Font Size: a A A

Data Security Analysis And Design Of Desktop Virtualization Envirenment

Posted on:2017-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q MoFull Text:PDF
GTID:2428330590468318Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Desktop virtualization is a branch of virtualization technology development,will be applied in the information construction process more widely.Compared to traditional general terminal,Desktop virtualization will bring much technology advantage like date security,use convenience and so on.However,Application process of the Desktop virtualization will bring some problems of data security as well,for example,administrator permissions are so high that they can privately access user data without permission.Besides,Desktop virtualization itself exists security risks in date storage,date transmission,and date access.In the designing of date security protection of Desktop virtualization environment,measures of date security protection should be strengthened to make sure date security of users.This paper analysis risks and hidden dangers existing in date security of Desktop virtualization based on introducing the technology related to Desktop virtualization and date security,and provides overall security architecture design of technology and management both in Desktop virtualization.It designs date security mechanism and protection measures of Desktop virtualization environment systematically to ensure date security of Desktop virtualization environment from some sides such as identity authentication,access control,date encryption,integrity protection,safety audit,security transmission,administrator permissions management and so on.In the meantime,the paper brings in encryption algorithm SM4 and digest algorithm MD5 to realize encryption and integrity protection of user date and Virtual Machine Image,snapshot,template,and has verified validity and reasonability of the algorithm by experiment testing.Achievement of the paper is date security protection measures and method system,providing reference to date security protection of Desktop virtualization environment.
Keywords/Search Tags:Desktop Virtualization, Data Security, Data Encryption, Integrity protection, SM4, MD5
PDF Full Text Request
Related items