scholarly journals An analysis of Approaches for Desktop Virtualization and Challenges

Author(s):  
Rupesh Kumar ◽  
Arun Kumar Yadav ◽  
H N Verma

In the Information Technology world, cloud computing technology offering unlimited amount of IT resources and services to end users over the internet on pay-per-use basis. End users are accessing the cloud services on their mobile or personal computers. Service providers are upgrading their services very frequently to enhance the services, and to use their upgraded services, end users are also required to update the specification of their devices. But it will be very costly for the end users to upgrade their devices for high specification to use the enhanced services. Desktop Virtualization is an extensive technology of cloud services. It is the new concept, in which users can access the virtual desktop of required specifications, software and operating system on their old devices anytime and anywhere. With the help of desktop virtualization, users will be benefited by avoiding the cost of frequent upgradation of mobile or personal computer system. Desktop virtualization technology is proving to be a boon for large and small organizations who have to upgrade their computer system with new technology, which is a very costly and challenging process. Desktop virtualization avoids upgrading the hardware of the client machine repeatedly. It allows us to access all applications and data at a low cost on our old machine. This paper presents the comparative analysis of various approaches for desktop virtualization and various challenges which required the solution. Analysis presented in paper has been done based on various performance parameters which will provide the end users low-cost cloud services and best performance on their mobile or personal computers.

2021 ◽  
Vol 4 (1) ◽  
pp. 29-38
Author(s):  
Abdel Rahman Alzoubaidi ◽  
◽  
Mutasem Alzoubaidi ◽  
Ismaiel Abu Mahfouz ◽  
Taha Alkhamis ◽  
...  

Currently, universities have rising demands to apply the incredible recent developments in computer technology that support students to achieve skills necessary for developing applied critical thinking in the contexts of online society. Medical and engineering subjects’ practical learning and education scenarios are crucial to attain a set of competencies and applied skills. These recent developments allow sharing and resource allocation, which brings savings and maximize use, and therefore offer centralized management, increased security, and scalability. This paper describes the implantation of Virtual Desktop Infrastructure (VDI) to access the virtual laboratories that bring efficient use of resources as one of Al Balqa Applied University’s (BAU) Private Cloud services. The concept of desktop virtualization implements the sharing of capabilities utilizing legacy machines, which reduces the cost of infrastructure and introduces increased security, mobility, scalability, agility, and high availability. Al Balqa Applied University uses the service extensively to facilitate in/off-campus learning, teaching, and administrative activities and continue performing their work and education functions remotely to cope with the COVID-19 pandemic.


Author(s):  
Manasa Jonnagadla

Abstract: Cloud computing provides streamlined tools for exceptional business efficiency. Cloud service providers typically offer two types of plans: reserved and on-demand. Restricted policies provide low-cost long-term contracting, while order contracts are expensive and ready for short periods. Cloud resources must be delivered wisely to meet current customer demands. Many current works rely on low-cost resource-reserved strategies, which may be under- or over-provisioning. Resource allocation has become a difficult issue due to unfairness causing high availability costs and cloud demand variability. That article suggests a hybrid approach to allocating cloud services to complex customer orders. The strategy was built in two stages: accommodation stages and a flexible structure. By treating each step as an optimization problem, we can reduce the overall implementation cost while maintaining service quality. Due to the uncertain nature of cloud requests, we set up a stochastic Optimization-based approach. Our technique is used to assign individual cloud resources and the results show its effectiveness. Keywords: Cloud computing, Resource allocation, Demand


2015 ◽  
Vol 3 (1) ◽  
pp. 59-70
Author(s):  
James Ngeru ◽  
Tridip Kumar Bardhan

Cloud computing is a significant paradigm shift in information technology (IT) service offerings that has been receiving enormous attention in academic and IT industry. Recent years has seen exponential growth in cloud use adoption, where many organizations are moving their IT resources into cloud due to flexibility and low-cost. However, on account of rapid innovation and growth in cloud technologies and service providers, selecting the right cloud services, provider and strategy is becoming increasing a common challenge to organization during cloud adoption. In an attempt to address this challenge, we propose application of Delphi Analytic Hierarchy Process (DAHP) method in selecting cloud deployment model. There are several cloud deployment models and organizations must identify the right model that best suits their business needs. The proposed approach facilitates a collaborative decision making process, consisting a number of decision makers whom, with consensus facilitated by the DAHP process, identifies feasible approaches, decision making factors and ultimate selection of a cloud deployment model alternative that is based on organizational business needs and capabilities. The DAHP process is illustrated by a means of a case study. The DAHP result analysis, as was illustrated in the case study, helps in explaining and justifying the choice selected as the best cloud deployment model.


Author(s):  
Aleksandar Karadimce ◽  
Danco P. Davcev

Service providers are in constant search for appropriate tools that will help them to determine and measure the satisfaction of end-users. In terms of efficient utilization of network resources, they are constantly striving to guaranty the quality, availability, and responsibilities of the directly measurable parameters with the service-level agreements (SLA). The introduction of cloud computing technology aims to provide stable, reliable and encapsulated environment for users who use different types of mobile and desktop devices to simultaneously access shared resources that are available anywhere and at any time. However, what is lacking in this direction is an assessment of how much the end-users themselves are satisfied with the cloud-based services offered. This research has considered different cloud computing service categories, some of them have been extensively used and others are still under development. These services use a variety of organizational and infrastructure access models, making them easily accessible and practical for work. The very nature of cloud computing-based services allows dynamic allocation of resources based on end-user needs, which makes the process of evaluating the offered services complex. This research will deliver the most appropriate model for assessing the impacts of objective and subjective factors by using the Bayesian networks. The dynamic nature of these networks allows flexibility and adaptation to measure the impact of various influencing factors. The main contribution of this research is the introduction of a metrics for assessing the user satisfaction of the particular type of offered service. In that direction, this research has provided improved Quality of Experience (QoE) model for measuring and assessing the perception of the multimedia cloud-based services quality among end-users.  


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


In this challenging era of technology where cloud computing has expanded its application wings in almost all areas. From individual end-users, small scale business to large organizations. All of them are now free from the maintenance, updating the software and taking the advantage of low-cost investments just by hiring the services and required applications from the cloud rather than building and maintaining the same. Though these advantages are creating much demand for cloud services with more required features at the same time, a challenge comes on the other side from attacks on client's data in the cloud. It becomes more difficult for the investigator to carry out the investigation during cyber-attacks on the cloud. During the attacks, there is a need for a quick response when certain anti-forensics is carried out to mislead the investigators. They may lead to waste of time, efforts, and spent cost. This paper presents a unique methodology to mitigate anti-forensics in a cloud with the effective usage of the relevant graphs. With the effective usage of graphs by the generation of attack, evidence and anti-forensic graphs helpful for the investigator to understand the cause and to carry out relatively countermeasures right way without being deviated by the anti-forensics.


Electronics ◽  
2021 ◽  
Vol 10 (20) ◽  
pp. 2493
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani ◽  
Syed Sajid Ullah ◽  
Saddam Hussain

Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


2020 ◽  
Vol 13 (5) ◽  
pp. 1008-1019
Author(s):  
N. Vijayaraj ◽  
T. Senthil Murugan

Background: Number of resource allocation and bidding schemes had been enormously arrived for on demand supply scheme of cloud services. But accessing and presenting the Cloud services depending on the reputation would not produce fair result in cloud computing. Since the cloud users not only looking for the efficient services but in major they look towards the cost. So here there is a way of introducing the bidding option system that includes efficient user centric behavior analysis model to render the cloud services and resource allocation with low cost. Objective: The allocation of resources is not flexible and dynamic for the users in the recent days. This gave me the key idea and generated as a problem statement for my proposed work. Methods: An online auction framework that ensures multi bidding mechanism which utilizes user centric behavioral analysis to produce the efficient and reliable usage of cloud resources according to the user choice. Results: we implement Efficient Resource Allocation using Multi Bidding Model with User Centric Behavior Analysis. Thus the algorithm is implemented and system is designed in such a way to provide better allocation of cloud resources which ensures bidding and user behavior. Conclusion: Thus the algorithm Efficient Resource Allocation using Multi Bidding Model with User Centric Behavior Analysis is implemented & system is designed in such a way to provide better allocation of cloud resources which ensures bidding, user behavior. The user bid data is trained accordingly such that to produce efficient resource utilization. Further the work can be taken towards data analytics and prediction of user behavior while allocating the cloud resources.


Sign in / Sign up

Export Citation Format

Share Document