Font Size: a A A

The Construction And Application Of University Network Security Model In Cloud Environment

Posted on:2019-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:H F JiaFull Text:PDF
GTID:2428330596455990Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of computer technology has penetrated into all areas of people 's work and life.At the same time,along with the rapid development of Internet technology,universities have become the biggest beneficiaries of the newest development of it.University laboratories are used as an important place for schools to conduct teaching and scientific research.Based on the interconnection of Internet technologies,the PCs in the laboratory have used the software to clone and share data in the network clone and pass-through manner,which has greatly facilitated the management and maintenance of laboratory managers.However,with the application of cloud computing technology,the traditional laboratory construction and management model no longer has an advantage.Combined with the development of cloud desktop technology,a number of advantages have attracted the attention of university administrators,such as operational efficiency,convenient management,low energy consumption,and convenient hardware and software upgrades and maintenance.It is an inevitable trend to build cloud experimental training center laboratory with cloud desktop technology.In general,private universities are not large-scale,which funds are not very strong,but they can give full play to their decision-making advantages and apply cloud technology in the construction of laboratories to obtain advantages that traditional computer rooms do not have.Cloud technology covers a wide range of areas,containing many branches,and its essence is virtualization.Cloud desktop,cloud storage,server cloud and other technologies can be applied in university laboratories.On the basis of the construction of cloud desktop,the article is to study the characteristics scheme,with the combination of author's daily work.the characteristics of cloud desktop,desktop virtualization and cloud data storage,cloud desktop build and configuration,cloud desktop application in teaching management,and cloud desktop security problems and security model building scheme.In the process of building the cloud desktop,through the actual research and analysis,a functional demand text on the cloud desktop was generated out.We monitored the virtualization resources and data of cloud server via remote control protocol,and took multi-demo login to test and apply cloud desktop operation.Through researching the feedback information provided by teachers and students in the process of using the cloud desktop,we referred to the cloud service background management log,and completed the construction of the security model framework and specific model building work according to the needs and existing security issues.The application results show that the establishment of cloud desktop has certain advantages in teaching resource utilization and management.Improve the utilization and management of resources.Through the establishment of security models,the day-to-day security problems of cloud desktops can be intuitively reflected.Administr ators can then form a set of security documents to improving security management strategies.Providing effective technical support for the introduction of relevant cloud security software and hardware design in the future.The content of the full-text study is practical,full of content and has a certain frontier.And it will be the focus of future research on cloud computing,feasible and realistic for us to conduct cloud security research.
Keywords/Search Tags:Internet, Cloud Computing, Cloud Desktop, Firewall, Cloud Security Model
PDF Full Text Request
Related items