Font Size: a A A

Researeh And Implement Of Information Centralize Control Technology Based On Cloud Desktop

Posted on:2016-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:J Y HuangFull Text:PDF
GTID:2348330509960643Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of service networking and polular application of mobile storage devices,the environment of internal network is becoming more and more complex and the risk of data leakage gradually increased.As the information leakage from removable storage devices and internal network has become the main way of information leakage,the research on information centralized control for internal network has become the important object of information security research. At present, many domestic and foreign research institutions and enterprises have carried out a lot of meatures and products for information centralized control,but these meatures and products are not so good,they brings lots of incompatibilities with office system and inconvenience to daily work.In this article,we have researched to design and implement an information centralized control model in order to solve the problems encountered in information centralized control of internal network.The main work and contributions are as follows:1.Design and implement an information centralized control model,in order to effectively achieve the mutual operation in Multi-level security network environment.2.Implement a program control mechanism based on Hook technology,it can intercept and verify the internal processes in cloud desktop and prevent security threats to the cloud desktop from unwanted code.3.Design and implement a method of self document decryption and approve output based on LDAP role permissions and fine granularity authority transfer and other technologies.It can solve the data isolation problem between cloud desktop and local terminal.4.Implement the system to the above researches,the results of the operation and the test had showed the effectiveness of this method.
Keywords/Search Tags:Information Centralized Control, Cloud Desktop, White List, Self Decryption, Approve Output
PDF Full Text Request
Related items