Security reinforcement method for virtual machine in desktop cloud environment

A virtual machine, desktop cloud technology, applied in computer security devices, software simulation/interpretation/simulation, program control design, etc., can solve the problem of security without doing any work, unaware of the security risks of virtualization technology, and difficult to find Problems such as deep-level problems of desktop virtualization technology, to achieve the effect of security reinforcement and ensure the security of virtual machines

Active Publication Date: 2016-04-13
SHANGHAI JUNESH INFORMATION TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The new architecture, process and management system and organizational structure will have many potential hidden dangers
Desktop virtualization technology, while bringing us some security, hides some unsafe factors, making it more difficult for users to discover the deep-seated problems behind desktop virtualization technology
Survey data show that less than 10% of desktop virtualization users have deployed security tools specifically to deal with security risks brought about by virtualization technologies; only 20% of desktop virtualization users have discovered the security risks of their own systems and will consider Use security tools for virtualization security protection; the remaining 70% of desktop virtualization users do not do anything to make their virtualization environment safe, and do not realize that virtualization technology can also bring security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security reinforcement method for virtual machine in desktop cloud environment
  • Security reinforcement method for virtual machine in desktop cloud environment
  • Security reinforcement method for virtual machine in desktop cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] In the embodiment of the present invention, a virtual machine security hardening method in a desktop cloud environment, the specific implementation mainly includes the following parts:

[0030] 1. Remote desktop protocol port dynamic change method

[0031] The SPICE client and server communicate using the SPICE protocol, and are connected through channels, each of which is responsible for a specific type of data transmission and communication. Each channel uses a dedicated TCP connection socket (socket), which can be encrypted (using SSL). On the client, each channel uses a dedicated thread for processing. When the network is busy or there is a QoS (Quality of Service) request, you can set the priority of different threads or dynamically close or open different channels according to the actual situation. to achieve different QoS. Since SPICE uses socket programming, the Token generated when each user logs in is dynamically bound here. The present invention controls u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security reinforcement method for a virtual machine in a desktop cloud environment. The method comprises: solving a security problem of a remote desktop protocol connection; solving a security problem of a host and a virtual machine running in the host; solving an on-demand distribution problem of security resources of desktop cloud; and solving a security protection problem of an open-source virtual machine manager. According to the method, various problems related to background security of the desktop cloud are studied; and by reducing the influence of key factors on virtual machine security and by assistance of resource scheduling specially for a desktop virtualization environment, the security reinforcement of the virtual machine and the security management of the virtual machine are realized and the virtual machine security of a user is ensured.

Description

technical field [0001] The invention relates to the technical field of computer operating systems and virtualization, in particular to a virtual machine security reinforcement method in a desktop cloud environment. Background technique [0002] With the explosive growth of Internet technology and the actual implementation of cloud computing technology, more and more applications or services are provided through a unified cloud computing platform. Desktop virtualization technology is an important means of delivering cloud resources. It can bring management convenience to enterprises, save enterprise costs, and bring benefits such as disaster recovery, security, and flexibility, providing users with security anytime, anywhere. Controllable desktop computing environment. Currently, some large enterprises such as Huawei and China Construction Bank have deployed their own desktop virtualization systems. The flexible virtual desktop provides an unprecedented good experience for t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/12G06F21/57H04L29/06H04L29/08
CPCG06F9/45533G06F21/121G06F21/577H04L63/10H04L67/10
Inventor 翁树华
Owner SHANGHAI JUNESH INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products