A live migration strategy for virtual encryption card equipment

Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke
{"title":"A live migration strategy for virtual encryption card equipment","authors":"Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke","doi":"10.1145/3318265.3318275","DOIUrl":null,"url":null,"abstract":"With the popularity of virtualization technologies, virtualization security issues have been appeared, which greatly hampers the development of its further application. Bringing the encryption card to the virtual environment is a good idea to enforce the security of the virtual platform. However, due to the particularity of the encryption card equipment, there is some difficult to virtualize the encryption card equipment. One of the most important difficulties is supporting Live Migration. As for the first question that we must ensure the encryption task continuity when migrating a virtual encryption card, we propose the encryption field migration for the physical encryption card, which guarantees the continuity of virtualization encryption card. For the second problem that Live Migration of virtualization encryption card must be protected from any attack, this paper designs migration protocol to ensure the security. For the last problem that the encryption card live migration should not increase the migration time of virtual machine drastically, including total migration time and downtime, we separate the migration protocol to a different stage, and complete in the different stage of virtual machine migration. By this way, we decrease the influence of virtual machine migration time. The implement and results of experiments on Kernel-based Virtual Machine indicate that the proposed scheme is feasible in function and performance.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3318265.3318275","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the popularity of virtualization technologies, virtualization security issues have been appeared, which greatly hampers the development of its further application. Bringing the encryption card to the virtual environment is a good idea to enforce the security of the virtual platform. However, due to the particularity of the encryption card equipment, there is some difficult to virtualize the encryption card equipment. One of the most important difficulties is supporting Live Migration. As for the first question that we must ensure the encryption task continuity when migrating a virtual encryption card, we propose the encryption field migration for the physical encryption card, which guarantees the continuity of virtualization encryption card. For the second problem that Live Migration of virtualization encryption card must be protected from any attack, this paper designs migration protocol to ensure the security. For the last problem that the encryption card live migration should not increase the migration time of virtual machine drastically, including total migration time and downtime, we separate the migration protocol to a different stage, and complete in the different stage of virtual machine migration. By this way, we decrease the influence of virtual machine migration time. The implement and results of experiments on Kernel-based Virtual Machine indicate that the proposed scheme is feasible in function and performance.
虚拟加密卡设备的实时迁移策略
随着虚拟化技术的普及,虚拟化安全问题也随之出现,极大地阻碍了其进一步应用的发展。将加密卡带到虚拟环境中是加强虚拟平台安全性的好主意。但是,由于加密卡设备的特殊性,对加密卡设备的虚拟化存在一定的困难。最重要的困难之一是支持实时迁移。对于第一个迁移虚拟加密卡时必须保证加密任务连续性的问题,我们提出了物理加密卡的加密字段迁移,保证了虚拟化加密卡的连续性。针对虚拟化加密卡的实时迁移必须防止任何攻击的问题,本文设计了迁移协议来保证安全性。针对加密卡实时迁移不应大幅增加虚拟机迁移时间(包括总迁移时间和停机时间)的最后一个问题,我们将迁移协议分离到不同的阶段,并在不同的阶段完成虚拟机迁移。通过这种方式,我们减少了虚拟机迁移时间的影响。在基于内核的虚拟机上的实现和实验结果表明,该方案在功能和性能上都是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信