Abstract
In the current cloud, VM migration that moves VMs between physical host machines is indispensable. For cloud providers, before shutting down the physical host machines for maintenance, migration is used to temporarily save VMs to other physical host machine. For the cloud user, migration is used to move a VM to a location which is geographically close to the end user. These VM migrations can be performed very easily and are only limited by the scope of the VM administrator’s contract. However, the problem lies on the permission of the data in VM. In recent years, with the widespread use of IoT, various types of data can be stored in cloud’s VMs through web services. The huge amount of data collected by IoT devices requires close attention to manage because it could be very closely related to the information of an individual. However, there is no mechanism for checking data permission in VM during VM migration, and there is concern that inappropriate data movement may occur. This includes the unintended risky movement of inappropriate data which could be malicious data. Therefore, we proposed a mechanism to ensure compliance with the conditions granted by the data owner, the country regulations, and the organization regulations during VM migration. By constructing the proposed mechanism in blockchain, we can prevent malicious tampering and thus enable robust VM migration control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Tan, L., Wang, N.: Future internet: the Internet of Things. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. V5–376-V5-380 (2010)
Dhananjay, S., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: future vision architecture challenges and services. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 287–292 (2014)
General Data Protection Regulation: GDPR. https://eur-lex.europa.eu/eli/reg/2016/679/oj. Accessed Jun 2019
AWS. https://aws.amazon.com/. Accessed Jun 2019
Microsoft Azure Cloud Computing Platform & Service. https://azure.microsoft.com/. Accessed Jun 2019
Khajeh-Hosseini, A., Greenwood, D., Sommerville, I.: Cloud migration: a case study of migrating an enterprise IT system to IaaS. In: IEEE 3rd International Conference on Cloud Computing, pp. 450–457 (2010)
Shetty, J., Anala, M.R., Shobha, G.: A survey on techniques of secure live migration of virtual machine. Int. J. Comput. Appl. (IJCA) 39(12), 34–39 (2012)
Aiash, M., Mapp, G., Gemikonakli, O.: Secure live virtual machines migration: issues and solutions. In: Advanced Information Networking and Applications Workshops (WAINA), pp. 160–165 (2014)
Upadhyay, A., Lakkadwala, P.: Secure live migration of VM’s in cloud computing: a survey. In: Reliability, Infocom Technologies and Optimization (ICRITO), pp. 1–4 (2014)
Rathod, N., Chauhan, S.: Survey: secure live VM migration in public cloud. Int. J. Sci. Res. Dev. (IJSRD) 2(12), 271–274 (2015)
Gutierrez-Garcia, J.O., Ramirez-Nafarrate, A.: Policy-based agents for virtual machine migration in cloud data centers. In: Services Computing (SCC), pp. 603–610 (2013)
Koto, A., Kono, K., Yamada, H.: A guideline for selecting live migration policies and implementations in clouds. In: Cloud Computing Technology and Science (CloudCom), pp. 226–233 (2014)
Cui, L., Tso, F.P., Pezaros, D.P., Jia, W.: PLAN: a policy-aware VM management scheme for cloud data centres. In: Utility and Cloud Computing (UCC), pp. 142–151 (2015)
Papadopoulos, A.V., Maggio, M.: Virtual machine migration in cloud infrastructures: problem formalization and policies proposal. In: Decision and Control (CDC), pp. 6698–6705 (2015)
Xu, X., et al.: A taxonomy of blockchain-based systems for architecture design. In: IEEE International Conference on Software Architecture (ICSA 2017), pp. 243–252 (2017)
Dorri, A., Kanhere, S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: The 2nd IEEE Workshop on Security, Privacy, and Trust in the Internet of Things (PERCOM), pp. 618–623 (2017)
Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments. In: Italian Conference on Cyber security (ITASEC 2017), pp. 146–155 (2017)
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: The 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468-477 (2017)
Xu, C., Wang, K., Guo, M.: Intelligent resource management in blockchain-based cloud datacenters. IEEE Cloud Comput. 4(6), 50–59 (2017)
Sharma, P.K., Chen, M., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, 115–124 (2018)
Rahalkar, C., Gujar, D.: Content addressed P2P file system for the web with blockchain-based meta-data integrity. In: 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), pp. 1–4 (2019)
KVM. https://www.linux-kvm.org. Accessed Jun 2019
Xen Project. https://xenproject.org/. Accessed Jun 2019
Compute Engine - IaaS|Compute Engine. https://cloud.google.com/compute/. Accessed Jun 2019
Build the future of Open Infrastructure. https://www.openstack.org/. Accessed Jun 2019
Acknowledgements.
This work was supported by JSPS KAKENHI Grant Number JP20K19778.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Uchibayashi, T., Apduhan, B., Suganuma, T., Hiji, M. (2020). A Cloud VM Migration Control Mechanism Using Blockchain. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12252. Springer, Cham. https://doi.org/10.1007/978-3-030-58811-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-58811-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58810-6
Online ISBN: 978-3-030-58811-3
eBook Packages: Computer ScienceComputer Science (R0)