Font Size: a A A

Research And Design Of Using Real Name Certificate And Transparent Encryption Method To Solve Virtual Desktop System Security Problem

Posted on:2015-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z S WeiFull Text:PDF
GTID:2298330467956842Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the case that the application of the virtual desktop technology increases day by day andits function is more powerful, the security issue has become a major bottleneck for the furtherdevelopment of desktop virtualization, unable to meet customer demand for security. How toensure the safety of desktop virtualization and let users can rest assured use it is particularlyimportant. Desktop virtualization technology enables users to access data center anywhereand anytime via the network, obviously, if there is no safety measures are taken in the client,the security of user account is not guaranteed; due to the data sharing features of virtualdesktop, although brought convenience to the user, but also bring threat to the safety of thedata center. To minimize the system vulnerabilities is the research purpose of this project.A virtualized desktop system mainly consists of a thin client, telnet protocol and the datacenter server, this paper ensures that the virtual desktop system security by increasingsecurity measures in the thin client and server. In this paper, after studying the technology ofvirtualization and desktop virtualization, aiming at the security hidden danger existing in thesystem of desktop virtualization, namely that the client easily attacked, causing the illegallogin; the server due to the nature of resource sharing of desktop virtualization system, easy tocause the leakage of data. The article presents a method based on a combination of real-nameauthentication and digital certificates transparent encryption, this method firstly to conduct thereal-name authentication when users login, in order to ensure the credibility of the registrant’strue identity, to prevent the illegal entry of other users. Secondly, the data center totransparently encrypt the data to prevent the users borrow their legal status to leak theimportant data deliberately caused by resource sharing of virtualization technology, so as toprevent the leakage of the internal data in the system environment.In order to verify the effectiveness of the proposed security system based on the methodproposed by this paper, this article set up their own virtual desktop environment for testing,experimental results show that the proposed system can complete a normal login, preventingunauthorized users log on, while also properly implement transparent encryption of data,prevents the data leakage by legitimate users.
Keywords/Search Tags:Desktop Virtualization, Real-name Certificate, Transparent Encryption
PDF Full Text Request
Related items