Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.2.315

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration  

Lee, Eun-Ji (ISAA Lab., Department of Computer Engineering, Ajou University)
Park, Choon-Sik (Seoul Women's University)
Kwak, Jin (Department of Cyber Security, Ajou University)
Abstract
Security threats such as unauthorized access and data tampering can occur during the virtual machine migration process. In particular, since virtual machine migration requires users to transfer important data and infrastructure information, it is relatively risky to other cloud services in case of security threats. For this reason, there is a need for dynamic authentication for virtual machine migration. Therefore, this paper proposes an OTP-based dynamic authentication framework to improve the vulnerabilities of the existing authentication mechanism for virtual machine migration. It consists of a virtual machine migration request module and an operation module. The request module includes an OTP-based user authentication process and a migration request process to a data center when a user requests a migration. The operation module includes a secure key exchange process between the data centers using SPEKE and a TOTP-based mutual authentication process between the data center and the physical server.
Keywords
Virtual Machine Migration; Dynamic Authentication; OTP; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Devi, Y., Aruna, P., Sudha, D. "Security in virtual machine live migration for KVM" International Conference on Process Automation, Control and Computing (PACC), Aug. 2011
2 Tayyaba Zeb, Abdul Ghafoor, Awais Shibli, Muhammad Yousaf, "A Secure Architecture for Inter-cloud Virtual Machine Migration", International Conference on Security and Privacy in Communication Networks Volume 152 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp.24-35, Nov. 2015
3 CH. Venkateswara Rao, G. Varaprasad Rao, "Dynamic Authentication for Data Sharing in Multiple Clouds ", International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), Volume 1, pp.6-11, Nov. 2014
4 Wei Peng, Feng Li, and Xukai Zou, "Moving Target Defense for Cloud Infrastructures: Lessons from Botnets", High Performance Cloud Auditing and Applications, Springer Science+Business Media New York 2014, pp.35-64, 2014
5 Vikas Malik, C. R. Barde, "Live migration of Virtual Machines in Cloud Environment using Prediction of CPU Usage", International Journal of Computer Applications, Volume 117, No. 23, May. 2015
6 Santosh Kumar Majhi, Sunil Kumar Dhal, "An Authentication Framework for Securing Virtual Machine Migration", Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016
7 Sarbjeet Singh, "cloud computing using virtualization", May. 2015
8 Misbah Liaqat, Shalini Ninoriya, Junaid Shuja, Raja Wasim Ahmad, Abdullah Gani, "Virtual Machine Migration Enabled Cloud Resource Management: A Challenging Task", Distrib, Parallel, and Cluster Computing, Jan. 2016
9 Rakel Haakegaard, Joanna Lang, "The Elliptic Curve Diffie-Hellman (ECDH)", Dec. 2015
10 Issa Khalil, Ismail Hababeh, Abdallah Khreishah, "Secure Inter Cloud Data Migration", Information and Communication Systems (ICICS), Apr. 5-7, 2016
11 Sheren A. El-Booz, Gamal Attiya, Nawal El-Fishawy, "A secure cloud storage system combining time-based one-time password and automatic blocker protocol", International Computer Engineering Conference (ICENCO), Dec. 2015
12 Jing-Chiou Liou, "Performance Measures for Evaluating the Dynamic Authentication Techniques", International Journal of Cyber-Security and Digital Forensics (IJCSDF), Jan. 2016