浏览全部资源
扫码关注微信
中南大学信息科学与工程学院,湖南 长沙 410083
[ "王斌(1973-),男,山西大同人,博士,中南大学教授,主要研究方向为透明计算、软件工程。" ]
[ "李伟民(1988-),男,湖南邵阳人,中南大学博士生,主要研究方向为云计算和透明计算。" ]
[ "盛津芳(1971-),女,湖南长沙人,中南大学副教授,主要研究方向为透明计算和大数据。" ]
[ "肖斯诺(1993-),男,湖南娄底人,中南大学硕士生,主要研究方向为云计算、透明计算。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
王斌, 李伟民, 盛津芳, 等. TCCL:安全高效的拓展云桌面架构[J]. 通信学报, 2017,38(Z1):9-18.
Bin WANG, Wei-min LI, Jin-fang SHENG, et al. TCCL:secure and efficient development of desktop cloud structure[J]. Journal on communications, 2017, 38(Z1): 9-18.
王斌, 李伟民, 盛津芳, 等. TCCL:安全高效的拓展云桌面架构[J]. 通信学报, 2017,38(Z1):9-18. DOI: 10.11959/j.issn.1000-436x.2017229.
Bin WANG, Wei-min LI, Jin-fang SHENG, et al. TCCL:secure and efficient development of desktop cloud structure[J]. Journal on communications, 2017, 38(Z1): 9-18. DOI: 10.11959/j.issn.1000-436x.2017229.
在传统云桌面系统的基础上,结合透明计算模式,提出了一种安全增强、存储高效的云桌面系统架构:TCCL(transparent computing-based cloud)。将透明计算理论中提出的“算存分离、流式加载”思想应用于云桌面系统,将对安全威胁的防御部署在云主机层次之下,增强了云桌面系统中云主机的系统文件与数据这一层面的安全性,并提升了云主机文件存储效率。
A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud)
which was designed under the guidance of transparent computing
was proposed.TCCL applied the method
separating calculation and storage
loading in a block streaming way which was proposed in the transparent computing theory
to the cloud desktop system
and deployed the defense module of security threats under the cloud VM (virtual machine).As a result
the TCCL could improve the security level on the cloud VMs’ system files and data files
and could optimize the cloud virtual machines' storage efficiency.
DEBOOSERE L , VANKEIRSBILCK B , SIMOENS P , et al . Cloud-based desktop services for thin clients [J ] . IEEE Internet Computing , 2012 , 16 ( 6 ): 60 - 67 .
ZISSIS D , LEKKAS D . Addressing cloud computing security issues [J ] . Future Generation Computer Systems , 2012 , 28 ( 3 ): 583 - 592 .
YU S , WANG C , REN K , et al . Achieving secure,scalable,and fine-grained data access control in cloud computing [C ] // Conference on Information Communications . 2010 : 1 - 9 .
DESHPANDE P , SHARMA S C , KUMAR P S . Security threats in cloud computing [C ] // International Conference on Computing,Communication & Automation . 2015 .
林闯 , 苏文博 , 孟坤 , 等 . 云计算安全:架构、机制与模型评价 [J ] . 计算机学报 , 2013 , 36 ( 9 ): 1765 - 1784 .
LIN C , SU W B , MENG K , et al . Cloud computing security:architecture,mechanism and modeling [J ] . Chinese Journal of Computers , 2013 , 36 ( 9 ): 1765 - 1784 .
DASILVA D A , LIU L , BESSIS N , et al . Enabling green it through building a virtual desktop infrastructure [C ] // 2012 Eighth International Conference on Semantics,Knowledge and Grids (SKG) . 2012 : 32 - 38 .
DAWOUD W , TAKOUNA I , MEINEL C . Infrastructure as a service security:challenges and solutions [C ] // 2010 the 7th International Conference on Informatics and Systems (INFOS) . 2010 : 1 - 8 .
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing [J ] . International Journal of Computer Science and Mobile Computing , 2014 , 3 ( 3 ): 707 - 711 .
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing [J ] . International Journal of Computer Science and Mobile Computing , 2014 , 3 ( 3 ): 707 - 711 .
项国富 , 金海 , 邹德清 , 等 . 基于虚拟化的安全监控 [J ] . 软件学报 , 2012 , 23 ( 8 ): 2173 - 2187 .
XIANG G F , JIN H , ZHOU D Q , et al . Virtualization-based security monitoring [J ] . Journal of Software , 2012 , 23 ( 8 ): 2173 - 2187 .
HUSSEIN N H , KHALID A . A survey of cloud computing security challenges and solutions [J ] . International Journal of Computer Science and Information Security , 2016 , 14 ( 1 ): 52 .
王晓聪 , 张冉 , 黄赪东 . 渗透测试技术浅析 [J ] . 计算机科学 , 2012 ,( S1 ): 86 - 88 .
WANG X C , ZHANG R , HUANG C D . Penetration test techniques shallow [J ] . Computer Science , 2012 ,( S1 ): 86 - 88 .
ZHANG Y , YANG L T , ZHOU Y , et al . Information security underlying transparent computing:impacts,visions and challenges [J ] . Web Intelligence & Agent Systems , 2010 , 8 ( 2 ): 203 - 217 .
WANG G , LIU Q , XIANG Y , et al . Security from the transparent computing aspect [C ] // Networking and Communications International Conference on Computing . 2014 : 216 - 220 .
AYRES J , FLANNICK J , GEHRKE J , et al . Sequential pattern mining using a bitmap representation [C ] // Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining . 2002 : 429 - 435 .
0
浏览量
574
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构