Research Article
A Secure Architecture for Inter-cloud Virtual Machine Migration
@INPROCEEDINGS{10.1007/978-3-319-23829-6_2, author={Tayyaba Zeb and Abdul Ghafoor and Awais Shibli and Muhammad Yousaf}, title={A Secure Architecture for Inter-cloud Virtual Machine Migration}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Authentication Authorization Cloud computing Confidentiality ECDH Integrity SHA-256 Virtual machine migration}, doi={10.1007/978-3-319-23829-6_2} }
- Tayyaba Zeb
Abdul Ghafoor
Awais Shibli
Muhammad Yousaf
Year: 2015
A Secure Architecture for Inter-cloud Virtual Machine Migration
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_2
Abstract
Virtual machine migration is an important tool that can be used in cloud computing environment for load balancing, disaster recovery, server consolidation, hardware maintenance, etc. Currently a few techniques have been proposed to secure the virtual machine migration process. However, these techniques have number of limitations e.g. lack of standard access control, mutual authentication, confidentiality, non-repudiation and integrity of VM data. Some of the techniques provide security services such as mutual authentication using TPM (Trusted Platform Module), however, not all the hardware platforms yet possess the TPM capability. This limits the deployment of such solutions in legacy systems. The architecture, presented in this paper, attempts to overcome these limitations with existing hardware support. In particular, we designed a secure and efficient protocol that migrates virtual machine from source cloud domain to destination cloud domain by considering fundamental security services such as confidentiality, integrity, standard access control and non-repudiation.