Netinfo Security ›› 2018, Vol. 18 ›› Issue (2): 27-33.doi: 10.3969/j.issn.1671-1122.2018.02.004

• Orginal Article • Previous Articles     Next Articles

Computing Resource Control and Protection Scheme Based on Desktop Cloud

Jian WANG1, Chang LI1(), Lei HAN2, Zhen HAN1   

  1. 1. Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China
    2. Troops 66019 of PLA, Beijing 100042, China
  • Received:2017-12-19 Online:2018-02-20 Published:2020-05-11

Abstract:

Desktop cloud is commonly known as a type of virtual desktop which towards cloud computing to implement. At the same time, with the combination of desktop cloud platform and business requirements, business application platform and business based desktop cloud management platform are also been produced. However, the vulnerability of the desktop cloud environment and the underlying access characteristics of computing resources, not only make the application environment based on the desktop cloud lack of effective control and protection for the invoking of computing resource, but also make the computing resource face the problems that need to be used certified and cannot be invoked without authorization. Aiming at the above problems, this paper designs a desktop cloud-based computing resource controlled protection scheme, which made HTTPS encryption as the resource request access, and used PKI token based on user information, authenticated the user request and encrypted the communication content, controlled and protected the computing resources according to the authentication mechanism and the role privilege. The scheme protects users from secure access to computing resources. After testing, the system effectively improves the controlled protection of computing resources in desktop cloud.

Key words: desktop cloud, computing resource, controlled protection, authentication

CLC Number: