Bin WANG, Wei-min LI, Jin-fang SHENG, et al. TCCL:secure and efficient development of desktop cloud structure[J]. Journal on Communications, 2017, 38(Z1): 9-18.
DOI:
Bin WANG, Wei-min LI, Jin-fang SHENG, et al. TCCL:secure and efficient development of desktop cloud structure[J]. Journal on Communications, 2017, 38(Z1): 9-18. DOI: 10.11959/j.issn.1000-436x.2017229.
TCCL:secure and efficient development of desktop cloud structure
A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud)
which was designed under the guidance of transparent computing
was proposed.TCCL applied the method
separating calculation and storage
loading in a block streaming way which was proposed in the transparent computing theory
to the cloud desktop system
and deployed the defense module of security threats under the cloud VM (virtual machine).As a result
the TCCL could improve the security level on the cloud VMs’ system files and data files
and could optimize the cloud virtual machines' storage efficiency.
关键词
Keywords
references
DEBOOSERE L , VANKEIRSBILCK B , SIMOENS P , et al . Cloud-based desktop services for thin clients [J ] . IEEE Internet Computing , 2012 , 16 ( 6 ): 60 - 67 .
ZISSIS D , LEKKAS D . Addressing cloud computing security issues [J ] . Future Generation Computer Systems , 2012 , 28 ( 3 ): 583 - 592 .
YU S , WANG C , REN K , et al . Achieving secure,scalable,and fine-grained data access control in cloud computing [C ] // Conference on Information Communications . 2010 : 1 - 9 .
DESHPANDE P , SHARMA S C , KUMAR P S . Security threats in cloud computing [C ] // International Conference on Computing,Communication & Automation . 2015 .
LIN C , SU W B , MENG K , et al . Cloud computing security:architecture,mechanism and modeling [J ] . Chinese Journal of Computers , 2013 , 36 ( 9 ): 1765 - 1784 .
DASILVA D A , LIU L , BESSIS N , et al . Enabling green it through building a virtual desktop infrastructure [C ] // 2012 Eighth International Conference on Semantics,Knowledge and Grids (SKG) . 2012 : 32 - 38 .
DAWOUD W , TAKOUNA I , MEINEL C . Infrastructure as a service security:challenges and solutions [C ] // 2010 the 7th International Conference on Informatics and Systems (INFOS) . 2010 : 1 - 8 .
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing [J ] . International Journal of Computer Science and Mobile Computing , 2014 , 3 ( 3 ): 707 - 711 .
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing [J ] . International Journal of Computer Science and Mobile Computing , 2014 , 3 ( 3 ): 707 - 711 .
XIANG G F , JIN H , ZHOU D Q , et al . Virtualization-based security monitoring [J ] . Journal of Software , 2012 , 23 ( 8 ): 2173 - 2187 .
HUSSEIN N H , KHALID A . A survey of cloud computing security challenges and solutions [J ] . International Journal of Computer Science and Information Security , 2016 , 14 ( 1 ): 52 .
WANG X C , ZHANG R , HUANG C D . Penetration test techniques shallow [J ] . Computer Science , 2012 ,( S1 ): 86 - 88 .
ZHANG Y , YANG L T , ZHOU Y , et al . Information security underlying transparent computing:impacts,visions and challenges [J ] . Web Intelligence & Agent Systems , 2010 , 8 ( 2 ): 203 - 217 .
WANG G , LIU Q , XIANG Y , et al . Security from the transparent computing aspect [C ] // Networking and Communications International Conference on Computing . 2014 : 216 - 220 .
AYRES J , FLANNICK J , GEHRKE J , et al . Sequential pattern mining using a bitmap representation [C ] // Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining . 2002 : 429 - 435 .