CFP last date
20 May 2024
Reseach Article

Secure Live VM Migration in Cloud Computing: A Survey

by Suresh B.rathod, V.krishna Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 2
Year of Publication: 2014
Authors: Suresh B.rathod, V.krishna Reddy
10.5120/18045-8936

Suresh B.rathod, V.krishna Reddy . Secure Live VM Migration in Cloud Computing: A Survey. International Journal of Computer Applications. 103, 2 ( October 2014), 18-22. DOI=10.5120/18045-8936

@article{ 10.5120/18045-8936,
author = { Suresh B.rathod, V.krishna Reddy },
title = { Secure Live VM Migration in Cloud Computing: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 2 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number2/18045-8936/ },
doi = { 10.5120/18045-8936 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:30.335833+05:30
%A Suresh B.rathod
%A V.krishna Reddy
%T Secure Live VM Migration in Cloud Computing: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 2
%P 18-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing (CC) refers to delivering applications, platform used to execute user application and Infrastructure to fulfill user hardware requirement as a service over internet. Virtual Machine (VM) is normally stored on Datacenters who consist of set of physical servers where VM is executing to fulfill service when gets accessed by end user. VM controlled by hypervisor also termed as VM Monitor (VMM). VMM manages VM execution, decides which VM to be selected for migration and how VM to be migrated. VM migration can be done by considering centralize VM migration or distributed approach. Once Migration decision done a caution need to be needed whether a VM to be transferred is free from attack, and the destination where VM is about to migrate is safe to execute on destination server. Considered a VM page is open to attack, it can be compromised by end world, also a destination server.

References
  1. Chunxiao Li, Anand Raghunathan, Niraj K. Jha "Secure Virtual Machine Execution under an Untrusted Management OS" 2010 IEEE 3rd International Conference on Cloud Computing.
  2. Diego Perez-Botero "A Brief Tutorial on Live Virtual Machine Migration From a Security Perspective" International Journal of Computer Applications International Journal of Computer Applications.
  3. K. Mukherjee "A secure Cloud 2010," International Conference on Recent Trends in Information, Telecommunication and Computing.
  4. Wei Wang, Xiaoxin Wu, Ben Lin, Kai Miao, Xiaoyan Dang "Secured VM Live Migration in Personal Cloud," IEEE, 2010.
  5. Flavio Lombardi a, RobertoDiPietro b,c, "Secure virtualization for cloud computing"
  6. Mahdi Aiash, Glenford Mapp, Orhan Gemikonakli "Secure Live Virtual Machines Migration: Issues and Solutions".
  7. Tom Liston, Senior Security Consultant – Intelguardians Handler – SANS Internet Storm Center "On the Cutting Edge: Thwarting Virtual Machine Detection".
  8. Jie Zheng, T. S. Eugene Ng, Kunwadee Sripanidkulchai, Zhaolei Liu "Pacer: A Progress Management System for Live Virtual Machine Migration in Cloud Computing," IEEE transactions on network and service management.
  9. NIST "Guildeline on security and proivacy in public cloud computing," December 2011.
  10. Xiaoying Wang, Xiaojing Liu, Lihua Fan, and Xuhan Jia "Research Article:A Decentralized Virtual Machine Migration Approach ofData Centers for Cloud Computing," Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013, Article ID 878542.
  11. Hai Jinn, WeiGao , SongWu, XuanhuaShi , XiaoxinWu,FanZhou "Optimizing the live migration of virtual machine by CPU scheduling," Journal of Network and Computer Applications 34(2011)1088–1096.
  12. Chunxiao Li, Anand Raghunathan, Niraj K. Jha "Secure Virtual Machine Execution under an Untrusted Management OS" 2010 IEEE 3rd International Conference on Cloud Computing.
  13. Farzad Sabahi "Secure Virtualization for Cloud Environment Using Hypervisor-based Technology" International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012.
  14. Yueqi ang Cheng Guardian: Hypervisor as Security Foothold for Personal Computers M. Huth et al. (Eds. ): TRUST 2013, LNCS 7904, pp. 19–36, 2013. c©Springer-Verlag Berlin Heidelberg 2013.
  15. C. Xianqin, G. Xiaopeng, W. Han, W. Sumei, L. Xiang. Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor. Research paper. China Communications. Page 32 42, 2011. Jenni Susan Reuben "A Survey on Virtual Machine Security," TKK T-110. 5290 Seminar on Network Security 2007-10-11/12.
  16. RaviTeja Kanakala, V. Krishna Reddy, K. Thirupathi Rao "Analysis on Virtualization Technologies in Cloud," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) , Volume 3 Issue 7, pp 2567-2574, July 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security VM migration.