Abstract
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.
Article PDF
Avoid common mistakes on your manuscript.
References
J. Shetty, M. R. Anala and G. Shobha, ‘A Survey on Techniques of Secure Live Migration of Virtual Machine’, International Journal of Computer Applications, Vol.39, pp.35 – 39, February 2012.
F. Salfner, P. Troger and A. Polze, ‘Downtime Analysis of Virtual Machine Live Migration’, The Fourth International Conference on Dependability, 2011.
J. King and K. Lauerman, ‘ARP Poisoning and Mitigation Techniques’, A CSSTG SE Residency Program White Paper, http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/whitepaperc11603839.html
U. Lamping, ‘Wireshark Developer’s Guide For Wireshark 1.11’, Wireshark, http://www.wireshark.org/download/docs/developer-guide-a4.pdf.
The KAME project, D. Atkins, M. Ludvig, E. Dreyfus, Y. Vanhullebus, M. Grooms, T. Teras, F. Senault and A. Kasparas, ‘IPsec-Tools’, ipsectools, http://ipsec-tools.sourceforge.net/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Sulaiman, N.A.b., Masuda, H. Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation. Int J Netw Distrib Comput 3, 99–108 (2015). https://doi.org/10.2991/ijndc.2015.3.2.4
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2015.3.2.4