Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Secure Virtual Machine Live Migration using Advanced Metric Encryption

Author(s): Gokul Geetha Narayanan and Ramaiah Kannan Saravanaguru*

Volume 16, Issue 6, 2023

Published on: 24 October, 2022

Article ID: e150822207489 Pages: 6

DOI: 10.2174/2666255816666220815145203

Price: $65

conference banner
Abstract

Cloud is based on the underlying technology of virtualization. Here, the physical servers are divided into multiple virtual servers. Through the technology of virtualization, each virtual server contains virtual machines. Live virtual machine migration is to have migration time and inactive time with minimal duration. Various machine-learning approaches have been investigated and research gaps were identified to enhance the security features during the migration process. Moreover, a secure virtual machine live migration is proposed using Advanced Metric Encryption (AME). Considering the duration of live migration in data centers as well as ensuring the security aspects, the proposed model has been tested and evaluated.

Keywords: Advanced Metric Encryption (AME), virtual machine, live migration, security, IP-Sec Tunneling.

Graphical Abstract

[1]
C. Jo, Y. Cho, and B. Egger, "A machine learning approach to live migration modeling", In Proceedings of the 2017 Symposium on Cloud Computing, 24 Sept, 2017, Santa Clara, California, 2017, pp. 351-364
[http://dx.doi.org/10.1145/3127479.3129262]
[2]
R. Divyambika, and A. Umamakeswari, "Protection of virtual machines during live migration in cloud environment", Indian J. Sci. Technol., vol. 8, no. S9, pp. 333-339, 2015.
[http://dx.doi.org/10.17485/ijst/2015/v8iS9/65589]
[3]
W. Fan, Z. Zhang, T. Wang, B. Hu, S. Qing, and D. Sun, "Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System", In: Lam KY., Chi CH., Qing S., Eds., Information and Communications Security. ICICS 2016. Lecture Notes in Computer Science, vol. 9977. Springer, Cham, 2016.
[http://dx.doi.org/10.1007/978-3-319-50011-9_5]
[4]
S.B. Rathod, and V.K. Reddy, "Ndynamic framework for secure vm migration over cloud computing", J. Inform. Process. Sys., vol. 13, no. 3, pp. 476-490, 2017.
[5]
F. Miao, L. Wang, and Z. Wu, "A VM placement-based approach to proactively mitigate co-resident attacks in cloud", In 2018 IEEE Symposium on Computers and Communications (ISCC), 25-28 June, 2018, Natal, Brazil, 2018, pp. 00285-00291
[http://dx.doi.org/10.1109/ISCC.2018.8538543]
[6]
Z. Mavus, and P. Angin, "A secure model for efficient live migration of containers", J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl., vol. 10, no. 3, pp. 21-44, 2019.
[7]
H. Deylami, J. Gutierrez, and R. Sinha, "More than old wine in new bottles: A secure live virtual machine job migration framework for cloud systems integrity", In 2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU), 5-8 Oct, 2018, Auckland, New Zealand, 2018, pp. 1-8
[http://dx.doi.org/10.23919/ICMU.2018.8653611]
[8]
N.P. John, and V.R. Bindu, "An optimal sanitization algorithm based secure migration of virtual machines in cloud datacenters", Indian J. Comput. Sci. Eng., vol. 12, no. 3, pp. 709-718, 2021.
[9]
G.G. Narayanan, S.R. Ranganathan, and S. Karthik, "An efficient user revocation and encryption methods for secure multi-owner data sharing to dynamic groups in the cloud", Comput. Softw., vol. 9, no. 5, pp. 825-900, 2014.
[10]
S. Das, A.M. Mahfouz, and S. Shiva, "A stealth migration approach to moving target defense in cloud computing", In Proceedings of the Future Technologies Conference, vol. 1069, Springer, Cham, 2019, pp. 394-410
[11]
S. Achleitner, T. La Porta, P. McDaniel, S.V. Krishnamurthy, A. Poylisher, and C. Serban, "Stealth migration: Hiding virtual machines on the network", In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-4 May, 2017, Atlanta, GA: USA, 2017, pp. 1-9

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy