期刊文献+

一种基于本地域的虚拟桌面架构设计与性能测试 被引量:2

Design and performance test of virtual desktop infrastructure based on local domain
下载PDF
导出
摘要 针对目前由于虚拟桌面架构搭建不合理而导致的系统安全风险大、兼容性和拓展性不足等问题,对某图书馆机房的虚拟桌面框架结构及安全控制方案进行研究。在云计算环境下提出设计一种基于本地域的虚拟桌面安全架构,并对其运行模式、网关设计与交互、以及安全应用控制策略进行深入分析。同时,在该框架控制环境下,对所构建的模型进行性能测试和结果分析。研究结果表明:所构建的虚拟桌面架构可减少桌面使用过程中的额外消耗,启动时间比常规架构缩短了60%以上,所采用的网络拓扑结构以及三级访问控制机制,可有效降低系统安全风险,能够适应不同应用场景的安全需求,为高校机房安装部署虚拟化平台提供参考。 Aiming at the problems of system security risk,compatibility and expansibility caused by unreasonable construction of virtual desktop architecture,the virtual desktop architecture and security control scheme of the library room was studied in this paper.A virtual desktop architecture based on local domain was proposed in the cloud computing environment and its operation mode,gateway design,interaction,and security application control strategy were analyzed in depth.Furthermore,the performance test and result analysis of the model were carried out under the control environment of the framework.The research results show that the virtual desktop architecture could reduce the extra consumption in the process of using the desktop,and the start-up time was more than 60%shorter than the conventional architecture.The network topology and threelevel access control mechanism could reduce the system security risk effectively to adapt the security requirements of different application scenarios,and provide reference for the installation and deployment of the virtualization platform in university computer rooms.
作者 翟莹昕 历颖 赵新倩 ZHAI Yingxin;LI Ying;ZHAO Xinqian(Changchun University of Science and Technology,Changchun 130000,China;Aviation University Air Force,Changchun 130000,China;Rocket Sergeant Major School,Qingzhou 262500,China)
出处 《中国测试》 CAS 北大核心 2020年第6期116-120,共5页 China Measurement & Test
基金 国家十三五重点研发计划项目(2017YFD0701103)。
关键词 虚拟桌面 安全架构 云计算 图书馆机房 virtual desktop security architecture cloud computing library room
  • 相关文献

参考文献5

二级参考文献19

  • 1吴敬征,丁丽萍,王永吉.云计算环境下隐蔽信道关键问题研究[J].通信学报,2011,32(9A):184-203.
  • 2Ristenpart T,Tromer E,Shacham H,et al.Hey,You,Get Off of My Cloud:Exploring Information Leakage in Third-party Compute Clouds[C]//Proceedings of the16th ACM Conference on Computer and Communications Security.[S.l.]:ACM Press,2009:199-212.
  • 3Jones S T,Arpaci-Dusseau A C,Arpaci-Dusseau R H.Antfarm:Tracking Processes in a Virtual Machine Environment[C]//Proceedings of USENIX Annual Technical Conference.Berkeley,USA:[s.n.],2006:1-14.
  • 4Sailer R,Jaeger T,Valdez E,et al.Building a MAC Based Security Architecture for the Xen Opensource Hypervisor[C]//Proceedings of the21st Annual Computer Security Applications Conference.[S.l.]:IEEE Press,2005:285-294.
  • 5Payne B D,Carbone M,Lee W.Secure and Flexible Monitoring of Virtual Machines[C]//Proceedings of the23rd Annual Computer Security Applications Conference.Piscataway,USA:IEEE Press,2007:386-397.
  • 6Jiang Xuxian,Wang Xinyuan,Xu Dongyan.Stealthy Malware Detection Through VMM-based“out-of-thebox”Semantic View Reconstruction[C]//Proceedings of the14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:128-138.
  • 7Badger L,Sterne D F,Sherman D L,et al.A Domain and Type Enforcement UNIX Prototype[J].USENIX Computing Systems,1996,9(1):47-83.
  • 8Openstack API Complete Reference[EB/OL].(2014-01-30).http://api.openstack.org/api-ref-guides/bk-apiref.pdf.
  • 9Xen Management API v1.0.6[EB/OL].(2008-12-07).http://downloads.xen.org/Wiki/Xen API/xenapi-1.0.6.pdf.
  • 10Open Stack Compute Administration Guide[EB/OL].(2013-04-13).http://docs.openstack.org/grizzly/openstack-compute/admin/content/index.html.

共引文献68

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部