{"title":"通过运行时监视器安全实时虚拟机迁移","authors":"Ahmed M. Mahfouz, Md Lutfar Rahman, S. Shiva","doi":"10.1109/IC3.2017.8284316","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new model for live migration of virtual machines (VMs) in a secure environment. The live migration of a VM is the process of moving the VM from one physical host to another without interrupting any of the VM running services. We review the stages of the live migration process and identify the threats to it. Also, we propose our migration model that fulfills the most security requirements for secure live VM migration process.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Secure live virtual machine migration through runtime monitors\",\"authors\":\"Ahmed M. Mahfouz, Md Lutfar Rahman, S. Shiva\",\"doi\":\"10.1109/IC3.2017.8284316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new model for live migration of virtual machines (VMs) in a secure environment. The live migration of a VM is the process of moving the VM from one physical host to another without interrupting any of the VM running services. We review the stages of the live migration process and identify the threats to it. Also, we propose our migration model that fulfills the most security requirements for secure live VM migration process.\",\"PeriodicalId\":147099,\"journal\":{\"name\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2017.8284316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Tenth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2017.8284316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure live virtual machine migration through runtime monitors
In this paper, we propose a new model for live migration of virtual machines (VMs) in a secure environment. The live migration of a VM is the process of moving the VM from one physical host to another without interrupting any of the VM running services. We review the stages of the live migration process and identify the threats to it. Also, we propose our migration model that fulfills the most security requirements for secure live VM migration process.