Research and Application of Safety Management for Virtual Desktop in Colleges and Universities

  • Haifeng Jia
  • Guifen Chen
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 545)


In the view that the traditional PC desktop management model can not meet the demand of teaching resources in colleges and universities, this paper introduces the cloud desktop technology into the teaching resource management of colleges and universities to improve the utilization rate of the teaching resources and the management level of the staff. In this paper, the author builds a 900-point cloud desktop system platform by using the cloud server and thin terminal of Huawei. Based on the virtualization technology and cloud computing security model, it realizes the unity of cloud desktop, resource sharing and ensures the security and remote control of data. The test application was carried out in the teaching and management of the training center on the cloud. Result of application indicates that cloud desktop is more efficient, convenient and safer than traditional PC in resource utilization, network requirements, hardware configuration, energy saving management and use of the model, and it also has a huge development advantages.


Cloud desktop Virtualization Sharing Security Management 



The authors wish to express their gratitude to the national spark program project: Precise operation technology integration and demonstration of corn (No. 2015GA660004) for its generous support of this work.


  1. 1.
    Wenchao, S., Ye, W., Yong, H., Zengshou, L.: Simulation of cloud intrusion detection model in cloud computing network under large data environment. West China Sci. Technol. 08, 86–88 (2015)Google Scholar
  2. 2.
    Lin, C., Su, W., Meng, K., Liu, Q., Liu, W.: Cloud computing security: architecture, mechanism and model evaluation. J. Comput. Sci. 36(09), 1765–1784 (2013)Google Scholar
  3. 3.
    Xu, Y., Gao, F., Shang, F., Zhu, J.: New cloud security solution and its key technology. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) (S1), 74–78 (2012)Google Scholar
  4. 4.
    Ji, Y., Kang, J., Pan, Q., Kuang, Z.: A cloud computing security model and architecture design research. Inf. Netw. Sec. (06), 6–8+22 (2012)Google Scholar
  5. 5.
    Chengqing, G.: Based on artificial intelligence network intrusion detection system design. J. Nanning Vocat. Tech. Coll. 05, 98–100 (2009)Google Scholar
  6. 6.
    Yuan, Y.: Artificial intelligence and network security. Neijiang Technol. 12, 103+172 (2009)Google Scholar
  7. 7.
    Xiao, T., He, H., Liang, R.: Desktop cloud in the university computer laboratory application. Lab. Sci. (01), 82–84+88 (2015)Google Scholar
  8. 8.
    Xiangyan, N., Shunyi, Z.: Network security status and technology development. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) 05, 49–58 (2012)Google Scholar
  9. 9.
    Muthurajan, V., Narayanasamy, B., Huang, X.: An elliptic curve based Schnorr cloud security model in distributed environment. Sci. World J. 2016, 1–8 (2016)CrossRefGoogle Scholar
  10. 10.
    Xue, H., Zhang, Y., Guo, Z., Dai, Y.: A multilevel security model for private cloud. Chin. J. Electron. 02(02), 232–235 (2014)Google Scholar
  11. 11.
    Dongxing, H.: Based on artificial intelligence information network security situational awareness technology. Inf. Commun. 06, 80–81 (2012)Google Scholar
  12. 12.
    Chu, M.-F.: Study on key technology of network security management based on artificial intelligence theory. Comput. CD-ROM Softw. Appl. 23, 95+108 (2012)Google Scholar
  13. 13.
    Gao, Z.: Design and implementation of campus network security management system in grid environment. J. Univ. Electron. Sci. Technol. ChinaGoogle Scholar
  14. 14.
    Wenhua, H., Zhigang, C.: Network security status analysis and development trend. Commun. Technol. 10, 30–33 (2007)Google Scholar
  15. 15.
    Basak, D., Toshniwal, R., Maskalik, S., Sequeira, A.: Virtualizing networking and security in the cloud. ACM SIGOPS Oper. Syst. Rev. 4(44), 86–94 (2010)CrossRefGoogle Scholar
  16. 16.
    Chang, Y., Zhang, Z., Wang, J.: A security protocol for trusted access to cloud environment. Recent Adv. Electr. Electron. Eng. 02(08), 1 (2015)Google Scholar
  17. 17.
    Wang, T., Liu, S.: Cloud desktop technology in the construction of educational information. Comput. CD-ROM Softw. Appl. 18(02), 228+230 (2015)Google Scholar
  18. 18.
    Wu, Y.: Cloud desktop technology in the computer room management application. Jilin Univ. Eng. Technol. (10), 94–96 (2015)Google Scholar
  19. 19.
    Miao, P.: Ant colony optimization algorithm in cloud computing resource allocation on the application. Shandong Normal University (2015)Google Scholar
  20. 20.
    Han, X.Y.: Design and implementation of cloud desktop management platform based on virtualization. Beijing Jiaotong University (2015)Google Scholar
  21. 21.
    Addis, B., Ardagna, D., Panicucci, B., Squillante, M.S., Zhang, L.: A hierarchical approach for the resource management of very large cloud platforms. IEEE Trans. Depend. Sec. Comput. 05(10), 253–272 (2013)CrossRefGoogle Scholar
  22. 22.
    Zhang, J., Xu, Z.J., Li, Y.: An optimal resource allocation method for aircraft subassembly system based on graphic ant colony algorithm. Adv. Mater. Res. 156(1035), 1397–1403 (2011)CrossRefGoogle Scholar
  23. 23.
    Li, H., Wang, L.P., Li, G.S., Liu, Z.X.: The industry management system based on virtualization and cloud computing. Adv. Mater. Res. 488(1693), 782–786 (2012)CrossRefGoogle Scholar
  24. 24.
    Yan, T., Li, D.: Virtual cloud desktop technology research and implementation. J. Chengdu Univ. (Nat. Sci. Ed.) (02), 145–147+155 (2013)Google Scholar
  25. 25.
    Pan, F.: Cloud computing security model and management. Electron. Technol. Softw. Eng. 16, 250–251 (2013)Google Scholar
  26. 26.
    Jiang, Z.: On cloud computing security model and management. Electron. Technol. Softw. Eng. 16, 253 (2013)Google Scholar
  27. 27.
    Hua, X., Chung, J., Hu, W.: Ant colony optimization based on cloud computing environment resource allocation algorithm. J. East China Normal Univ. (Nat. Sci. Ed.) (01), 127–134 (2010)Google Scholar
  28. 28.
    Huang, J., Wang, Q., Zhi-Qin, L., Wang, Y.: Ant colony algorithm is based on resource state of cloud computing task allocation. Comput. Eng. Des. (9), 3305–3309 (2014)Google Scholar
  29. 29.
    Liu, S.P.: Research on cloud computing strategy based on security model. Appl. Mech. Mater. 644(3468), 1835–1839 (2014)CrossRefGoogle Scholar
  30. 30.
    Zhao, G., Rong, C., Jaatun, M.G., Sandnes, F.E.: Reference deployment models for eliminating user concerns on cloud security. J. Super Comput. 61(2), 337–352 (2012)CrossRefGoogle Scholar
  31. 31.
    Deboosere, L., Vankeirsbilck, B., Simoens, P., Turck, F., Dhoedt, B., Demeester, P.: Efficient resource management for virtual desktop cloud computing. J. Supercomput. 62(2), 741–767 (2012)CrossRefGoogle Scholar
  32. 32.
    Jiang, F.J.: Cloud desktop technology in the application of the computer teaching management in colleges and universities. Donghua University (2016)Google Scholar
  33. 33.
    Wang, R.N.: Cloud desktop platform based on virtual technology in the teaching the application. J. Foshan Inst. Sci. Technol. (Nat. Sci. Ed.) 3, 56–60 (2016)Google Scholar
  34. 34.
    Wu, J.H.: Analyze the cloud desktop technology application in university training rooms management. J. Electron. Technol. Softw. Eng. 10, 178 (2016)Google Scholar
  35. 35.
    Wang, Z.G., Gao, Y., Wang, C.Y.: A desktop cloud build campus network office platform based on the application study. J. Netw. Sec. Technol. Appl. (10), 103–104 (2016)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2019

Authors and Affiliations

  1. 1.College of Information and Technology ScienceJilin Agricultural UniversityChangchunChina

Personalised recommendations