期刊文献+

虚拟云桌面的访问控制算法研究 被引量:7

Research on Access Control Algorithm of Virtual Cloud Desktop
下载PDF
导出
摘要 针对云桌面访问控制的问题,提出一种基于统计学的虚拟云桌面访问控制算法,对虚拟云桌面数据进行加密处理并对加密的过程进行分析,在此基础上,通过建立描述并发用户负载访问虚拟云桌面的排队论模型,并分析了基于统计学的虚拟云桌面访问控制算法过程,从而完成访问控制,在保证用户访问需求的同时,最大程度地利用虚拟云桌面资源.实验证明,所提访问控制算法能够有效保证虚拟云桌面数据的安全,提高了访问控制的响应时间,且访问控制的精度较高. For the cloud desktop access control problems,put forward a virtual cloud desktop access control algorithm based on statistics,the virtual desktop cloud data encryption processing and the process of the encryption is analyzed,on this basis,through the establishment of virtual cloud desktop access concurrent user load of queuing theory model,and analyses the virtual cloud desktop access control algorithm based on statistical process,so as to complete the access control,in that users access requirements at the same time,using virtual desktop cloud resources to the greatest extent.Experiments show that the proposed access control algorithm can effectively guarantee the safety of the virtual desktop cloud data and improve the response time of the access control,and access control precision is higher.
作者 朱一茹
出处 《微电子学与计算机》 CSCD 北大核心 2017年第11期114-118,共5页 Microelectronics & Computer
关键词 虚拟云桌面 访问控制 算法研究 virtual cloud desktop access control algorithm research
  • 相关文献

参考文献10

二级参考文献59

  • 1苏开乐,丁德成.关于事实反驳与一般假说的开放逻辑[J].科学通报,1994,39(16):1441-1443. 被引量:1
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4王修君,沈鸿.一种基于增量学习型矢量量化的有效文本分类算法[J].计算机学报,2007,30(8):1277-1285. 被引量:14
  • 5陆嘉恒.Hadoop实战[M].2版.北京:机械工业出版社,2012.
  • 6Vaquero L, Rodero Marino L, Cacerce J, et al. A break in the clouds., towards a cloud definition J]. SIGCOMM Computer Com- munication Review, 2009, 39 (1) . 50 - 55.
  • 7Wan Z G, Liu J, Deng R H. HASBE: A Hierarchical Attribute- Based Solution for Flexibleand Scalable Access Control in Cloud Computing [J]. IEEE Transactions on Information Forensics and Security, 2012, 7 (2): 743-754.
  • 8Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [A]. INFO- COM, 2010 Proceeding IEEE. San Diego, CA: IEEE [C]. Con- ference Publications, 2010:534 - 542.
  • 9Hota C, Sanka S, Rajaraja M N, et al. Capability-based crypto- graphic Data Access Control in cloud computing [J]. International Journal of Advanced Networking and Applications, 2011, 3 (3) : 1152 - 1161.
  • 10Li X H, Lu R X, Lin X D, et al. Ciphertext policy attribute based eneryption with efficient revocation [EB/OL]. 2012-09- 25]. http: //bber. uwaterloo. Ca/- x271iang/papers/abe% 20with%20revocati on. pdf.

共引文献104

同被引文献39

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部