A Survey on Techniques of Secure Live Migration of Virtual Machine
@article{Shetty2012ASO, title={A Survey on Techniques of Secure Live Migration of Virtual Machine}, author={Jyoti Shetty and R. AnalaM. and G. Shobha}, journal={International Journal of Computer Applications}, year={2012}, volume={39}, pages={34-39} }
Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the…
55 Citations
A Survey on Security Issues and Solutions in Live Virtual Machine Migration
- Computer Science
- 2014
A survey of attacks on live migration of virtual machine and approaches to handle them is surveyed and proposed strategy to secure live migration is discussed.
Live Migration of Virtual Machine in Cloud : Survey of Issues and Solutions
- Computer Science
- 2016
This survey discusses live migration security issues, along with possible attacks before, during, and after migration, and discovers some known methodologies that aim to secure virtual machine live migration.
Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation
- Computer Science2014 IIAI 3rd International Conference on Advanced Applied Informatics
- 2014
Performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers and proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.
Survey : Secure Live VM Migration in Public Cloud
- Computer Science
- 2015
This paper described live migration procedure, security threats occurred during live migration and available solution to secure live VM migration.
Secure Live Virtual Machine Migration by Proposed Security Center
- Computer Science
- 2016
This paper shows how the proposed mechanism analyzes and fulfills the major security requirements for secure live VM migration in cloud environments to become protected against different types of passive and active attacks.
Survey on secure live virtual machine (VM) migration in Cloud
- Computer Science2013 2nd National Conference on Information Assurance (NCIA)
- 2013
This work has carried out an extensive survey to investigate the vulnerabilities, threats and possible attacks on the live VM migration, identified security requirements for secure VM migration and presented a detailed analysis of existing solutions on the basis of these security requirements.
Secure live virtual machine migration through runtime monitors
- Computer Science2017 Tenth International Conference on Contemporary Computing (IC3)
- 2017
This paper proposes a new model for live migration of virtual machines (VMs) in a secure environment and proposes the migration model that fulfills the most security requirements for secure live VM migration process.
SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing
- Computer ScienceSCC@AsiaCCS
- 2016
A security model of live virtual machine migration based on security policy transfer and encryption, named as SPLM (Security Protection of Live Migration) is proposed and its security and reliability are analyzed, which proves that SPLM is better than others.
Implementing Live Migration Security
- Computer Science
- 2015
This dissertation investigated two popular open source hypervisors XEN and KVM and found security flaws in each system and proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules.
Secure Live Virtual Machines Migration: Issues and Solutions
- Computer Science2014 28th International Conference on Advanced Information Networking and Applications Workshops
- 2014
The X.805 security standard is used to investigate attacks on live virtual machine migration and highlights the main source of threats and suggests approaches to tackle them.
References
SHOWING 1-10 OF 20 REFERENCES
Enabling secure VM-vTPM migration in private clouds
- Computer ScienceACSAC '11
- 2011
This work detail the requirements that a secure VM-vTPM migration solution should satisfy in private virtualized environments and proposes a vTPM key structure suitable for VM-tPM migration, and shows that the proposed protocol provides stronger security guarantees when compared to existing solutions forVM-v TPM migration.
Eliminating the hypervisor attack surface for a more secure cloud
- Computer ScienceCCS '11
- 2011
NoHype eliminates the hypervisor attack surface by enabling the guest VMs to run natively on the underlying hardware while maintaining the ability to run multiple VMs concurrently, and is a significant advance in the security of cloud computing.
Live migration of virtual machines
- Computer ScienceNSDI
- 2005
The design options for migrating OSes running services with liveness constraints are considered, the concept of writable working set is introduced, and the design, implementation and evaluation of high-performance OS migration built on top of the Xen VMM are presented.
A hypervisor-based system for protecting software runtime memory and persistent storage
- Computer ScienceSpringSim '08
- 2008
The data locker component in the hypervisor is proposed, which prevents the sensitive data of software program in persistent storage from leaking to rootkits or other malware.
Formal requirements for virtualizable third generation architectures
- Computer ScienceSOSP '73
- 1973
The hardware architectural requirements for virtual machine systems are discussed and a fairly specific definition of a virtual machine is presented which includes the aspects of efficiency, isolation, and identical behavior.
The Reincarnation of Virtual Machines
- Computer Science, ArtACM Queue
- 2004
The term virtual machine initially described a 1960s operating system concept: a software abstraction with the looks of a computer system’s hardware (real machine). Forty years later, the term…
Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor
- Research paper. China Communications. Page
- 2011
Empirical Exploitation of live migration of virtual machines
- Proc of Black Hat DC, March
- 2008