skip to main content
10.1145/2898445.2898446acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing

Authors Info & Claims
Published:30 May 2016Publication History

ABSTRACT

Virtual machine live migration technology, as an important support for cloud computing, has become a central issue in recent years. The virtual machines' runtime environment is migrated from the original physical server to another physical server, maintaining the virtual machines running at the same time. Therefore, it can make load balancing among servers and ensure the quality of service. However, virtual machine migration security issue cannot be ignored due to the immature development of it. This paper we analyze the security threats of the virtual machine migration, and compare the current proposed protection measures. While, these methods either rely on hardware, or lack adequate security and expansibility. In the end, we propose a security model of live virtual machine migration based on security policy transfer and encryption, named as SPLM (Security Protection of Live Migration) and analyze its security and reliability, which proves that SPLM is better than others. This paper can be useful for the researchers to work on this field. The security study of live virtual machine migration in this paper provides a certain reference for the research of virtualization security, and is of great significance.

References

  1. M. Alhashmi and R.U. Creative. A View of Cloud Computing. International Journal of Computers & Technology, 53(4):50--58, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. J. Adair. A virtual machine system for the 360/40. International Business Machines Corporation, Cambridge Scientific Center, 1966.Google ScholarGoogle Scholar
  3. L. Qian, Z. Luo, Y. Du and L Guo. Cloud computing: an overview. Cloud Computing, Springer Berlin Heidelberg, 626--631, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. ACM Sigplan Notices, 41(11): 2--13, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. V. Cleeff, W. Pieters and R. Wieringa. Security implications of virtualization: A literature study. In Proceedings of the 2009 International Conference on Computational Science and Engineering, pages 353--358, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. G. Feng, M. Zhang, Y. Zhang and X. Zhen. Study on cloud computing security. Journal of software, 22(1): 71--83, 2011.Google ScholarGoogle Scholar
  7. C. Clark, K. Fraser, S. Hand, J. G. Hansen and E. Jul. Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, Volume 2 of USENIX Association, pages 273--286, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Nelson, B. H. Lim and G. Hutchins. Fast Transparent Migration for Virtual Machines. In USENIX Annual Technical Conference, General Track, pages 391--394, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Oberheide, E. Cooke and F. Jahanian. Empirical exploitation of live virtual machine migration. In Proceedings of BlackHat DC convention, 2008.Google ScholarGoogle Scholar
  10. P. Barham, B. Dragovic, K. Fraser, S. Hand and A. Warfield. Xen and the art of virtualization. ACM SIGOPS Operating Systems Review, 37(5): 164--177, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Kivity, Y. Kamay, D. Laor and U. Lublin. kvm: the Linux virtual machine monitor. In Proceedings of the Linux Symposium, volume 1, pages 225--230, 2007.Google ScholarGoogle Scholar
  12. C. A. Waldspurger. Memory resource management in VMware ESX server. ACM SIGOPS Operating Systems Review, 36(SI): 181--194, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Aslam, C. Gehrmann and M. Björkman. Security and trust preserving vm migrations in public clouds. In Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trust Com), pages 869--876, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Zhang, Y. Huang, H. Wang, H. Chen and B. Zang. PALM: security preserving VM live migration for systems with VMM-enforced protection. In Proceedings of the 3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC), pages 9--18, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. R. Hines and K. Gopalan. Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 51--60, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Fan, W. Huang, F. Jiang, C. Liu, B. Lv and R. Wang. Research on Security of Memory Leakage in Live Migration Based Vitualization. In Proceedings of 24th National Conference on Information Security, pages 12--17, 2014.Google ScholarGoogle Scholar
  17. Y. Hu, S. Panhale, T. Li, E. Kaynar, D. Chan, U. Deshpande, P. Yang and K. Gopalan. Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines. In Proceedings of the IEEE 8th International Conference on Cloud Computing, pages 613--620, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. B. Rathod and V. K. Reddy. Secure Live VM Migration in Cloud Computing: A Survey. International Journal of Computer Applications, 103(2), 2014.Google ScholarGoogle ScholarCross RefCross Ref
  19. M. Aiash, G. Mapp and O. Gemikonakli. Secure live virtual machines migration: issues and solutions. In Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, pages 160--165, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Z. Wang Z and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In 2010 IEEE Symposium on Security and Privacy (SP), pages 380--395, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Shetty and A. MR. A survey on techniques of secure live migration of virtual machine. International Journal of Computer Applications, 39(12): 34--39, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  22. X. Chen, X. Gao, H. Wan, S. Wang and X. Long. Application-Transparent Live Migration for virtual machine on network security enhanced hypervisor. China Communications, 2011, 8(3):32--42, 2011.Google ScholarGoogle Scholar
  23. B. Sulaiman, N. Azman and H. Masuda. Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation. In Proceedings of the 3rd International Conference on Advanced Applied Informatics, pages 687--693, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  24. W. Wang, Y. Zhang, B. Lin and K. Miao. Secured and reliable VM migration in personal cloud. In Proceedings of the 2nd International Conference on Computer Engineering and Technology, pages 705--709, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  25. O. Levy, A. Kumar and P. Goel. Advanced Security Features of Intel vPro Technology. Intel Technology Journal, 12(4), 2008.Google ScholarGoogle Scholar
  26. B. Danev B, R. J. Masti, G. O. Karame and S. Capkun. Enabling secure VM-vTPM migration in private clouds. In Proceedings of the 27th Annual Computer Security Applications Conference, ACM, pages 187--196, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. W. Fan, C. Kong, Z. Zhang, T. Wang, J. Zhang and W. Huang. Security Protection Model on Live Migration for KVM Virtualization. Journal of Software, in press.Google ScholarGoogle Scholar
  28. Trusted Computing Group, http://www.trustedcomputing group.org.Google ScholarGoogle Scholar

Index Terms

  1. SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SCC '16: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing
      May 2016
      98 pages
      ISBN:9781450342858
      DOI:10.1145/2898445

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 May 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SCC '16 Paper Acceptance Rate12of31submissions,39%Overall Acceptance Rate64of159submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader