state capital, Indiana, USA, 2018, pp. 129–136. [14] R. Rosen, “Linux Containers and in addition the long haul Cloud,” p. 85. [15] S. D. Wolthusen, “Security policy human action at the arrangement level in the Windows organisation code package family,” in Seventeenth Annual Computer Security Applications Conference, port of entry, LA, USA, 2001, pp. 55–63. [16] C. Boettiger, “An introduction to working person for duplicatable analysis, with examples from the R setting,” ACM SIGOPS Oper. Syst. Rev., vol. 49, no. 1, pp. 71–79, Jan. 2015. [17] A. Driscoll, Microsoft Windows PowerShell three.0 initial look: a fast, succinct guide to the new and exciting decisions in PowerShell three.0. 2012. [18] B. Chandra, “A technical scan of theOpenSSL ‘Heartbleed’ vulnerability,” p. 18.
Download now