|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 127 - Issue 4 |
| Published: October 2015 |
| Authors: Santosh Kumar Majhi, Sunil Kumar Dhal |
10.5120/ijca2015906364
|
Santosh Kumar Majhi, Sunil Kumar Dhal . A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure. International Journal of Computer Applications. 127, 4 (October 2015), 10-14. DOI=10.5120/ijca2015906364
@article{ 10.5120/ijca2015906364,
author = { Santosh Kumar Majhi,Sunil Kumar Dhal },
title = { A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure },
journal = { International Journal of Computer Applications },
year = { 2015 },
volume = { 127 },
number = { 4 },
pages = { 10-14 },
doi = { 10.5120/ijca2015906364 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2015
%A Santosh Kumar Majhi
%A Sunil Kumar Dhal
%T A Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure%T
%J International Journal of Computer Applications
%V 127
%N 4
%P 10-14
%R 10.5120/ijca2015906364
%I Foundation of Computer Science (FCS), NY, USA
Virtual machine migration (VMM) is one of important services is used as a tool to facilitate system maintenance, load balancing, fault tolerance, on-demand service offerings. Live VMM transfers an active Virtual Machine (VM) from one physical host to another across different data centres. It involves a sequence of operations in iteration under a specific protocol/method for migrating execution context (active memory) and control data of a VM to the destination machine. These operations are dependent on data transfer schedule, availability of resources and overall timing constraints. The migration process is implemented by establishing shared network storage and/or a network communication channel. Along with the execution context the security configuration of the VM need to be transferred. In this paper we have proposed a security context migration framework. Both the static as well as dynamic security context is considered for migration.