AUT LibraryAUT
View Item 
  •   Open Research
  • Faculties
  • Faculty of Design and Creative Technologies (Te Ara Auaha)
  • School of Engineering, Computer and Mathematical Sciences - Te Kura Mātai Pūhanga, Rorohiko, Pāngarau
  • View Item
  •   Open Research
  • Faculties
  • Faculty of Design and Creative Technologies (Te Ara Auaha)
  • School of Engineering, Computer and Mathematical Sciences - Te Kura Mātai Pūhanga, Rorohiko, Pāngarau
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Tailoring the Cyber Security Framework: How to Overcome the Complexities of Secure Live Virtual Machine Migration in Cloud Computing

Deylami, H; Gutierrez, J; Sinha, R
Thumbnail
View/Open
Conference Contribution (550.4Kb)
Permanent link
http://hdl.handle.net/10292/13731
Metadata
Show full metadata
Abstract
This paper proposes a novel secure live virtual machine migration framework by using a virtual trusted platform module instance to improve the integrity of the migration process from one virtual machine to another on the same platform. The proposed framework, called Kororā, is designed and developed on a public infrastructure-as-a-service cloud-computing environment and runs concurrently on the same hardware components (Input/Output, Central Processing Unit, Memory) and the same hypervisor (Xen); however, a combination of parameters needs to be evaluated before implementing Kororā. The implementation of Kororā is not practically feasible in traditional distributed computing environments. It requires fixed resources with high-performance capabilities, connected through a highspeed, reliable network. The following research objectives were determined to identify the integrity features of live virtual machine migration in the cloud system:

• To understand the security issues associated with cloud computing, virtual trusted platform modules, virtualization, live virtual machine migration, and hypervisors;

• To identify the requirements for the proposed framework, including those related to live VM migration among different hypervisors;

• To design and validate the model, processes, and architectural features of the proposed framework;

• To propose and implement an end-to-end security architectural blueprint for cloud environments, providing an integrated view of protection mechanisms, and then to validate the proposed framework to improve the integrity of live VM migration.

This is followed by a comprehensive review of the evaluation system architecture and the proposed framework state machine. The overarching aim of this paper, therefore, is to present a detailed analysis of the cloud computing security problem, from the perspective of cloud architectures and the cloud service delivery models. Based on this analysis, this study derives a detailed specification of the cloud live virtual machine migration integrity problem and key features that should be covered by the proposed framework.
Keywords
Cloud Computing Infrastructure; Computational Modeling; Virtualization and Security; Live Migration; Integrity; Organizations.
Date
September 1, 2020
Source
CONF-IRM 2020 Proceedings. 5. https://aisel.aisnet.org/confirm2020/5
Item Type
Conference Contribution
Publisher
Association for Information Systems (AIS)
Publisher's Version
https://aisel.aisnet.org/confirm2020/5/
Rights Statement
Authors retain copyright for material published as part of AIS conference proceedings.

Contact Us
  • Admin

Hosted by Tuwhera, an initiative of the Auckland University of Technology Library

 

 

Browse

Open ResearchTitlesAuthorsDateSchool of Engineering, Computer and Mathematical Sciences - Te Kura Mātai Pūhanga, Rorohiko, PāngarauTitlesAuthorsDate

Alternative metrics

 

Statistics

For this itemFor all Open Research

Share

 
Follow @AUT_SC

Contact Us
  • Admin

Hosted by Tuwhera, an initiative of the Auckland University of Technology Library