and sends the public key to the monitoring-side. The
monitoring-side uses the server-side's public key to
encrypt data, ensuring only the server-side's private
key can decrypt it.
For the end-to-end encryption between the
monitoring-side and the monitored-side, the system
adopts a hybrid RSA-AES approach. First, the
monitoring-side and the monitored-side each
generate an RSA public-private key pair. The public
keys are used for encrypting data, and the private
keys are used for decryption. The monitoring-side
and the monitored-side then negotiate the AES
encryption key through RSA-encrypted content,
which is subsequently used for encrypting data
during the communication. All data exchange occurs
through HTTPS. The end-to-end encryption process
is illustrated in Figure 3.
Through the designed data encryption and
decryption algorithms, the system ensures the
confidentiality and security of data, achieving end-
to-end encryption and decryption. Additionally,
combined with the use of HTTPS protocol, the
security and integrity of the entire communication
process are guaranteed.
4
TESTING AND APPLICATIONS
4.1 System Performance and Stability
Testing
Under the condition of one monitoring-side and
three monitored-sides, the system operates smoothly
with all functions functioning properly. The CPU
utilization of the monitored-side does not exceed
20% during monitoring and does not exceed 5%
during standby. The system runs continuously for 14
days without any issues, as depicted in the running
screenshots in Figure 4.
Figure 4: Running Home Screenshots.
4.2 Security Analysis and Evaluation
The system adopts the HTTPS communication
protocol, ensuring the confidentiality and integrity of
data transmission through SSL/TLS encryption,
effectively preventing data tampering or theft. The
content exchanged between the monitoring-side and
the monitored-side is end-to-end encrypted, ensuring
the confidentiality of data during transmission, as
only the monitored-side possesses the private key for
decryption. Furthermore, an identity authentication
mechanism is implemented: the system uses identity
authentication to verify the connections of the
monitoring-side and the monitored-side, ensuring
that only authorized users can access the system and
enhancing the system's security.
4.3 System Advantages and Disadvantages
The system achieves remote monitoring and
management of laboratory computers through
HTTPS communication, allowing users to
conveniently access and control computer status and
operational conditions, thereby enhancing laboratory
management efficiency and flexibility. The adoption
of HTTPS communication protocol with SSL/TLS
encryption ensures data transmission security,
preventing data tampering or theft and enhancing
data transmission security. The system employs
RSA-AES hybrid end-to-end encryption between the
monitoring-side and the monitored-side, ensuring
data confidentiality during transmission, as only the
monitored-side possesses the private key for
decryption, enhancing data transmission
confidentiality.
Security relies on algorithms and
implementation: The system's security heavily relies
on the adopted encryption algorithms and
implementation. Vulnerabilities in algorithms or
implementation could pose security risks. Real-time
monitoring and encrypted data transmission may
impose a certain burden on computer resources and
network bandwidth, potentially affecting system
performance and efficiency. The system emphasizes
security considerations and restricts the permissions
of the monitored-side, sacrificing certain
convenience in remote management operations.
5
CONCLUSION
In conclusion, the remote computer monitoring
system based on HTTPS communication
demonstrates essential monitoring and management