{"title":"基于边缘计算环境的虚拟机安全迁移策略","authors":"Ruizhong Du, Wangkai He, Junfeng Tian","doi":"10.1109/MSN50589.2020.00137","DOIUrl":null,"url":null,"abstract":"For mobile edge computing, the migration time between traditional cloud servers and edge devices is long, and there are security issues such as man-in-the-middle attacks in the process. In this regard, a migration scheme centered on edge nodes is proposed. The edge node is closer to the edge device, which can shorten the migration time. The solution uses the Transport Layer Security (TLS) protocol for key exchange to establish a session-secure communication channel, and virtual machine migration between edge devices is carried out in the channel by dynamic migration. The simulation results show that compared with that of other schemes, the migration time of the virtual machines is shortened. Security analysis shows that this solution can not only meet the requirements of data confidentiality and integrity but also resist man-in-the-middle attacks.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Virtual Machine Security Migration Strategy Based on the Edge Computing Environment\",\"authors\":\"Ruizhong Du, Wangkai He, Junfeng Tian\",\"doi\":\"10.1109/MSN50589.2020.00137\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For mobile edge computing, the migration time between traditional cloud servers and edge devices is long, and there are security issues such as man-in-the-middle attacks in the process. In this regard, a migration scheme centered on edge nodes is proposed. The edge node is closer to the edge device, which can shorten the migration time. The solution uses the Transport Layer Security (TLS) protocol for key exchange to establish a session-secure communication channel, and virtual machine migration between edge devices is carried out in the channel by dynamic migration. The simulation results show that compared with that of other schemes, the migration time of the virtual machines is shortened. Security analysis shows that this solution can not only meet the requirements of data confidentiality and integrity but also resist man-in-the-middle attacks.\",\"PeriodicalId\":447605,\"journal\":{\"name\":\"2020 16th International Conference on Mobility, Sensing and Networking (MSN)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 16th International Conference on Mobility, Sensing and Networking (MSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MSN50589.2020.00137\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN50589.2020.00137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Virtual Machine Security Migration Strategy Based on the Edge Computing Environment
For mobile edge computing, the migration time between traditional cloud servers and edge devices is long, and there are security issues such as man-in-the-middle attacks in the process. In this regard, a migration scheme centered on edge nodes is proposed. The edge node is closer to the edge device, which can shorten the migration time. The solution uses the Transport Layer Security (TLS) protocol for key exchange to establish a session-secure communication channel, and virtual machine migration between edge devices is carried out in the channel by dynamic migration. The simulation results show that compared with that of other schemes, the migration time of the virtual machines is shortened. Security analysis shows that this solution can not only meet the requirements of data confidentiality and integrity but also resist man-in-the-middle attacks.