International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

A Secure Architecture for Inter-cloud Virtual Machine Migration

Download
327 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_2,
        author={Tayyaba Zeb and Abdul Ghafoor and Awais Shibli and Muhammad Yousaf},
        title={A Secure Architecture for Inter-cloud Virtual Machine Migration},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Authentication Authorization Cloud computing Confidentiality ECDH Integrity SHA-256 Virtual machine migration},
        doi={10.1007/978-3-319-23829-6_2}
    }
    
  • Tayyaba Zeb
    Abdul Ghafoor
    Awais Shibli
    Muhammad Yousaf
    Year: 2015
    A Secure Architecture for Inter-cloud Virtual Machine Migration
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_2
Tayyaba Zeb1,*, Abdul Ghafoor1,*, Awais Shibli1,*, Muhammad Yousaf2,*
  • 1: National University of Sciences and Technology
  • 2: Riphah International University
*Contact email: 11msccstzeb@seecs.edu.pk, abdul.ghafoor@seecs.edu.pk, awais.shibli@seecs.edu.pk, myousaf@ieee.org

Abstract

Virtual machine migration is an important tool that can be used in cloud computing environment for load balancing, disaster recovery, server consolidation, hardware maintenance, etc. Currently a few techniques have been proposed to secure the virtual machine migration process. However, these techniques have number of limitations e.g. lack of standard access control, mutual authentication, confidentiality, non-repudiation and integrity of VM data. Some of the techniques provide security services such as mutual authentication using TPM (Trusted Platform Module), however, not all the hardware platforms yet possess the TPM capability. This limits the deployment of such solutions in legacy systems. The architecture, presented in this paper, attempts to overcome these limitations with existing hardware support. In particular, we designed a secure and efficient protocol that migrates virtual machine from source cloud domain to destination cloud domain by considering fundamental security services such as confidentiality, integrity, standard access control and non-repudiation.