Call for Paper - June 2019 Edition
IJCA solicits original research papers for the June 2019 Edition. Last date of manuscript submission is May 20, 2019. Read More

A Survey on Techniques of Secure Live Migration of Virtual Machine

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 39 - Number 12
Year of Publication: 2012
Jyoti Shetty
Anala M R
Shobha G

Jyoti Shetty, Anala M R and Shobha G. Article: A Survey on Techniques of Secure Live Migration of Virtual Machine. International Journal of Computer Applications 39(12):34-39, February 2012. Full text available. BibTeX

	author = {Jyoti Shetty and Anala M R and Shobha G},
	title = {Article: A Survey on Techniques of Secure Live Migration of Virtual Machine},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {39},
	number = {12},
	pages = {34-39},
	month = {February},
	note = {Full text available}


Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the technology for sensitive applications. This paper is an investigation of attacks on live migration of virtual machine and discusses the key proposed and implemented approaches to secure live migration.


  • R. Adair, R. Bayles, L. Comeau, and R. Creasy, A virtual machine system for the 360/40," 1966.
  • Mendel Rosenblum. The reincarnation of virtual machines. Queue, 2(5):34-40, 2004.
  • Gerald J Popek and Robert P Goldberg. Formal requirements for virtualizable third generation architectures. In SOSP ’73: proceedings of the fourth ACM symposium on operating system principles page 121, 1973.
  • Chen Xianqin, Gao Xiaopeng, Wan Han, Wang Sumei, Long Xiang. Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor. Research paper. China Communications. Page 32 – 42, 2011.5.
  • Melvin Ver. Dynamic Load Balancing Based On Live Migration Of Virtual Machines: Security Threats and Effects. Thesis report Rochester Institute of Technology, B. Thomas Golisano College of Computing and Information Sciences (GCCIS), Rochester, NY, U.S.A.
  • Jon Oberheide, Evan Cooke, Farnam Jahanian. Empirical Exploitation of live migration of virtual machines. Proc of Black Hat DC, March 24, 2008.
  • Xen users’ manual Xen v3.3.
  • Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford. Eliminating the hypervisor Attack Surface for a More Secure Cloud. In Proceedings of ACM Conference on Computer and communications Security’ 2011. PP 401-412
  • National Vulnerability Database, CVE and CCE Statistics Query Page.
  • Alternatives for Securing Virtual Networks: A Different Network Requires a Different Approach—Extending Security to the Virtual World. white paper 1000220-012-EN Dec 2011, Juniper Networks, Inc.
  • C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In Proc. of NSDI’05, pages 273–286, Berkeley, CA, USA, 2005.USENIX Association.
  • Wei Wang†, Xiaoxin Wu, Ben Lin, Kai Miao, Xiaoyan Dang. Secured VM Live Migration in Personal Cloud. In Proceedings of 16th ACM Conference on Computer and Communications Security, CCS, 2009. ICCET, China.
  • Dewan, P., Durham, D., Khosravi, H., Long, M., and Nagabhushan, G. A hypervisor-based system for protecting software runtime memory and persistent storage. In Proceedings of the 2008 Spring Simulation Multiconference (Ottawa, Canada, April 14 - 17, 2008).
  • Boris Dandev, Ramya Jayram Masti, Ghassan Karame, Srdjan Capkun “Enabling Secure VM-vTPM Migration in private clouds” In Proceedings of the Annual computer Security Applications conference (ACSAC) 2011.