Font Size: a A A

The Research And Implementation Of Secure Desktop System Based On Virtualization Technology

Posted on:2016-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:J XuFull Text:PDF
GTID:2298330467993108Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, as the rapid development of information technology, the technology of hardware and software related to computer has been widely used in many industries. But as the computer technology facili-tates the people’s production and life, the problem of security has been paid more and more attention, and some secure protection measures gradually emerge such as data encryption, anti-virus software, firewall and so on. Although these security mechanisms solved the existence of certain aspects of computer system security problems, but these all be-long to a category of application software, the security of security mech-anisms still rely on the underlying operating system. Therefore, as the platform of application software, operating system security is the top pri-ority in the work of information security defense.The current operating systems widely use centralized management architecture. So if one component of operating system is corrupted, it will affect the entire system and result in the system not working well. To solve this problem, this paper studies and implements a new operating system architecture model. By means of the isolated environment pro-vided by virtualization technology to achieve security isolation between components, application program, user data of the operating system. By using this way to enhance the overall safety of the operation system. In the implementation of the system, using the hardware virtualization tech-nique and open source projects ensures the efficiency of the system and the quality of source code. Finally, by conducting simulated attack test and performance evaluation experiments, this paper verifies that this sys-tem can ensure the security of the operating system on the basis of not affecting the system performance.
Keywords/Search Tags:security mechanism, operating system security, securityisolation, virtualization technology
PDF Full Text Request
Related items