The cloud computing is emerging need for the
user’s computing and storage. As the users uses different
computing devices(mobile or fixed),they requires reliable,
secure and fast computing technologies. This paper illustrates
the use of the virtualized cloud resources for both the mobile
and fixed user computing. The virtualization technique is used
for providing the reliable and secure computing power of the
different resources as network, desktop, processing, server etc.
Radhika R. Nawabasi : S. M. D. Bharti college, Arni, MS. India.
Dr. V. M. Thakre : SGB Amravati University, Amravati. MS. India.
Dr. U. S. Junghare : Brijlal Biyani Science College, Amravati. MS. India.
In this paper we see that the virtualization of different
resources like display, desktop, network, platform and
server are done to increase processing time, resource
utilization, battery capacity of thin clients and to reduce
interaction delay and power consumption of the user
 ShridharS, SathishG, RajaG, SumalathaRamchadran,
“Adaptive Display Virtualization And Dataflow
Model Selection (ADVADAMS) for Reducing
Interaction Latency in Thin Clients.”, 2012, IEEE.
 NiranjanaPadmanabhan, bijolin Edwin E, ”An
Architecture for Providing Security to Cloud
Resources”, In International conference on Emerging
Technology Trends (ICETT),published by
 ManelBourguiba, KhaldounAl Agha,
KamelHaddadou,”Improvingnetwork performance in
virtual mobile clouds”.
 S. J. Mohana, M.Saroja,M.Venkatachalam,”Key
infrastructure elements for cloud computing”,in
International journal of computational engineering
 Minsung Jang, Karsten Schwan,”STRATUS:
Assembling virtual platforms from Device Clouds”,
in IEEE 4thinternational conference on cloud
computing, 2011, page no-476-483.
 Guangda Lai, HuaAong,Xiaola Lin, ”A Service Base
lightweight Desktop Virtualization system” in
International conference on service Science,2011.
Mendis.”Next Generation Multi-Tenant
Virtualization Cloud Computing Platform”, in
ICACT,13-16 feb,2011.page no.405-410.
 Anna Tazanakaki,MarkosP. Anastasopoulos,
Georgios S. Zervas, BijanRahimzadehRofee,
RezaNejabati, DimitraSimeonidou.”Virtualization of
heterogeneouswireless-optical network and IT
infrastructure in support of cloud and mobile cloud
service. “, In IEEE communicating magazine, Aug
 Yasir Ahmed Hamaza, Marwan Dahar Omar, ”Cloud
Computing Security: Abuse and Nefarious use of
Cloud Computing.”, in International Journal of
research,volume.03,Issue.6, June 2013.
All rights reserverd @ IJCSN International Journal www.IJCSN.org