Research on Authentication Method for Virtual Desktop System based on CPK

被引:0
作者
Ju Lei [1 ]
Liu QiaoYu [2 ]
Chi YaPing [1 ]
机构
[1] Beijing Elect & Sci Technol Inst, Dept Commun Engn, Beijing, Peoples R China
[2] XIDIAN Univ, Sch Telecommun Engn, Xian, Peoples R China
来源
PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013) | 2013年 / 52卷
关键词
Virtual Desktop; Identity authentication; Combined public key; Federated identity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Virtual desktop technology separates the users and the resources, contributing to terminal security solutions and improvement of resource utilization. It also provides the convenience for the centralized management of resources. But the introduction of virtualization technology also makes unique safety risks existing in virtual desktop. Identity authentication is the key technology to solve the problem of virtual desktop security problems and also is the foundation of more complex security protective measures. This article first describes the principle of the Combined Public Key (CPK) cryptosystems, then according to the characteristics of the virtual desktop, two authentication methods based on CPK are proposed for virtual resources applying and virtual resources using respectively. And the user and the virtual machine is bound through the federated identity in order to prevent fraudulent use of virtual machine,. At last, the safety and performance analysis of the proposed authentication method is given.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 10 条
[1]  
Chen Yu-xin, 2012, INFORM SECURITY SECR, V33, P92
[2]  
Ma Yu-chi, 2010, Computer Engineering and Applications, V46, P90, DOI 10.3778/j.issn.1002-8331.2010.01.029
[3]  
Nan Xiang-hao, 2013, INFORM SECURITY SECR, V34, P39
[4]  
Nan Xiang-hao, 2008, CPK CRYPTOSYSTEM SEC
[5]  
Ning Zhi, 2012, SECRET SCI TECHNOLOG, V22, P70
[6]  
Tang W, 2011, THESIS
[7]  
Wang Jia-lin, 2012, SECRET SCI TECHNOLOG, V6, P44
[8]  
Yu Sun, 2012, INFORM SECURITY SECR, V33, P87
[9]  
Zheng Zhi-yong, 2012, NETWORK SECURITY TEC, V10, P50
[10]  
[周加法 Zhou Jiafa], 2005, [信息工程大学学报, Journal of Information Engineering University], V6, P26