Font Size: a A A

Design And Implementation Of Resource Controlled Protection System Based On Desktop Cloud

Posted on:2019-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2348330542991048Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of Internet technology,the technology of virtualization based on cloud computing has become more and more mature.Desktop cloud is a virtual desktop service based on cloud computing technology.Users can accomplish business in a low-cost way through virtual desktop,which has been widely applied.At the same time,with the combination of desktop cloud platform and business requirements,business application platform and business based desktop cloud management platform are also been produced.Therefore,in the process of integration of multiple platforms,it is faced with the problem of different permissions of resource cross platform calls,centralized authentication of resource requests at the bottom layer,and lack of unified controlled protection of transmission channels of different resources.Its essence lies in the urgent need for resource authentication,controlled transmission and unauthorized invocation of resources in the desktop cloud environment.The problem of security protection of resources also restricts the further development of the combination of desktop cloud and business demand.In this paper,a resource controlled protection system based on desktop cloud is designed and implemented to solve the above problems.The work completed in this article mainly includes:1.According to the current separation of service development and business development based on desktop cloud,we analyze the way of resource protection in desktop cloud environment,and point out that the call request for resources is not effectively protected in the development process based on desktop cloud.2.In the process of combining desktop cloud with business applications,based on cross-platform invocation of resources,it is proposed that the controlled protection of resources should not only exist in the underlying environment of desktop cloud,but also be defined as a complete resource protection cycle,which provides a theoretical basis for resource controlled protection system.3.The system uses https encryption system as channel access,make the resources divided into computing resources and data resources.Design token authentication based on PKI for computing resources,propose access control scheme based on Spring Security for data resources,and implement the role of authentication on resource transmission channel scheme based on encryption certificate.4.We evaluate the actual building effect of the system,analyze the application performance of the system by comparing the response time of the original application platform before and after joining the system.Then we evaluate the safety performance of the system by analyzing the controlled protection ability of the system.The system designed and implemented in this paper,provides a solution for resource controlled protection in desktop cloud environment,which provide user's access and call to resources safely.Through the test and analysis,the system effectively improves the controlled protection of the resources under the environment of the desktop cloud and the business application platform.At present,the system has been deployed in practical business applications,which has a strong practical value.
Keywords/Search Tags:desktop cloud, computing resources, data resources, controlled protection, authentication
PDF Full Text Request
Related items