CFP last date
22 April 2024
Reseach Article

A Survey on Techniques of Secure Live Migration of Virtual Machine

by Jyoti Shetty, Anala M R, Shobha G
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 12
Year of Publication: 2012
Authors: Jyoti Shetty, Anala M R, Shobha G
10.5120/4875-7305

Jyoti Shetty, Anala M R, Shobha G . A Survey on Techniques of Secure Live Migration of Virtual Machine. International Journal of Computer Applications. 39, 12 ( February 2012), 34-39. DOI=10.5120/4875-7305

@article{ 10.5120/4875-7305,
author = { Jyoti Shetty, Anala M R, Shobha G },
title = { A Survey on Techniques of Secure Live Migration of Virtual Machine },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 12 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number12/4875-7305/ },
doi = { 10.5120/4875-7305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:18.839567+05:30
%A Jyoti Shetty
%A Anala M R
%A Shobha G
%T A Survey on Techniques of Secure Live Migration of Virtual Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 12
%P 34-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the technology for sensitive applications. This paper is an investigation of attacks on live migration of virtual machine and discusses the key proposed and implemented approaches to secure live migration.

References
  1. R. Adair, R. Bayles, L. Comeau, and R. Creasy, A virtual machine system for the 360/40," 1966.
  2. Mendel Rosenblum. The reincarnation of virtual machines. Queue, 2(5):34-40, 2004.
  3. Gerald J Popek and Robert P Goldberg. Formal requirements for virtualizable third generation architectures. In SOSP ’73: proceedings of the fourth ACM symposium on operating system principles page 121, 1973.
  4. Chen Xianqin, Gao Xiaopeng, Wan Han, Wang Sumei, Long Xiang. Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor. Research paper. China Communications. Page 32 – 42, 2011.5.
  5. Melvin Ver. Dynamic Load Balancing Based On Live Migration Of Virtual Machines: Security Threats and Effects. Thesis report Rochester Institute of Technology, B. Thomas Golisano College of Computing and Information Sciences (GCCIS), Rochester, NY, U.S.A.
  6. Jon Oberheide, Evan Cooke, Farnam Jahanian. Empirical Exploitation of live migration of virtual machines. Proc of Black Hat DC, March 24, 2008.
  7. Xen users’ manual Xen v3.3. http://bits.xensource.com/Xen/docs/user.pdf
  8. Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford. Eliminating the hypervisor Attack Surface for a More Secure Cloud. In Proceedings of ACM Conference on Computer and communications Security’ 2011. PP 401-412
  9. National Vulnerability Database, CVE and CCE Statistics Query Page. http://web.nvd.nist.gov/view/vuln/statistics
  10. Alternatives for Securing Virtual Networks: A Different Network Requires a Different Approach—Extending Security to the Virtual World. white paper 1000220-012-EN Dec 2011, Juniper Networks, Inc.
  11. C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In Proc. of NSDI’05, pages 273–286, Berkeley, CA, USA, 2005.USENIX Association.
  12. Wei Wang†, Xiaoxin Wu, Ben Lin, Kai Miao, Xiaoyan Dang. Secured VM Live Migration in Personal Cloud. In Proceedings of 16th ACM Conference on Computer and Communications Security, CCS, 2009. ICCET, China.
  13. Dewan, P., Durham, D., Khosravi, H., Long, M., and Nagabhushan, G. A hypervisor-based system for protecting software runtime memory and persistent storage. In Proceedings of the 2008 Spring Simulation Multiconference (Ottawa, Canada, April 14 - 17, 2008).
  14. Boris Dandev, Ramya Jayram Masti, Ghassan Karame, Srdjan Capkun “Enabling Secure VM-vTPM Migration in private clouds” In Proceedings of the Annual computer Security Applications conference (ACSAC) 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Live migration virtualization security issues virtual machine virtual machine monitor