Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke
{"title":"A live migration strategy for virtual encryption card equipment","authors":"Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke","doi":"10.1145/3318265.3318275","DOIUrl":null,"url":null,"abstract":"With the popularity of virtualization technologies, virtualization security issues have been appeared, which greatly hampers the development of its further application. Bringing the encryption card to the virtual environment is a good idea to enforce the security of the virtual platform. However, due to the particularity of the encryption card equipment, there is some difficult to virtualize the encryption card equipment. One of the most important difficulties is supporting Live Migration. As for the first question that we must ensure the encryption task continuity when migrating a virtual encryption card, we propose the encryption field migration for the physical encryption card, which guarantees the continuity of virtualization encryption card. For the second problem that Live Migration of virtualization encryption card must be protected from any attack, this paper designs migration protocol to ensure the security. For the last problem that the encryption card live migration should not increase the migration time of virtual machine drastically, including total migration time and downtime, we separate the migration protocol to a different stage, and complete in the different stage of virtual machine migration. By this way, we decrease the influence of virtual machine migration time. The implement and results of experiments on Kernel-based Virtual Machine indicate that the proposed scheme is feasible in function and performance.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3318265.3318275","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the popularity of virtualization technologies, virtualization security issues have been appeared, which greatly hampers the development of its further application. Bringing the encryption card to the virtual environment is a good idea to enforce the security of the virtual platform. However, due to the particularity of the encryption card equipment, there is some difficult to virtualize the encryption card equipment. One of the most important difficulties is supporting Live Migration. As for the first question that we must ensure the encryption task continuity when migrating a virtual encryption card, we propose the encryption field migration for the physical encryption card, which guarantees the continuity of virtualization encryption card. For the second problem that Live Migration of virtualization encryption card must be protected from any attack, this paper designs migration protocol to ensure the security. For the last problem that the encryption card live migration should not increase the migration time of virtual machine drastically, including total migration time and downtime, we separate the migration protocol to a different stage, and complete in the different stage of virtual machine migration. By this way, we decrease the influence of virtual machine migration time. The implement and results of experiments on Kernel-based Virtual Machine indicate that the proposed scheme is feasible in function and performance.