A Survey on Techniques of Secure Live Migration of Virtual Machine

  title={A Survey on Techniques of Secure Live Migration of Virtual Machine},
  author={Jyoti Shetty and R. AnalaM and G. Shobha},
  journal={International Journal of Computer Applications},
  • Jyoti Shetty, R. AnalaM, G. Shobha
  • Published 2012
  • Computer Science
  • International Journal of Computer Applications
  • Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the… CONTINUE READING
    50 Citations

    Topics from this paper.

    A Survey on Security Issues and Solutions in Live Virtual Machine Migration
    • 4
    • Highly Influenced
    Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation
    • 7
    • PDF
    Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation
    • 1
    • PDF
    Survey : Secure Live VM Migration in Public Cloud
    • 1
    • PDF
    Secure Live Virtual Machine Migration by Proposed Security Center
    • 1
    • Highly Influenced
    Survey on secure live virtual machine (VM) migration in Cloud
    • 13
    Secure live virtual machine migration through runtime monitors
    • 2
    • PDF
    SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing
    • 7
    Implementing Live Migration Security


    Enabling secure VM-vTPM migration in private clouds
    • 100
    • PDF
    Eliminating the hypervisor attack surface for a more secure cloud
    • 275
    • PDF
    Live migration of virtual machines
    • 2,903
    • PDF
    A hypervisor-based system for protecting software runtime memory and persistent storage
    • 52
    • PDF
    Formal requirements for virtualizable third generation architectures
    • 691
    • PDF
    The Reincarnation of Virtual Machines
    • 133
    • PDF
    Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor
    • Research paper. China Communications. Page
    • 2011
    Empirical Exploitation of live migration of virtual machines
    • Proc of Black Hat DC, March
    • 2008
    • 65
    Alternatives for Securing Virtual Networks: A Different Network Requires a Different Approach-Extending Security to the Virtual World