because migration does not provide security features
such as confidentiality and authentication (Cooke et
al. 2008). Currently, CSPs are using different
security mechanisms for securing VMs in Cloud
such as encryption of disk images to counter attacks
(Kazim et al. 2013). However, VM migration with
metadata (keys of encrypted disk mages) is not
secure because of unavailability of strong security
features in hypervisors.VM migration without
security becomes single point of failure for Cloud
environment because intruder can inject malicious
code or modify the VM content. Successful attack
on migration process may cause denial of service
(DOS), loss of data integrity and confidentiality in
transmitted VM (Cooke et al. 2008).
The latest research on resource migration is
performance oriented, therefore, security issues have
not received much attention. This paper presents the
holistic solution on Securing VM migration in
Cloud. Our proposed solution provides mutual
authentication between the CSPs, authorization,
confidentiality, integrity, replay resistance and non-
repudiation. After successful migration of VM, CSP
updates key manager with encrypted disk images
keys (EIK). In addition, load monitoring module is
used to continuously monitor resources on
sender/receiver CSPs and intimate them for the
acceptance/rejection of VM migration requests. The
remaining paper is organized as follows: section 2
presents background of VM migration and its
different types. Section 3 presents related and
existing work on VM migration security. Section 4
presents proposed architecture and workflow of
secure VM migration process. Section 5 presents the
verification of protocol using AVISPA and Section
6 concludes the paper along with future work
directions.
2 BACKGROUND
This section provides some background information
about VM migration and its different types which
are supported by well-known hypervisors. Migration
is the useful feature of Virtualization technology
which is used to transfer a VM from one physical
server to another or from one data centre to another.
This feature provides efficient system maintenance,
load balancing and proactive fault tolerance in
enterprises infrastructures (Anala et al. 2012; Cooke
et al.2008). VM migration is also used in Cloud
Federation to provide Cloud bursting feature
(Kenneth et al. 2011).
2.1 Types of VM Migration
VM migration is categorized into cold and hot
migration. In cold migration, also known as offline
migration, first VM is shutdown and then transferred
to other host or data centre (VMware Migrating
VM). In hot migration, VM is transferred without
shutting down the machine and it is used to
minimize the downtime. Both live and
suspended/paused VM migrations are placed in this
category. Live migration is defined as transfers of
running VMs from one physical server to another
with minimum downtime and without interrupting
the services running in VM (Anala et al. 2012). Live
migration is further classified into memory
migration and block/storage migration. In memory
migration, only contents of volatile memory of VM
are migrated and in block migration, the storage of
VM is also migrated along with memory and it takes
longer as compared to memory migration. However,
in suspended/pause migration technique, contents of
VM is stored in disk or in memory (RAM)
respectively before transfer from one Cloud to
another (OpenStack documentation, pausing &
suspending instances 2013).
3 RELATED WORK
This section discusses in more detail some of the
existing solutions or approaches for secure VM
migration in Cloud environment. Many existing
solutions are using Trusted Platform Module (TPM)
in their solution and only support offline
migration.TPM dependent solutions require changes
in software (virtualization of TPM in hypervisor)
and hardware of current Cloud infrastructure.
Approaches which provide security in live VM
migration are not comprehensive and do not fulfil all
the essential security features (such as Mutual
Authentication, Authorization, Replay Resistance ,
Confidentiality and Integrity of VM contents during
migration process and Non-Repudiation) of Live
migration process (Anala et al. 2012; Zhang et al.
2012).
Isolated/segregated migration uses Virtual LAN
(VLAN) to isolate migration traffic from other
network traffic because it reduces the risk of
exposure. However, it does not provide any security
feature and cost of VLAN management is also
linked with population of VM's (Anala et al. 2012;
OpenStack security guide, 2013). In Network
Security Engine-Hypervisor based approach,
firewall and IDS/IPS functionalities become part of
SecureVirtualMachineMigration(SV2M)inCloudFederation
345