Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 399-401.

Previous Articles     Next Articles

Research on Virtual Desktop System Authentication Method Based on CPK

JU Lei, CHI Ya-ping, LIU Qiao-yu and FENG Hua-min   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Virtual desktop technology separates the users and the resources,contributing to terminal security solutions and improvement of resource utilization.It also provides the convenience for the centralized management of resources,but the introduction of virtualization technology also makes unique safety risks exist in virtual desktop.Identity authentication is the key technology to solve the problem of virtual desktop security problems and also is the foundation of more complex and fine-grained security protective measures.This article first described the basic principle of the combined public key(CPK) cryptosystems,and then according to the characteristics of the virtual desktop,based on CPK authentication methods was proposed under applying the virtual resources and using virtual resources two scenarios.Through the federated identity,the binding of the user and the virtual machine comes ture.At last,the safety and performance analysis of the proposed authentication method was given.

Key words: Virtual desktop,Identity authentication,Combined public key,Federated identity

[1] 郑志勇,吕远大,王毅.虚拟桌面系统应用安全性分析与对策[J].网络安全技术与应用,2012,0(10):50-52
[2] 孙宇,陈煜欣.桌面虚拟化及其安全技术研究[J].信息安全与通信保密,2012,33(6):87-88,2
[3] 宁芝,方正.涉密信息系统虚拟化安全初探[J].保密科学技术,2012,2(2):70-74
[4] 南湘浩.CPK密码体制与网际安全[M].北京:国防工业出版社,2008
[5] 南湘浩.CPK组合公钥体制(v8.0)[J].信息安全与通信保密,2013,4(3):39-44
[6] 周加法,马涛,李益发.PKI、CPK、IBC性能浅析[J].信息工程大学学报,2005,6(3):26-31
[7] 王嘉林.基于PKI和CPK的大规模网络认证方案的对比分析[J].保密科学技术,2012,6:44-49
[8] 汤维.基于组合公钥密码体制的云安全研究[D].武汉:华中科技大学,2011
[9] 马宇驰,赵远,邓依群,等.基于CPK的可信平台用户登录认证方案[J].计算机工程与应用,2010,6(1):90-94

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .