DOI QR코드

DOI QR Code

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B. (Dept. of Computer Science and Engineering, KL University) ;
  • Reddy, V. Krishna (Dept. of Computer Science and Engineering, KL University)
  • Received : 2016.08.18
  • Accepted : 2017.04.11
  • Published : 2017.06.30

Abstract

In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

Keywords

References

  1. J. S. Reuben, "A survey on virtual machine security," in Proceedings of TKK T-110.5290 Seminar on Network Security, 2007.
  2. H. Jin, W. Gao, S. Wu, X. Shi, X. Wu, and F. Zhou, "Optimizing the live migration of virtual machine by CPU scheduling," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1088-1096, 2011. https://doi.org/10.1016/j.jnca.2010.06.013
  3. D. S. Dias and L. H. M. Costa, "Online traffic-aware virtual machine placement in data center networks," in Proceedings of Global Information Infrastructure and Networking Symposium (GIIS), Choroni, Venezuela, 2012, pp. 1-8.
  4. V. Mann, A. Kumar, P. Dutta, and S. Kalyanaraman, "VMFlow: leveraging VM mobility to reduce network power costs in data centers," in Proceedings of the 10th International IFIP TC6 Conference on Networking, Valencia, Spain, 2011, pp. 198-211.
  5. H. Jin, S. Ibrahim, T. Bell, W. Gao, D. Huang, and S. Wu, "Cloud types and services," in Handbook of Cloud Computing. New York, NY: Springer, 2010, pp. 335-355.
  6. U. Deshpande and K. Keahey, "Traffic-sensitive live migration of virtual machines," in Proceedings of 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Shenzhen, China, 2015, pp. 51-60.
  7. R. Narayani and W. A. Banu, "Framework for provenance based virtual machine placement in cloud," International Journal of Education and Management Engineering, vol. 5, no. 1, pp. 19-26, 2015. https://doi.org/10.5815/ijeme.2015.01.03
  8. X. Meng, V. Pappas, and L. Zhang, "Improving the scalability of data center networks with traffic-aware virtual machine placement," in Proceedings of INFOCOM, San Diego, CA, 2010, pp. 1-9.
  9. H. Mi, H. Wang, G. Yin, Y. Zhou, D. Shi, and L. Yuan, "Online self-reconfiguration with performance guarantee for energy-efficient large-scale cloud computing data centers," in Proceedings of 2010 IEEE International Conference on Services Computing (SCC), Miami, FL, 2010, pp. 514-521.
  10. National Institute of Standards and Technology (NIST) cloud computing program [Online]. Available: http://www.nist.gov/.
  11. P. Xiao, Z. Hu, D. Liu, G. Yan, and X. Qu, "Virtual machine power measuring technique with bounded error in cloud environments," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 818-828, 2013. https://doi.org/10.1016/j.jnca.2012.12.002
  12. Y. Luo, B. Zhang, X. Wang, Z. Wang, Y. Sun, and H. Chen, "Live and incremental whole-system migration of virtual machines using block-bitmap," in Proceedings of 2008 IEEE International Conference on Cluster Computing, Tsukuba, Japan, 2008, pp. 99-106.
  13. D. Perez-Botero, "A brief tutorial on live virtual machine migration from a security perspective," University of Princeton, Princeton, NJ, 2011.
  14. C. Li, A. Raghunathan and N. K. Jha, "A trusted virtual machine in an untrusted management environment," IEEE Transactions on Services Computing, vol. 5, no. 4, pp. 472-483, 2012. https://doi.org/10.1109/TSC.2011.30
  15. J. Dong, X. Jin, H. Wang, Y. Li, P. Zhang, and S. Cheng, "Energy-saving virtual machine placement in cloud data centers," in Proceedings of 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Delft, Netherlands, 2013, pp. 618-624.
  16. F. Sabahi, "Secure virtualization for cloud environment using hypervisor-based technology," International Journal of Machine Learning and Computing, vol. 2, no. 1, pp. 39-45, 2012.
  17. Y. Cheng and X. Ding, "Guardian: hypervisor as security foothold for personal computers," in Trust and Trustworthy Computing. Heidelberg: Springer, 2013, pp. 19-36.
  18. X. Chen, X. Gao, H. Wan, S. Wang, and X. Long, "Application-transparent live migration for a virtual machine on network security enhanced hypervisor," China Communications, vol. 8, no. 3, pp. 32-42, 2011.
  19. E. Feller, C. Morin, and A. Esnault, "A case for fully decentralized dynamic VM consolidation in clouds," in Proceedings of 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, 2012, pp. 26-33.
  20. T. Hirofuchi, H. Nakada, S. Itoh, and S. Sekiguchi, "Reactive consolidation of virtual machines enabled by postcopy live migration," in Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing, San Jose, CA, 2011, pp. 11-18.
  21. X. Wang, X. Liu, L. Fan, and X. Jia, "A decentralized virtual machine migration approach of data centers for cloud computing," Mathematical Problems in Engineering, vol. 2013, article no. 878542, 2013.
  22. W. F. Hsu, G. H. Luo, S. M. Yuan, and C. T. Tsai, "Constructing private cloud storage using network attached storage," in Proceedings of 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), Fukuoka, Japan, 2012, pp. 713-718.
  23. R. Delgado, "The need for decentralized cloud computing," 2015 [Online]. Available: https://www.socpub.com/articles/the-need-for-decentralized-cloud-computing-14741.
  24. Amazon Web Services, "AWS Well-Architected Framework," October 2015 [Online]. Available: https://aws.amazon.com/ko/blogs/aws/are-you-well-architected/.
  25. D. Diaconescu, F. Pop, and V. Cristea, "Energy-aware placement of VMs in a datacenter," in Proceedings of 2013 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania, 2013, pp. 313-318.
  26. M. Mukhtarov, N. Miloslavskaya, and A. Tolstoy, "Network security threats and cloud infrastructure services monitoring," in Proceedings of 7th International Conference on Networking and Services, Venice/Mestre, Italy, 2011, pp. 141-145.
  27. A. Shribman and B. Hudzia, "Pre-copy and post-copy VM live migration for memory intensive applications," in European Conference on Parallel Processing. Heidelberg: Springer, 2012, pp. 539-547.
  28. M. Nanavati, P. Colp, B. Aiello, and A. Warfield, "Cloud security: a gathering storm," Communications of the ACM, vol. 57, no. 5, pp. 70-79, 2014. https://doi.org/10.1145/2593686
  29. M. Pantazoglou, G. Tzortzakis, and A. Delis, "Decentralized and energy-efficient workload management in enterprise clouds," IEEE Transactions on Cloud Computing, vol. 4, no. 2, pp. 196-209, 2016. https://doi.org/10.1109/TCC.2015.2464817
  30. D. Loreti and A. Ciampolini, "A decentralized approach for virtual infrastructure management in cloud datacenters," International Journal on Advances in Intelligent Systems, vol. 7, no. 3/4, pp. 507-518, 2014.
  31. N. Ahmad, A. Kanwal, and M. A. Shibli, “Survey on secure live virtual machine (VM) migration in Cloud,”in Proceedings of 2013 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan, 2013,pp. 101-106.
  32. G. Booth, A. Soknacki, and A. Somayaji, “Cloud security: attacks and current defenses,” in Proceedings of 8thAnnual Symposium on Information Assurance (ASIA'13), Albany, NY, 2013, pp. 4-5.
  33. S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, “vTPM: virtualizing the trustedplatform module,” in Proceedings of 15th Conference on USENIX Security Symposium, Vancouver, Canada, 2006,pp. 305-320.