{"title":"云环境下动态虚拟机(VM)安全迁移研究","authors":"Naveed Ahmad, A. Kanwal, M. A. Shibli","doi":"10.1109/NCIA.2013.6725332","DOIUrl":null,"url":null,"abstract":"The core of Cloud computing includes virtualization of hardware resources such as storage, network and memory provided through virtual machines (VM). The live migration of these VMs is introduced to obtain multiple benefits which mainly include high availability, hardware maintenance, fault takeover and workload balancing. Besides various facilities of the VM migration, it is susceptible to severe security risks during migration process due to which the industry is hesitant to accept it. The research done so far is on the performance of migration process; whereas the security aspects in migration are not fully explored. We have carried out an extensive survey to investigate the vulnerabilities, threats and possible attacks on the live VM migration. Furthermore, we have identified security requirements for secure VM migration and presented a detailed analysis of existing solutions on the basis of these security requirements. Finally, limitations in the existing solutions are presented.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Survey on secure live virtual machine (VM) migration in Cloud\",\"authors\":\"Naveed Ahmad, A. Kanwal, M. A. Shibli\",\"doi\":\"10.1109/NCIA.2013.6725332\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The core of Cloud computing includes virtualization of hardware resources such as storage, network and memory provided through virtual machines (VM). The live migration of these VMs is introduced to obtain multiple benefits which mainly include high availability, hardware maintenance, fault takeover and workload balancing. Besides various facilities of the VM migration, it is susceptible to severe security risks during migration process due to which the industry is hesitant to accept it. The research done so far is on the performance of migration process; whereas the security aspects in migration are not fully explored. We have carried out an extensive survey to investigate the vulnerabilities, threats and possible attacks on the live VM migration. Furthermore, we have identified security requirements for secure VM migration and presented a detailed analysis of existing solutions on the basis of these security requirements. Finally, limitations in the existing solutions are presented.\",\"PeriodicalId\":222016,\"journal\":{\"name\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIA.2013.6725332\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 2nd National Conference on Information Assurance (NCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIA.2013.6725332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey on secure live virtual machine (VM) migration in Cloud
The core of Cloud computing includes virtualization of hardware resources such as storage, network and memory provided through virtual machines (VM). The live migration of these VMs is introduced to obtain multiple benefits which mainly include high availability, hardware maintenance, fault takeover and workload balancing. Besides various facilities of the VM migration, it is susceptible to severe security risks during migration process due to which the industry is hesitant to accept it. The research done so far is on the performance of migration process; whereas the security aspects in migration are not fully explored. We have carried out an extensive survey to investigate the vulnerabilities, threats and possible attacks on the live VM migration. Furthermore, we have identified security requirements for secure VM migration and presented a detailed analysis of existing solutions on the basis of these security requirements. Finally, limitations in the existing solutions are presented.