Cloud Policy Model in the Desktop Management System



Similar documents
A Multilevel Policy-Based Network Management System for Differentiated Services Network

Performance Management Platform

QAME Support for Policy-Based Management of Country-wide Networks

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

The Study on Web GIS Architecture Based on JNLP

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

An Introduction to UC-Monitor


ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper

SysPatrol - Server Security Monitor

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

Active Directory Integration

VMware Mirage Web Manager Guide

HP A-IMC Firewall Manager

Cloud Storage Solution for WSN Based on Internet Innovation Union

The Design of B2B E-commerce System Based on MVC Model and J2EE

Features of AnyShare

Cloud Computing and Business Intelligence

Modeling for Web-based Image Processing and JImaging System Implemented Using Medium Model

Access Control Framework of Personal Cloud based on XACML

In this training module, you learn how to configure and deploy a machine with a monitoring agent through Tivoli Service Automation Manager V7.2.2.

13.1 Backup virtual machines running on VMware ESXi / ESX Server

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Paxera Uploader Basic Troubleshooting

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

A Scheme for Implementing Load Balancing of Web Server

24x7 Scheduler Multi-platform Edition 5.2

Power Consumption Based Cloud Scheduler

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol

HP IMC Firewall Manager

DiskPulse DISK CHANGE MONITOR

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT

AVG 8.5 Anti-Virus Network Edition

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Modeling the Mobile Application Development Lifecycle

WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware

The Application and Development of Software Testing in Cloud Computing Environment

EZblue BusinessServer The All - In - One Server For Your Home And Business

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

SOLITEC products or services for which a separate privacy policy is provided.

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Virtual Data Centre. User Guide

Virtual Machine in Data Center Switches Huawei Virtual System

High Level Design Distributed Network Traffic Controller

A WEB-BASED VE SUPPORTING SYSTEM FOR VE FACILITATOR AND MEMBERS IN VE WORKSHOP

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Fujitsu s Approach to Hybrid Cloud Systems

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

PROPALMS TSE 6.0 March 2008

Quick Start Guide for VMware and Windows 7

Configuration Guide. BES12 Cloud


CYCLOPE let s talk productivity

SSL VPN Technology White Paper

UNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May

Feature and Technical

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

Capability Service Management System for Manufacturing Equipments in

Outline: Operating Systems

BlackBerry Enterprise Service 10. Version: Configuration Guide

System Management. What are my options for deploying System Management on remote computers?

Synchronization Agent Configuration Guide

SECURITY DOCUMENT. BetterTranslationTechnology

Mirtrak 6 Powered by Cyclope

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Software installation and configuration IEC-line series

SMART Vantage. Installation guide

SNMP and Web-based Load Cluster Management System

Licensing for BarTender s Automation Editions

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Design of Electronic Medical Record System Based on Cloud Computing Technology

Interworks. Interworks Cloud Platform Installation Guide

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

Tentative Plan to establish a Database Management System for Small Undersea Feature Names. (Draft by Lin Shaohua)

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

FileCloud Security FAQ

Monitoring Replication

Moxa Device Manager 2.0 User s Guide

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

2. Installation and System requirements

How To Manage A Virtual Data Center In A Country With Limited Space

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

RDM on Demand Privacy Policy

A conceptual model of public medical service system based-on cell phone mobile platform

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Remote Desktop Reporter Agent Deployment Guide

W H I T E P A P E R SYSTEMS MANAGEMENT

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

Transcription:

I.J.Modern Education and Computer Science, 2010, 1, 24-31 Published Online November 2010 in MECS (http://www.mecs-press.org/) Cloud Policy Model in the Desktop Management System Fang Zhao Beijing Forestry University/College of Information Science and Technology, Beijing, China fangzhao@bjfu.edu.cn Yin Liu Beijing Forestry University/College of Information Science and Technology, Beijing, China liuyin.tiger@gmail.com Abstract By studying the policy and desktop management systems theories, referencing the Internet Engineering Task Force (IETF) policy model and theories of cloud computing, this paper proposed a cloud policy model that can be applied in specific desktop management system. It mainly explains the whole system framework and its implementation mechanisms, and it discusses the problems and solutions that the cloud policy model uses in the desktop management system. Index Terms cloud policy model, desktop management system, cloud computing, policy-based desktop management, policy, access control I. INTRODUCTION With the rapid development of computer technology and widely used Internet applications, there have been an increasing number of computer equipments in the Enterprises. These computers usually run a variety of applications. Therefore, their stability, reliability, security and performance not only directly affect the efficiency of operations, but also have an important influence on both business efficiency and the administration cost of the whole enterprise. In addition, with the refinement of enterprise sectors, different department has their own requirements for desktop environment, in order to ensure the security of internal resources, classified restriction for authority to access the content of each local computer is necessary. Such as stopping clients from any access to system volume, closing the USB port and CD-ROM drive for users of that department, or preventing applications which have nothing to do with the business. The above problems can be solved with the help of a crucial content from the Desktop Management System ---the access control of local resource, it will enable each enterprise to have a different desktop environment that meet their own Corresponding author: Fang Zhao; Yin Liu fangzhao@bjfu.edu.cn; liuyin.tiger@gmail.com needs. Policy is the aggregation of a group of regulation used to describe the operation can be executed under which cases. With the fast development of network, Policybased network management theory has been proposed. It can realize the demands on the network management system [1-2]. This policy can be dynamically changed, which can dynamically change the system s behavior and strategies. The Internet Engineering Task Force (IETF) and other organizations for standardization, research institutions and network equipment manufacturers have begun to engage in Policy management research and have published the relevant drafts [3-4]. Although IETF policy management model is now a commonly used Policy Management Model (PMM), the introduction of Policy and policy model to the desktop management system will bring some new problems. Based on the theory of cloud computing, this paper improved the IETF policy model and proposed a cloud policy model in order to solve those problems and enhance the management power. II. RELATED STUDIES Desktop management systems and Policy have made some achievements in their respective areas. Chen Zhifeng presents a Web-based desktop management system, in which they use a oneserver model to manage multiple computers [5]. It describes and analyzes the system design and implementation techniques. However, due to the lack of the introduction of Policy and policy model in the system, it can only manage the desktop in accordance with the fixed rules therefore his system can not cope with the dynamic changes on the management rules. Li Jinping and Gao Dongjie proposed a policybased software platform for network management system [6]. They use XML language to define, store and access the policy rules and uses CORBA technology to achieve distributed network management. Li Qinghai and Zhang Deyun proposed a distributed policy of role-based management

Cloud Policy Model in the Desktop Management System 25 practices [7]. The paper proposed high-level rolebased policy management practices based on the IETF policy framework. Its domain concept enables the combination of the roles and domains, and upon that, the expression of the role is simplified. However, it is the policy model used in the network management system; improvements need to be made if wanting to apply the policy mode to the desktop management system. In conclusion, the Related Studies are mainly on the policy model or on the desktop management system. Others are to combine together the policy model and the network management. However, researches related to how to improve the policy or how to apply the policy model to the desktop management system to solve problems caused by the introduction of policy model remains untouched upon. III. BASIC POLICY MODEL A. Definition of policy Generally speaking, the definition of policy mainly has the following forms: RFC3198 defines the policy with two compatible viewpoints [8]: The policy is the target, path or method of behavior, used for guiding or deciding current and future decisions. The policy is a set of rules, used for managing and controlling the access of resources. The policy is the norm used to define system behavior rule. It comes from management goals and it is persistent and descriptive [9]. The policy is the behavior that influences subject and target. It describes the relation of subject and target [10]. B. IETF Policy Management Model The Policy model [10] that IETF puts forward is extensively accepted; most policy-based network management systems are based on it. Figure 1. The IETF Policy Management Model The Fig. 1 shows that the policy model which IETF proposed should have a minimum of four basic functional components: 1) Policy control tool The policy control tool is an interface for administrators to edit the policy. It is able to refine the natural language form entered by administrator to many policy rules and put the policies into the database by appropriate format. The policy control tool is also used to combine the decision policy equipment and the equipment which apply the policies. Furthermore, it supervises and controls the operation of the whole system. In addition, it provides a simple verification mechanism that examines the latent policy conflicts. 2) Policy Resource Policy resource is a store facility which saves policy and other related information, such as relational database and directory service. 3) Policy Decision Point (PDP) The Policy Decision Point is a logical decision-making entity; decisions are made according to the policy rules and status of net service. It explains, launches and executes polices and rules. For instance, it can receive requests and the policy conditions sent by Policy Enforcement Point (PEP) and find a matching policy in the policy resource, and then returns the result or action to the PEP. 4) Policy Enforcement Point (PEP) The Policy Enforcement Point is a logical entity which enforces policy decisions. It is responsible for sending policy decision requests to PDP and providing policy conditions; and translating the returned decisions to operating configuration orders relevant to the specific equipment for execution C. The execution process of IETF policy model 1) Stage of the development policy First, the administrator enters the policies by using policy control tool. Second, the policy control tool refines the policies to specific rules. Finally, put these rules into the policy resource. 2) Stage of implementation policy A request will be sent to PDP when the PEP monitored an event. Then, the PDP seek from policy resource and determine whether there is a policy for this event. If so, deciding how to respond. And send back to PEP. PEP receives and executes the decision and responds to the event in the end. D. The deficiencies of IETF Policy model used in the desktop management system 1) The problem of Policy description Policy expressions have the form as if<conditions> then<actions>. But IETF policy model has not determined a specific way to describe the policy. The difference of selected policy representation and storage leads to the failure of realization on policy management in large-scale. 2) The problem of policy conflict When administrator edits the policy, a number of different policies established on the same resource

26 Cloud Policy Model in the Desktop Management System because of man made error, and these policies provide the resources with different and even conflicting requirements of access control. That leads to the problem of policy conflict. 3) The problem of net interruption Because of the dissimilarity of desktop management and network management, the network management relies on the network; the paralysis of network will definitely lead to the paralysis of the entire management system. However the desktop management is different, when the network run into an interrupt, the desktop terminal is able to continue to work, and manage its respective processes and events by the policy. For instance, a certain department of a company has no permission to access the system disk. This policy is stored in the policy resource online. It needs PEP (where the computer terminal) to submit the request on the network, and transmit the final decision from PDP to the PEP on net. And the occurrence of network interruption will make desktop management system unable to respond to events based on the policy. That will enable the personnel in that department to operate the computer without going through the limit of policy and results in the failure of desktop management in the end. 4) The problem of transmission speed If we choose to use the IETF policy model based on the request / response distribution model, the interaction of PEP and PDP would fully relying on the network. Then, one time PEP request, from the beginning to the end requires several times of transmission online. In the desktop management, however, high speed network transmission is required for its responding mainly to the event on the desktop. For instance, the user would have no access to the system disk if there is no authorization policy. But the policy is from network. At this point, if the network transmission speed is slow, it will greatly affect the user experience. 5) Problem on traditional desktop management The problem of traditional desktop management is that the management policy needs to be manually developed by administrators. For instance, in order to prevent unnecessary and low- efficiency causing desktop applications, the administrator must develop a list of applications manually and add it to management rule. However, there are a lot of desktop applications and many new ones emerging. If there is a new application which reduce the employees efficiency, then administrator should find it first, and then add it to the list of applications. So undoubtedly speaking, this whole manual practice by administrators is what leads to the problem of low efficiency and slow response. IV. CLOUD POLICY MODEL The Cloud Computing is a computing model brought forward in recent years. It is the development of Distributed Computing, Parallel Computing and Grid Computing. In IBM Technical White Paper on "Cloud Computing" [11], it will be defined as: The Cloud Computing is used to describe a type of application or a system platform. Based on demands, a Cloud Computing platform can serve the following purposes: provision, configuration, reconfigure, deprivation and so on. The server in the Cloud Computing platform can be a physical server or a virtual one. The advanced Cloud always has other computing resources, such as Storage Area Network, network equipment, firewall and other Security Equipments. In description of application, the Cloud Computing describes a type of extendible application can be visited via the Internet. The Cloud Application uses large-scale data centers and powerful servers to run functional web applications and network services. Any user can visit cloud computing applications by using a proper Internet access device and a standard browser. The cloud policy model we proposed is to apply the concept of Cloud Computing into the policy and desktop management system. A. Basic idea Based on the IETF policy model, the cloud policy model combines the concept and the technology of cloud computing. It monitors and manages the desktop environment through the large number of clients on the network. At the same time, it obtains useful log information, sent them to the cloud server to be automatically analysis and processed. Then, based on the results of analysis, it adjusts the policy automatically and sends the adjusted policy to each client. Thus, each client is both a monitor and a beneficiary of the cloud policy model. B. Model structure 1) The overall structure Figure 2. The overall structure As shown in Fig. 2, the clients (A, B, C, D, E) in cloud policy model monitor the desktop environment of local computer. And they send local logs to cloud server. Cloud server analyzes those logs and provides analysis result. Then, the system automatically updates policies according to analysis results. Finally, system sends the adjusted policies to each client. For example, when the client A found an unrelated desktop application that

Cloud Policy Model in the Desktop Management System 27 seriously occupies the memory and reduces work efficiency, it will send this information to cloud server. The cloud server will then analyze the information and adjust it, and automatically add this application to the preventing list according to the analysis result. Then, it sends the updated policy to client A, and client B, C, D, E which are under the same cloud policy system will receive the same policy at the first time. Compared with the traditional desktop management, the cloud policy model has the following advantages: a) Under the case no related application detected, B, C, D, E client can acquire the same policy and desktop environment as A. b) The cloud server analyzes logs and provides analysis result. It makes the system adjust policies automatically. Thus, it takes part of work in updating the policy which saves time and energy for administrator. 2) The specific model of the cloud policy As mentioned above, flaws of IETF policy model in the desktop management system are found. In this paper, based on the basic model, we made necessary improvement for its shortage and designed the cloud policy model in the desktop management system. Fig. 3. Figure 3. The cloud policy model in the desktop management system Compared with the IETF policy model, there are two parts were improved: a) Local database We added a local policy resource database. There are two databases. One is the policy resource database (policy resource for short) as IETF model. The other is the local policy resource database (local database for short). After administrator s editing the policy, they put it into the policy resource. The PDP should decide, according to whether it has new policy or any undated policies, if it needs to download the policy to local database. If necessary, store the policy need to be downloaded in local database or updated the policy in the local database by PEP. Thus, as to control the various operations of local computer, when PEP decides whether to execute a policy, it will not only rely on PDP getting the corresponding responses by seeking policy resource and send back to PEP for execution, it can search the policy in the local database directly. And the function of PDP is kept. The policy implemented by PEP, in fact, determined by PDP as usual. The only change is to put the policy which PDP decided to execute into the local database and wait for PEP to seek and execute it. This will improve two problems of IETF model in desktop management system: PEP can visit the local database without using the network request / response mode. When the network is interrupted, PEP can still find and respond to the policy in local database, and control the operation of the local computer. In addition, if administrator has changed the policy in policy resource during the interruption, the local database will be immediately updated after the network restoration, so as to make sure PEP use the latest policy to control the local computer. We solve the problem of network interrupt by this means. We add the local database to the model, and it only saves the policy which is contained this local computer in the domain. When the policy was added or was changed, the local database gets updated immediately. Because PEP can execute the policy without sending and receiving the requests online and reduce unnecessary searching consumption. So it greatly increased the speed of response policy and improved the problem of transmission speed. b) Log database and log analysis tool The Log database and log analysis tool is introduced in our model. The log database is also a storage facility which likes the policy resource. It stores logs which generated by PEP. The log analysis tool is used to analyze the logs in the log database. The whole process is: The PEP monitors local desktop application environment and sends the log to log database in cloud server. The log analysis tool interacts with log database to filter and analyze the logs, then send the analysis result to Policy control tool. The Policy control tool adjusts policies automatically according to the analysis result and distribute to other desktop clients. It is equivalent to a feedback process. It make policies which has developed by administrator can be adjusted automatically according to the implementation status of desktop management. Therefore, it enhanced the efficiency of desktop management. C. Frame the way of policy expression 1) Policy Policy is consisted of user or user group, rules, IP restrictions and time limits. It completely defines the access controlling requirements of the resource. Namely the definition of "which person" (user / user group)

28 Cloud Policy Model in the Desktop Management System "under what conditions" (time limit, IP restrictions) "allow / ban access to what resources" (rules). Policy = Users + Rules + Conditions {include IP restrictions, Time limits, etc.} 2) Rule The rules define access and control rights of specific resources. A complete rule is consisted of Security Domain, Resource, Action and Time limits. Rule= Security Domain + Resource + Action + Time limits 3) Policy Domain Policy domain is a logical division for the management task of security resources. It is a container which can put user, user group, rule, security domain and policy into it. Each policy domain can include several security domains and each policy domain can have administrator itself. 4) Security Domain The security domain is a set of designated resources. It is usually an aggregation of sources which has the same certification requirements and access control needs. 5) User The user is the person who operates the local computer and has full or part of access control rights to resources. 6) User Group User group is a logical classification in order to manage users, and give them the same configuration. 7) Resource Resource is every object accessed by users. Each resource is protected by Desktop Agent (Agent for short). Namely allowing specific users execute the specified operation to specific resources. D. Make priority principles of policy In order to improve the problem of policy conflict, a series of priority principles are made, to ensure correct execution of the policy. 1) Unbound protection principle For Security Domain or Rule that is not bound to user, user group, we explained that as unfinished work of administrator's configuration. In such case, when administrator s safety intent is not clear, for security reasons, we deny all the people to access these resources which are under the protection of Security Domain or the activated rules. 2) Rejection first principle For the same resource, the rejected rules for access are prior to the allowed rules. For example, there are two rules in the policy and each of them has set the permissions to the same resource. One allows the user to access this resource. The other denies it. In this case, the access operation will be rejected according to the Rejection first principle. 3) Accurate match first principle When there are more than one rules relating to the resources which is requested, the most accurate matching rule effect first. For example, existing Rule1 bans users from accessing the path "C: \ *. exe". However, Rule2 permits users to access the path C:\Documents and Settings\1.exe In this case, the path C:\Documents and Settings\1.exe can be accessed for it s the accurate match. 4) Primacy of priority principles The descending order of policy priority is that: a) Unbound Security Domain protection principle; b) Unbound rule protection principle; c) Rejection first principle d) Accurate match first principle V. SYSTEM IMPLEMENTATION TECHNOLOGY A. The overall logical organization of system Based on the above policy model which we proposed, we designed the overall logical structure of the system. Fig. 4 Figure 4. The overall logical organization of system The Overall structure includes the master system, the slave system and the cloud. The master system is mainly used by administrator to edit policy and put the policy into the policy resource. In the slave system, desktop management system interacts with local database to achieve computer resource control base on policy control. The cloud is mainly used to analyze the logs which are in the log database and provide analysis results. Logical architecture of the cloud is shown in Fig. 5 Through the interaction of the master and the slave system, new policy and updated policy are put into local database. The master system interacts with the cloud to get the analysis results. Furthermore, the slave system also can interact with the cloud. It can send the monitoring log of local computer (such as Process status, CPU status, and memory usage and so on.) to the log database in the cloud.

Cloud Policy Model in the Desktop Management System 29 Figure 5. Logical architecture of the cloud The system considered the compute and storage resources separately in the cloud server. Then, we deployed them to the compute cloud and storage cloud. The compute cloud is mainly used to implement the large amount of data operations in the model. The log analyze module is the key module. It is constituted by a group of servers. It analyzes and selects a large number of logs, and gets the corresponding results. In reality, Log analysis module plays the role of executor. Management center and dispatch center is the real core of the compute cloud. The Management center is used to manage devices of log analysis servers. The dispatch center distributes computing power and storage capacity according to the server status. The storage cloud stores the log by distributed storage. It uses multiple storage servers to share storage load, improve system s reliability, availability and extensibility. B. System realization As shown in Fig. 6, this is the realization of policy model which is improved and designed by this paper in desktop system. Figure 6. The realization of cloud policy model in the desktop management system The whole system can be divided into three parts: the policy management part, the desktop management part and the cloud part. And some technologies involved in this system are as follow: C++, Java, JSP, Servlet, XML and some scripting languages. Each function module in the Fig. 6 is described below. 1) The Module of Web service This module is designed to provide the web service. It has compiling system to interpret and execute the Java and Servlet code. This module mainly used to store the JSP or Servlet programs from the Policy Management Platform. The module of web service is used to provide the graphical user interface of the Policy Management Platform. Users can operate the Policy Management Platform by Browsing, adding, modifying, deleting and searching the policy directly. 2) Policy Management Platform Policy Management Platform and the Web service constitute the module of policy management tool in policy model. The policy management platform mainly includes the following functions. a) Editing policy Administrator edits the policy in accordance with the way that the policy is expressed as mentioned above. It specifically includes the Policy Domain management (the operate includes: adding, modifying and deleting and so on), the User management (the operate includes: adding, modifying and deleting and setting the authority and so on), the User Group management (the operate includes: adding a user group, adding or deleting a user from user group and so on), the Security Domain management (the operate includes: adding, modifying and deleting and so on), the Rule management (the operate includes: adding, modifying and deleting and so on), the Policy management (the operate includes: adding, modifying, deleting, bonding user or user group, bonding rules and

30 Cloud Policy Model in the Desktop Management System so on). Finally, the policy which is edited by administrator will be put into the policy resource. b) Interact with policy resource The Policy Management Platform needs to interact with policy resource in order to realize operations such as adding, modifying, deleting, and search and so on. The administrator can execute associated operations directly via Web browser. c) Interact with desktop management server. There are two different interactions between The Policy Management Platform and the desktop management server. When the administrator adds a new policy or updates a policy by using the Policy Management Platform, it should send a message to desktop management server, and wait for its next operation. When the administrator wants to find out information of local computer such as Process, Memory and so on, it should send a message to desktop management server, and wait for its next operation. d) Interact with log analysis tool The Policy Management Platform interacts with the log analysis tool in order to get the analysis result. According to the results, The Policy Management Platform adjusts the policy automatically. 3) Log analysis tool Log analysis tool is the dominant module of log analysis part. It is mainly the following functions: a) Analyze logs It analyzes and process logs to obtain useful information by three steps. First, classify logs. The main condition for classification is policy domain because different policy domain has different policies. Second, it selects logs from same policy domain. Finally, it analyzes those logs which be selected and provides analysis result. b) Interact with the Policy Management Platform The log analysis tool sends the analysis result to the Policy Management Platform. And the Policy Management Platform begins next operation. c) Interact with the log database The log analysis tool interacts with the log database in order to get the logs which send by local computer. 4) Log database The log database, as mentioned above, is used to store the logs which uploaded by local computer. The log database often serves as a transition which interacts with the Policy Management Platform and log analysis tool. 5) Policy Resource and Local Database The policy resource in improved model remains the same in IETF model. It is used to store the policies, the relevant policy data such as policy s rules, user group, rule domain, Security Domain, the information of local computer and so on. The local database, as already stated in our previous paragraph, only store the policies in the local computer domain. There are several ways to implement the policy resource and local database. It can be LDAP directory service or the relational database system. The paper used the RDS because of the local database needs to add, update and delete the data in time. The RDS is much more efficient than the LDAP in terms of program writing speed. Meanwhile, we can make the Index of database to increase the RDS s reading efficiency. 6) Desktop management server The Desktop management server is corresponding to the PDP in the IETF policy model. It mainly includes the following functions. a) Interact with Policy Management Platform There are two different interactions between the desktop management server and The Policy Management Platform. When the Policy Management Platform sends a message to desktop management server and informs the server that the policy has been updated, the desktop management server response to this message and go to the next step. It responses to the request for the local computer information submitted by The Policy Management Platform. And it sends the local information to The Policy Management Platform. b) Interact with policy resource After the desktop management server received the message of policy update, it searches the policy resource in time. And finally decides whether it needs to transmit the policy to local domain. If the transmit is necessary, it will gather the policies need to be updated in local domain and then send policies to the Agent in local. c) Interact with the Agent There are two parts of the interaction between the Desktop management server and the Agent. It transmits the policies need to be updated to Agent. Obtain the local information reported by Agent. 7) The Agent The Agent is the Core Module of the desktop management system. It is a permanent process program running on the local computer. All of the access control on local computers is achieved through the Agent. It is corresponding to PEP in IETF policy model and the agent mainly includes the following functions. a) Monitoring the local information and operation In order to control the local computer, The Agent needs to inject into the process permanently and monitor the local information and operation. For instance, if there is a policy when the local computer's CPU usage exceeds a certain limit it will alarm. Then the Agent, through monitoring, is able to detect the situation of CPU and respond to it according to the policy. b) Blocking operation The definition of Blocking Operation is when a user submits a request to the operating system, it is blocked by agent. In order to control access to the local computer, the blocking operation is necessary. For instance, a user group does not have permission to access the C drive. When the user submits a request to OS for visiting the C drive, the Agent should hold up this request.

Cloud Policy Model in the Desktop Management System 31 c) Interact with local database There are two parts of the interaction between the Agent and the local database. Adding or updating the policy to local database that downloaded from desktop server. Searching the policy information from local database and executing in local computer. d) Interact with the desktop management server There are two parts of the interaction between the Agent and the Desktop management server. The agent receives the policies transmitted from desktop management server. The Agent received the request sent from desktop management server (such as the request of getting the local information), and then return the result to desktop management server. e) Interact with the log database Agent sends the local computer s logs to log database and wait the log analysis tool to analyze. VI. CONCLUSION This paper improved the IETF policy management model, put the model in the cloud and applied it to the desktop management system. It has the following features: 1) formulate the way of policy expression. 2) Improved the problem of policy conflict by making the priority of policy. 3) Improved the problem of net interruption and transmission speed by using the local database. 4) Plenty of agents send the local computer logs to the cloud. The cloud analyzes those logs to provide results. Then, the system adjusts related policies automatically and sends them return to agents. It has improved the problem that the policy should be adjusted manually by administrator and enhanced the management efficiency. Because of the cloud policy and putting the policy model into the desktop management system is a relatively new attempt, some of problems need continued study. REFERENCES [1] Verma Dinesh C, Calo Seraphin, Amiri Khalil, "Policybased management of content distribution networks,"ieee network, vol. 16, pp. 34-39,2002. [2] Morris Sloman,Jorge Lobo, "Policies for distributed systems and networks," International Workshop on Policy, Bristol, UK, 2001. [3] Braden R., Zhang L., Berson S., Herzog S., S. Jamin, Resource ReSerVation Protocol (RSVP)Version 1 Functional Specification, RFC 2205, September 1997. [4] Herzog S.,RSVP Extensions for Policy Control, RFC 2750, January 2000. [5] Chen-Zhifeng "The Solution of Desktop Management System Based on Network," Application Research of Computers (in Chinese),2001,(9),pp.21-22. [6] Li-Jinping, Gao-Dongjie."The Research and Design of Policy-based Network Management Software Platform," COMPUTER ENGINEERING AND APPLICATIONS (in Chinese),2002,(12),pp.177-179. [7] Li-Qinghai, Zhang-Deyun, Duan-Zhongxing, Sun- Zhaohui."Design and Implementation of Specification for Role-Based Policy Management of Distributed System," JOURNAL OF XI'AN JIAOTONG UNIVERSITY (in Chinese),2004,38(6),pp.566-570. [8] A.Westerinen, J. Schnizlein, J. Strassner "Terminology for Policy based Management," IETF RFC 3198, 2001. [9] J. Moffett and M. Sloman, "Policy Hierarchies for Distributed Systems Management," IEEE Journal on Selected Areas in Communication,1993,11(9),pp.1404-1414. [10] R. Yavatkar, D. Pendarakis, R. Guerin, "A Framework for Policy-based Admission Control," IETF RFC 2753, 2000. [11] Boss G.Malladi P.Quan D.Legregni L,Hall H Cloud computing 2007. Fang Zhao was born at Beijing on 1958. He received the BS degree in computational mathematics from Wuhan University, Wuhan, China in 1982. He went Japan for study software development technology in 1991 and back one half years later. Currently, he is employed as vice professor of Beijing Forestry University. Now he is mainly engaged in software development methods, software development models, software testing and enterprise information technology research. Prof. Zhao received the Ministry of Forestry Science and Technology Progress Award, second prize of national scientific and technological progress. Yin Liu was born at Beijing, on March 19th, 1986. He received the BS degree in computer science and technology from Beijing Forestry University, Beijing, China in 2008. Currently, he is working toward the MS degree in computer software and theory, also at Beijing Forestry University. He is working in policy model and the cloud computing for policy-based desktop management. Mr.Liu received the first-class School Scholarship in 2010, the second-class School Scholarship in 2008, and the third-class School Scholarship in 2006 and 2007.