Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 399-401.

Previous Articles     Next Articles

Research on Virtual Desktop System Authentication Method Based on CPK

JU Lei, CHI Ya-ping, LIU Qiao-yu and FENG Hua-min   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Virtual desktop technology separates the users and the resources,contributing to terminal security solutions and improvement of resource utilization.It also provides the convenience for the centralized management of resources,but the introduction of virtualization technology also makes unique safety risks exist in virtual desktop.Identity authentication is the key technology to solve the problem of virtual desktop security problems and also is the foundation of more complex and fine-grained security protective measures.This article first described the basic principle of the combined public key(CPK) cryptosystems,and then according to the characteristics of the virtual desktop,based on CPK authentication methods was proposed under applying the virtual resources and using virtual resources two scenarios.Through the federated identity,the binding of the user and the virtual machine comes ture.At last,the safety and performance analysis of the proposed authentication method was given.

Key words: Virtual desktop,Identity authentication,Combined public key,Federated identity

[1] 郑志勇,吕远大,王毅.虚拟桌面系统应用安全性分析与对策[J].网络安全技术与应用,2012,0(10):50-52
[2] 孙宇,陈煜欣.桌面虚拟化及其安全技术研究[J].信息安全与通信保密,2012,33(6):87-88,2
[3] 宁芝,方正.涉密信息系统虚拟化安全初探[J].保密科学技术,2012,2(2):70-74
[4] 南湘浩.CPK密码体制与网际安全[M].北京:国防工业出版社,2008
[5] 南湘浩.CPK组合公钥体制(v8.0)[J].信息安全与通信保密,2013,4(3):39-44
[6] 周加法,马涛,李益发.PKI、CPK、IBC性能浅析[J].信息工程大学学报,2005,6(3):26-31
[7] 王嘉林.基于PKI和CPK的大规模网络认证方案的对比分析[J].保密科学技术,2012,6:44-49
[8] 汤维.基于组合公钥密码体制的云安全研究[D].武汉:华中科技大学,2011
[9] 马宇驰,赵远,邓依群,等.基于CPK的可信平台用户登录认证方案[J].计算机工程与应用,2010,6(1):90-94

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!