CFP last date
20 May 2024
Reseach Article

A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure

by Santosh Kumar Majhi, Sunil Kumar Dhal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 4
Year of Publication: 2015
Authors: Santosh Kumar Majhi, Sunil Kumar Dhal
10.5120/ijca2015906364

Santosh Kumar Majhi, Sunil Kumar Dhal . A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure. International Journal of Computer Applications. 127, 4 ( October 2015), 10-14. DOI=10.5120/ijca2015906364

@article{ 10.5120/ijca2015906364,
author = { Santosh Kumar Majhi, Sunil Kumar Dhal },
title = { A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 4 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number4/22716-2015906364/ },
doi = { 10.5120/ijca2015906364 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:58.616560+05:30
%A Santosh Kumar Majhi
%A Sunil Kumar Dhal
%T A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 4
%P 10-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Virtual machine migration (VMM) is one of important services is used as a tool to facilitate system maintenance, load balancing, fault tolerance, on-demand service offerings. Live VMM transfers an active Virtual Machine (VM) from one physical host to another across different data centres. It involves a sequence of operations in iteration under a specific protocol/method for migrating execution context (active memory) and control data of a VM to the destination machine. These operations are dependent on data transfer schedule, availability of resources and overall timing constraints. The migration process is implemented by establishing shared network storage and/or a network communication channel. Along with the execution context the security configuration of the VM need to be transferred. In this paper we have proposed a security context migration framework. Both the static as well as dynamic security context is considered for migration.

References
  1. Yuki Ashino and Masayuki Nakae, "Virtual Machine Migration Method between Different Hypervisor Implementations and its Evaluation", 26th International Conference on Advanced Information Networking and Applications Workshops, 2012.
  2. Zahra Tavakoli et al.,"A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment", In the IFIP, LNCS Vol. 7479, 2013.
  3. Clark et al.,"Live Migration of Virtual Machines", In the Proc. of USENIX Symposium on Networked Systems Design, 2005.
  4. X. Jiang et al.,“Violin: Virtual internetworking on overlay infrastructures,” in ISPA, 2005.
  5. “VMware Vnetwork distributed switches”, https://www.vmware.com/products/vnetworkdistributedswitch/overview.html.
  6. “Cisco Nexus 1000V Series Switches,” http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9902/data sheet c78492971.html.
  7. VMware VMotion for Live Migration of virtual machines, http://www.vmware.com/products/vi/vc/vmotion.html, July 14, 2014.
  8. V. Mann et al., "CrossRoad: Seamless VM Mobility Across Data Centres through Software Defined Networking", IEEE NOMS, 2012.
  9. A. Greenberg et al., “VL2:A Scalable and Flexible Data Center Network,” in ACM SIGCOMM, 2009.
  10. E. Silvera et al., “IP mobility to support live migration of virtual machine across subnets,” in SYSTOR, May 2009.
  11. “Open vSwitch - Open Virtual Switch,” http://www.openvswitch.org
  12. Bradford et al., “Live wide-area migration of virtual machines including local persistent state,” in ACM VEE, 2007.
  13. Y. Pu et al., “Cloud rack: Enhanced virtual topology migration approach with open vswitch,” in IEEE ICOIN, 2011.
  14. C. Kim et al., “Floodless in seattle: a scalable ethernet architecture forlarge enterprises,” in ACM SIGCOMM, 2008.
  15. R. Mysore et al., “PortLand: A Scalable Fault-Tolerant Layer 2 DataCenter Network Fabric,” in ACM SIGCOMM ,2009.
  16. “Virtual Private LAN Services (VPLS),” http://www.cisco.com/en/US/products/ps6648/ products ios protocol option home.html.
  17. B. Boughzala et al., “Openflow supporting inter-domain virtual machine migration,” in IEEE/IFIP WOCN, 2011.
  18. E. Harney et al., “The efficacy of live virtual machine migrations over the internet,” in ACM VTDC, 2007.
  19. F. Hao et al., “Enhancing dynamic cloud-based services using network virtualization,” ACM SIGCOMM CCR, 2010.
  20. Live migration, Available online: https://en.wikipedia.org/wiki/Live_migration
Index Terms

Computer Science
Information Sciences

Keywords

VM Migration Security Context Security Configuration