SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 156
Secure Desktop Computing In the Cloud
Priyanka Shankar Bhingardeve1, Prajkta Mahendra Ghadge2,
Asst.Dr.S.P.Jadhav3, Asst.prof.S.V.Thorat4
1stPriyanka Shankar Bhingardeve, MCA YTC, Satara
2ndPrajkta Mahendra Ghadge, MCA YTC Satara
3rdDr.S.P.Jadhav,4thProf.S.V.Thorat, Dept. of MCA Yashoda Technical Campus,Satara-415003
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—
Computation that employees perform on their desktop and
the management of the desktop computing infrastructureto
the cloud, the need for securing such cloud-hosted user
computing tasks and environments become paramount. In
this paper, we present Venia, a secure cloud-based desktop
computing platform designed to protect against both
external and internal threats. Accessible to end-users
through a thin Remote Desktop Protocol (RDP) client Venia
isolates end-user’s applications and data intocontainersand
subjects the interactions with and among the containers to
security policies. Following a principle of least privilege,
Venia security policies control user’s access to containers,
network and file system interaction of the containers, cross-
container data sharing andalsoenablescollectionofdetailed
logs for auditing purpose. Venia has been deployed to a 3rd
party test environment where it demonstrated that end-
users can perform the tasks they need on a daily basis,
without introducing greater risk to the overall organization,
and its currently undergoing security and performance
evaluation by an independent evaluation team.
1. INTRODUCTION
The next step within the trend of moving backend services
and supporting computing infrastructure to the cloud, is to
maneuver end-user computing and its supporting
infrastructure to the cloud additionally. Cloud computing
provides economy of scale, eliminates the headache of
computer code and hardware management and
maintenance, and permitson-demandscalingandpayasyou
utilize rating. Properly architected, moving end-user
computation to the cloud will offer a security profit. A
conscientious cloud seller can offer stronger perimeter
protection, specialised employees, and established tools,
techniques and procedures for handling security incidents
than a typical enterprise will generally deploy. However,
sharing machine resources withinthecloudpresentsa brand
new set of security challenges for ensurinorganization and
even worse, users from completely different organizations
cannot breach security to attain malicious objectives.
2. Related Work
Secure Desktop computing in the cloud Current solutions for
desktop computing within the cloud square measure based
off of a Virtual Desktop Infrastructure (VDI) approach.
VDI could be a variety of virtualization wherever entire
desktop solutions are hosted within the cloud, so accessed
employing a skinny consumer, usually with RDP. One such
technology is Horizon seven by VMWare. in hand withthese
solutions is their wholesale exporting of the desktop
atmosphere to the cloud. While helping to modify the digital
geographic point and providing a centralized management
over resource and network access, these solutions still
maintain the appliance primarily based security problems
inherent in a very ancient desktop.
3. Design Goals And Approach
The main style goals for Venia were:
• Role-specific UCEs: UCEs for individual users ought to
consist of role-specific application bundles, wherever a job
defines that desktop applications and resources area unit
required to perform a particular job connected operate. A
single user might have multiple roles, presumably requiring
use of applications from multiple operative systems (e.g.,
Linux and Windows) in a very single role, and resources will
be shared among completely different roles.
• Enterprise-specific security management and auditing:
Interaction between end-user skinny consumer and UCE
ought to be encrypted. Resourceaccess,data sharinganduse
of UCEs ought to be subject to enterprise-specific security
controls and auditing policies.
• End-user expertise: End-user experienceshouldn't change
drastically from exploitation desktop atmosphere, in
particular, end-users shouldn't need to re-authenticate
themselves for role specific resource access, ought torealize
familiar applications in their UCE, and be able to cut and
paste wherever allowed by the enterprise policy.
• Administration: Venia ought to give a straightforward
approach for administrators to outline enterprise-specific
security and auditing policies, and a straightforward to
outline role-specific application bundles and instantiating
user-specific UCEs. To attain thesegoals,Venia wasdesigned
as distinct components a collection of microservices
establishing the required enterprise IT services for a useful
corporate infrastructure, a User cipher atmosphere (UCE)
that defines the end-user space, together with theirdesktop,
keep files and applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 157
A. Enterprise IT Services as Microservices Enterprise IT
services play a necessary and vital half in a corporate
infrastructure. These services area unit liable for, among
others, managing user access and authorization, and
managing shared resources, like email servers,printers,and
centralized filesystems. Venia contains a collection of
microservices for performing aspects of those IT
management functions, independent of the end-usersspace.
Separating individual aspects of IT management
responsibilities into distinct microservicesthatinteroperate
via a well-defined Representational State Transfer (REST)
Application Programming Interface (API), and subjecting
these interactions to strict security controls andauditing[6]
reduces the chance of abusing the UCEs through the
enterprise IT services, resulting in associate degree overall
reduction of the attack surface of the UCEs.
Venia contains four microservices:
• User Service: provides the initial entry purpose into the
Venia system, via a web-portal, and contains all of the
business logic for authenticating a user against a directory
service, like Active Directory, and obtaining all of their out
there roles.
• Virtue Service: The Virtue Service coordinates
communications between the opposite microservices,andis
responsible for constructing the UCE. Once created, the only
reference the UCE maintains back to the microservicesisfor
coverage work events. This eliminates the potential for
lateral attacks on the enterprise assets.
• sensing element Service: The sensing element service
aggregates all of the logs across the Venia system. This
centralized service provides the required observance and
analysis of system activities.
• Admin Service: The admin service provides for the
definition, management, and dissemination of policies
B. User Compute Environment (UCE)
UCE supports the acquainted daily interaction of the end-
user to perform their daily tasks. The Venia UCE may be a
single cloud based mostly machine instance that uses
policy controlled containers to protect every Virtue,
providing application isolation, and the ability to tightly
management and monitor all actions and interactions. The
UCE incorporates security mechanisms at multiple levels to
ensure Associate in Nursing operational end-user expertise,
whereas maintaining the goals and objectives of the policy.
4. Implementation
The current version of Venia is enforced as Associate in
Nursing Amazon Web Services (AWS) application. This
implementation consisted of two-subnets running in a very
single Virtual Private Network (VPC). The sub-nets were
divided between enterprise microservices in one, and UCEs
in another. The only microservices that area unit accessible
outside of the VPC area unit the Admin service, for policy
construction, and also the Login service, for UCE creation.
A. UCE Implementation
Each Virtue lives through one LXC The display of every
Virtue is shared to the host’s X Server show to give a unified
desktop look. The displays of every Virtue are shown within
the sort of another window that identifies the containing
Virtue. The Windows instance is connected throughRDP
inside every Virtue onAssociateinNursingapplicationbasis.
this permits Windows applications to own native support
with the appearance of being on one seamless desktop
among the Virtue. UNIX system applications area unit
supported through the LXC containers the Virtues livetotell
the tale. A writing board manager at the host level has been
other to manage copy-paste options between the Virtue
windows.
B. Demonstrative Examples
To verify our policy approach, we created and tested a few
unique Virtues to exercise the capabilities of the system.
Each of these Virtues were defined to address a specific
security, or operational scenario.
5. Evaluation
To evaluate VENIA, we have a tendency to performed a
series of performance overhead tests to estimate user
perceptible overhead. For these many typical user
operations, and compared against a regular desktop
environment. every take a look at was conducted thrice,and
the average was computed For these measurements, the
quality desktop system was a VM on physically native
hardware with four processor cores and 8GB of memory.
VENIA was running on AWS t2.xlarge with four processors
and 16GB of memory. To verifyourpolicyapproach,wehave
a tendency to created and tested many unique Virtues to
exercise the capabilities of the system. Each of these Virtues
were outlined to handle a particular security, or operational
state of affairs. The automobile industry is investing in
autonomous vehicles for driverless cars, which will have to
analyze and make decisions on data that pertains to their
surroundings for movements and directions. These vehicles
need to transmit Data to the manufacturers so that they can
track their usage and also get the required maintenance
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 158
alerts. The data will be transmitted through networks
resulting in congestion. To achieve low latency when
accessing the network, it is necessary for the manufacturers
to device new effective computing ways
6. CONCLUSION
As more front-end applicationsandcomputationcontinue to
migrate to the cloud, the need for a secure and usable
platform is paramount. With Venia, we have demonstrated
an architecture for a securecloud-basedend-usercomputing
solution. With this architecture, we were successful in
separating enterprise IT functions from end-user tasks,
which helped to reduce the amount of information available
to an attacker while still providing an operable environment
for the user. We further emonstrated thatenterprisespecific
security controls and auditing requirementscanbe enforced
on the UCEs, and provided an easy to use administrative toll
to construct well defined policies for Virtues. Initial results
show that running the applications in virtues within cloud-
based UCEs subject to the applicable security controls and
auditing policies do not drastically change the user’s
perception of the applications’ response time, or constrain
access to and use of information and resources they need to
perform their job functions.
7. References
[1] T. Ristenpart, E. Tromer, H. Shacham,andS.Savage,“Hey,
you, get off of my cloud: exploring knowledge run in third-
party cypher clouds,” in Proceedings of the sixteenth ACM
conference on portable computer and communications
security - CCS ’09, Chicago, Illinois, USA, 2009, p. 199.
[2] K. Ren, C. Wang, and Q. Wang, “Security Challenges for
the public Cloud,” IEEE net Comput., vol. 16, no. 1, pp. 69–
73, Jan. 2012.
[3] K. Hashizume, N. Yoshioka, and E. B. Fernandez, “Misuse
patterns for cloud computing,” in Proceedings of the ordinal
Asian Conference on Pattern Languages of Programs -
AsianPLoP ’11, Tokyo, Japan, 2011, pp. 1–6.
[4] “VMware Horizon seven is that the leading platform for
virtual desktops and applications.,” VMWare. [Online].
Available:
https://www.vmware.com/products/horizon.html.
[Accessed: 29-Apr 2019].
[5] N. Dragoni et al., “Microservices: yesterday, today, and
tomorrow,” ArXiv160604036 matter, Jun. 2016.
[6] T. Yarygina, “Exploring Microservice Security,” p. 144.
[7] G. Nath Nayak and S.GhoshSamaddar,“Differentflavours
of Man-In The-Middle attack, consequences and potential
solutions,” in 2010 third International Conference on
engineering and knowledge Technology, Chengdu, China,
2010, pp. 491–495.
[8] S. Jeuris and J. E. Bardram, “Dedicated workspaces:
quicker commencement times and reduced psychological
feature load in ordered multitasking,” Comput. Hum.Behav.,
vol. 62, pp. 404–414, Sep. 2016.
[9] S. S. Clark, A. Paulos, B. Benyo, P. Pal, and R. Schantz,
“Empirical Evaluation of the A3 Environment: Evaluating
Defenses Against ZeroDay Attacks,” in 2015 tenth
International Conference on convenience, Reliability and
Security, Toulouse, France, 2015, pp. 80–89.
[10] C. Smutz and A. Stavrou, “Malicious PDF detection
exploitation data and structural decisions,”inProceedingsof
the twenty eighth Annual portable computer Security
Applications Conference on - ACSAC ’12, Orlando, Florida,
2012, p. 239.
[11] R. Sandhu, V. Bhamidipati, and Q. Munawer, “The
ARBAC97 model for role-based administration of roles,”
ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, p. 31.
[12] D. R. Kuhn, E. J. Coyne, and T. R. Weil,“AddingAttributes
to RoleBased Access management,” IEEE Comput., vol. 43,
no. 6, p. 4, 2010.
[13] D. Thomsen and E. Bertino, “Network Policy human
action exploitation Transactions: The heavy particle
Approach,” in Proceedings of the 23nd ACM on conference
on Access management Models and Technologies - SACMAT
’18, state capital, Indiana, USA, 2018, pp. 129–136.
[14] R. Rosen, “Linux Containers and in addition the long
haul Cloud,” p. 85.
[15] S. D. Wolthusen, “Security policy human action at the
arrangement level in the Windows organisation code
package family,” in Seventeenth Annual Computer Security
Applications Conference, port of entry, LA, USA, 2001, pp.
55–63.
[16] C. Boettiger, “An introduction to working person for
duplicatable analysis, with examples from the R setting,”
ACM SIGOPS Oper. Syst. Rev., vol. 49, no. 1, pp. 71–79, Jan.
2015.
[17] A. Driscoll, Microsoft Windows PowerShell three.0
initial look: a fast, succinct guide to the new and exciting
decisions in PowerShell three.0. 2012.
[18] B. Chandra, “A technical scan of theOpenSSL
‘Heartbleed’ vulnerability,” p. 18.

More Related Content

Similar to Secure Desktop Computing In the Cloud

International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)IRJET Journal
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldTEWMAGAZINE
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 

Similar to Secure Desktop Computing In the Cloud (20)

International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Secure Desktop Computing In the Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 156 Secure Desktop Computing In the Cloud Priyanka Shankar Bhingardeve1, Prajkta Mahendra Ghadge2, Asst.Dr.S.P.Jadhav3, Asst.prof.S.V.Thorat4 1stPriyanka Shankar Bhingardeve, MCA YTC, Satara 2ndPrajkta Mahendra Ghadge, MCA YTC Satara 3rdDr.S.P.Jadhav,4thProf.S.V.Thorat, Dept. of MCA Yashoda Technical Campus,Satara-415003 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Computation that employees perform on their desktop and the management of the desktop computing infrastructureto the cloud, the need for securing such cloud-hosted user computing tasks and environments become paramount. In this paper, we present Venia, a secure cloud-based desktop computing platform designed to protect against both external and internal threats. Accessible to end-users through a thin Remote Desktop Protocol (RDP) client Venia isolates end-user’s applications and data intocontainersand subjects the interactions with and among the containers to security policies. Following a principle of least privilege, Venia security policies control user’s access to containers, network and file system interaction of the containers, cross- container data sharing andalsoenablescollectionofdetailed logs for auditing purpose. Venia has been deployed to a 3rd party test environment where it demonstrated that end- users can perform the tasks they need on a daily basis, without introducing greater risk to the overall organization, and its currently undergoing security and performance evaluation by an independent evaluation team. 1. INTRODUCTION The next step within the trend of moving backend services and supporting computing infrastructure to the cloud, is to maneuver end-user computing and its supporting infrastructure to the cloud additionally. Cloud computing provides economy of scale, eliminates the headache of computer code and hardware management and maintenance, and permitson-demandscalingandpayasyou utilize rating. Properly architected, moving end-user computation to the cloud will offer a security profit. A conscientious cloud seller can offer stronger perimeter protection, specialised employees, and established tools, techniques and procedures for handling security incidents than a typical enterprise will generally deploy. However, sharing machine resources withinthecloudpresentsa brand new set of security challenges for ensurinorganization and even worse, users from completely different organizations cannot breach security to attain malicious objectives. 2. Related Work Secure Desktop computing in the cloud Current solutions for desktop computing within the cloud square measure based off of a Virtual Desktop Infrastructure (VDI) approach. VDI could be a variety of virtualization wherever entire desktop solutions are hosted within the cloud, so accessed employing a skinny consumer, usually with RDP. One such technology is Horizon seven by VMWare. in hand withthese solutions is their wholesale exporting of the desktop atmosphere to the cloud. While helping to modify the digital geographic point and providing a centralized management over resource and network access, these solutions still maintain the appliance primarily based security problems inherent in a very ancient desktop. 3. Design Goals And Approach The main style goals for Venia were: • Role-specific UCEs: UCEs for individual users ought to consist of role-specific application bundles, wherever a job defines that desktop applications and resources area unit required to perform a particular job connected operate. A single user might have multiple roles, presumably requiring use of applications from multiple operative systems (e.g., Linux and Windows) in a very single role, and resources will be shared among completely different roles. • Enterprise-specific security management and auditing: Interaction between end-user skinny consumer and UCE ought to be encrypted. Resourceaccess,data sharinganduse of UCEs ought to be subject to enterprise-specific security controls and auditing policies. • End-user expertise: End-user experienceshouldn't change drastically from exploitation desktop atmosphere, in particular, end-users shouldn't need to re-authenticate themselves for role specific resource access, ought torealize familiar applications in their UCE, and be able to cut and paste wherever allowed by the enterprise policy. • Administration: Venia ought to give a straightforward approach for administrators to outline enterprise-specific security and auditing policies, and a straightforward to outline role-specific application bundles and instantiating user-specific UCEs. To attain thesegoals,Venia wasdesigned as distinct components a collection of microservices establishing the required enterprise IT services for a useful corporate infrastructure, a User cipher atmosphere (UCE) that defines the end-user space, together with theirdesktop, keep files and applications.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 157 A. Enterprise IT Services as Microservices Enterprise IT services play a necessary and vital half in a corporate infrastructure. These services area unit liable for, among others, managing user access and authorization, and managing shared resources, like email servers,printers,and centralized filesystems. Venia contains a collection of microservices for performing aspects of those IT management functions, independent of the end-usersspace. Separating individual aspects of IT management responsibilities into distinct microservicesthatinteroperate via a well-defined Representational State Transfer (REST) Application Programming Interface (API), and subjecting these interactions to strict security controls andauditing[6] reduces the chance of abusing the UCEs through the enterprise IT services, resulting in associate degree overall reduction of the attack surface of the UCEs. Venia contains four microservices: • User Service: provides the initial entry purpose into the Venia system, via a web-portal, and contains all of the business logic for authenticating a user against a directory service, like Active Directory, and obtaining all of their out there roles. • Virtue Service: The Virtue Service coordinates communications between the opposite microservices,andis responsible for constructing the UCE. Once created, the only reference the UCE maintains back to the microservicesisfor coverage work events. This eliminates the potential for lateral attacks on the enterprise assets. • sensing element Service: The sensing element service aggregates all of the logs across the Venia system. This centralized service provides the required observance and analysis of system activities. • Admin Service: The admin service provides for the definition, management, and dissemination of policies B. User Compute Environment (UCE) UCE supports the acquainted daily interaction of the end- user to perform their daily tasks. The Venia UCE may be a single cloud based mostly machine instance that uses policy controlled containers to protect every Virtue, providing application isolation, and the ability to tightly management and monitor all actions and interactions. The UCE incorporates security mechanisms at multiple levels to ensure Associate in Nursing operational end-user expertise, whereas maintaining the goals and objectives of the policy. 4. Implementation The current version of Venia is enforced as Associate in Nursing Amazon Web Services (AWS) application. This implementation consisted of two-subnets running in a very single Virtual Private Network (VPC). The sub-nets were divided between enterprise microservices in one, and UCEs in another. The only microservices that area unit accessible outside of the VPC area unit the Admin service, for policy construction, and also the Login service, for UCE creation. A. UCE Implementation Each Virtue lives through one LXC The display of every Virtue is shared to the host’s X Server show to give a unified desktop look. The displays of every Virtue are shown within the sort of another window that identifies the containing Virtue. The Windows instance is connected throughRDP inside every Virtue onAssociateinNursingapplicationbasis. this permits Windows applications to own native support with the appearance of being on one seamless desktop among the Virtue. UNIX system applications area unit supported through the LXC containers the Virtues livetotell the tale. A writing board manager at the host level has been other to manage copy-paste options between the Virtue windows. B. Demonstrative Examples To verify our policy approach, we created and tested a few unique Virtues to exercise the capabilities of the system. Each of these Virtues were defined to address a specific security, or operational scenario. 5. Evaluation To evaluate VENIA, we have a tendency to performed a series of performance overhead tests to estimate user perceptible overhead. For these many typical user operations, and compared against a regular desktop environment. every take a look at was conducted thrice,and the average was computed For these measurements, the quality desktop system was a VM on physically native hardware with four processor cores and 8GB of memory. VENIA was running on AWS t2.xlarge with four processors and 16GB of memory. To verifyourpolicyapproach,wehave a tendency to created and tested many unique Virtues to exercise the capabilities of the system. Each of these Virtues were outlined to handle a particular security, or operational state of affairs. The automobile industry is investing in autonomous vehicles for driverless cars, which will have to analyze and make decisions on data that pertains to their surroundings for movements and directions. These vehicles need to transmit Data to the manufacturers so that they can track their usage and also get the required maintenance
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 158 alerts. The data will be transmitted through networks resulting in congestion. To achieve low latency when accessing the network, it is necessary for the manufacturers to device new effective computing ways 6. CONCLUSION As more front-end applicationsandcomputationcontinue to migrate to the cloud, the need for a secure and usable platform is paramount. With Venia, we have demonstrated an architecture for a securecloud-basedend-usercomputing solution. With this architecture, we were successful in separating enterprise IT functions from end-user tasks, which helped to reduce the amount of information available to an attacker while still providing an operable environment for the user. We further emonstrated thatenterprisespecific security controls and auditing requirementscanbe enforced on the UCEs, and provided an easy to use administrative toll to construct well defined policies for Virtues. Initial results show that running the applications in virtues within cloud- based UCEs subject to the applicable security controls and auditing policies do not drastically change the user’s perception of the applications’ response time, or constrain access to and use of information and resources they need to perform their job functions. 7. References [1] T. Ristenpart, E. Tromer, H. Shacham,andS.Savage,“Hey, you, get off of my cloud: exploring knowledge run in third- party cypher clouds,” in Proceedings of the sixteenth ACM conference on portable computer and communications security - CCS ’09, Chicago, Illinois, USA, 2009, p. 199. [2] K. Ren, C. Wang, and Q. Wang, “Security Challenges for the public Cloud,” IEEE net Comput., vol. 16, no. 1, pp. 69– 73, Jan. 2012. [3] K. Hashizume, N. Yoshioka, and E. B. Fernandez, “Misuse patterns for cloud computing,” in Proceedings of the ordinal Asian Conference on Pattern Languages of Programs - AsianPLoP ’11, Tokyo, Japan, 2011, pp. 1–6. [4] “VMware Horizon seven is that the leading platform for virtual desktops and applications.,” VMWare. [Online]. Available: https://www.vmware.com/products/horizon.html. [Accessed: 29-Apr 2019]. [5] N. Dragoni et al., “Microservices: yesterday, today, and tomorrow,” ArXiv160604036 matter, Jun. 2016. [6] T. Yarygina, “Exploring Microservice Security,” p. 144. [7] G. Nath Nayak and S.GhoshSamaddar,“Differentflavours of Man-In The-Middle attack, consequences and potential solutions,” in 2010 third International Conference on engineering and knowledge Technology, Chengdu, China, 2010, pp. 491–495. [8] S. Jeuris and J. E. Bardram, “Dedicated workspaces: quicker commencement times and reduced psychological feature load in ordered multitasking,” Comput. Hum.Behav., vol. 62, pp. 404–414, Sep. 2016. [9] S. S. Clark, A. Paulos, B. Benyo, P. Pal, and R. Schantz, “Empirical Evaluation of the A3 Environment: Evaluating Defenses Against ZeroDay Attacks,” in 2015 tenth International Conference on convenience, Reliability and Security, Toulouse, France, 2015, pp. 80–89. [10] C. Smutz and A. Stavrou, “Malicious PDF detection exploitation data and structural decisions,”inProceedingsof the twenty eighth Annual portable computer Security Applications Conference on - ACSAC ’12, Orlando, Florida, 2012, p. 239. [11] R. Sandhu, V. Bhamidipati, and Q. Munawer, “The ARBAC97 model for role-based administration of roles,” ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, p. 31. [12] D. R. Kuhn, E. J. Coyne, and T. R. Weil,“AddingAttributes to RoleBased Access management,” IEEE Comput., vol. 43, no. 6, p. 4, 2010. [13] D. Thomsen and E. Bertino, “Network Policy human action exploitation Transactions: The heavy particle Approach,” in Proceedings of the 23nd ACM on conference on Access management Models and Technologies - SACMAT ’18, state capital, Indiana, USA, 2018, pp. 129–136. [14] R. Rosen, “Linux Containers and in addition the long haul Cloud,” p. 85. [15] S. D. Wolthusen, “Security policy human action at the arrangement level in the Windows organisation code package family,” in Seventeenth Annual Computer Security Applications Conference, port of entry, LA, USA, 2001, pp. 55–63. [16] C. Boettiger, “An introduction to working person for duplicatable analysis, with examples from the R setting,” ACM SIGOPS Oper. Syst. Rev., vol. 49, no. 1, pp. 71–79, Jan. 2015. [17] A. Driscoll, Microsoft Windows PowerShell three.0 initial look: a fast, succinct guide to the new and exciting decisions in PowerShell three.0. 2012. [18] B. Chandra, “A technical scan of theOpenSSL ‘Heartbleed’ vulnerability,” p. 18.