[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Cloud VM Migration Control Mechanism Using Blockchain

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2020 (ICCSA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12252))

Included in the following conference series:

Abstract

In the current cloud, VM migration that moves VMs between physical host machines is indispensable. For cloud providers, before shutting down the physical host machines for maintenance, migration is used to temporarily save VMs to other physical host machine. For the cloud user, migration is used to move a VM to a location which is geographically close to the end user. These VM migrations can be performed very easily and are only limited by the scope of the VM administrator’s contract. However, the problem lies on the permission of the data in VM. In recent years, with the widespread use of IoT, various types of data can be stored in cloud’s VMs through web services. The huge amount of data collected by IoT devices requires close attention to manage because it could be very closely related to the information of an individual. However, there is no mechanism for checking data permission in VM during VM migration, and there is concern that inappropriate data movement may occur. This includes the unintended risky movement of inappropriate data which could be malicious data. Therefore, we proposed a mechanism to ensure compliance with the conditions granted by the data owner, the country regulations, and the organization regulations during VM migration. By constructing the proposed mechanism in blockchain, we can prevent malicious tampering and thus enable robust VM migration control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    MATH  Google Scholar 

  2. Tan, L., Wang, N.: Future internet: the Internet of Things. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. V5–376-V5-380 (2010)

    Google Scholar 

  3. Dhananjay, S., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: future vision architecture challenges and services. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 287–292 (2014)

    Google Scholar 

  4. General Data Protection Regulation: GDPR. https://eur-lex.europa.eu/eli/reg/2016/679/oj. Accessed Jun 2019

  5. AWS. https://aws.amazon.com/. Accessed Jun 2019

  6. Microsoft Azure Cloud Computing Platform & Service. https://azure.microsoft.com/. Accessed Jun 2019

  7. Khajeh-Hosseini, A., Greenwood, D., Sommerville, I.: Cloud migration: a case study of migrating an enterprise IT system to IaaS. In: IEEE 3rd International Conference on Cloud Computing, pp. 450–457 (2010)

    Google Scholar 

  8. Shetty, J., Anala, M.R., Shobha, G.: A survey on techniques of secure live migration of virtual machine. Int. J. Comput. Appl. (IJCA) 39(12), 34–39 (2012)

    Google Scholar 

  9. Aiash, M., Mapp, G., Gemikonakli, O.: Secure live virtual machines migration: issues and solutions. In: Advanced Information Networking and Applications Workshops (WAINA), pp. 160–165 (2014)

    Google Scholar 

  10. Upadhyay, A., Lakkadwala, P.: Secure live migration of VM’s in cloud computing: a survey. In: Reliability, Infocom Technologies and Optimization (ICRITO), pp. 1–4 (2014)

    Google Scholar 

  11. Rathod, N., Chauhan, S.: Survey: secure live VM migration in public cloud. Int. J. Sci. Res. Dev. (IJSRD) 2(12), 271–274 (2015)

    Google Scholar 

  12. Gutierrez-Garcia, J.O., Ramirez-Nafarrate, A.: Policy-based agents for virtual machine migration in cloud data centers. In: Services Computing (SCC), pp. 603–610 (2013)

    Google Scholar 

  13. Koto, A., Kono, K., Yamada, H.: A guideline for selecting live migration policies and implementations in clouds. In: Cloud Computing Technology and Science (CloudCom), pp. 226–233 (2014)

    Google Scholar 

  14. Cui, L., Tso, F.P., Pezaros, D.P., Jia, W.: PLAN: a policy-aware VM management scheme for cloud data centres. In: Utility and Cloud Computing (UCC), pp. 142–151 (2015)

    Google Scholar 

  15. Papadopoulos, A.V., Maggio, M.: Virtual machine migration in cloud infrastructures: problem formalization and policies proposal. In: Decision and Control (CDC), pp. 6698–6705 (2015)

    Google Scholar 

  16. Xu, X., et al.: A taxonomy of blockchain-based systems for architecture design. In: IEEE International Conference on Software Architecture (ICSA 2017), pp. 243–252 (2017)

    Google Scholar 

  17. Dorri, A., Kanhere, S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: The 2nd IEEE Workshop on Security, Privacy, and Trust in the Internet of Things (PERCOM), pp. 618–623 (2017)

    Google Scholar 

  18. Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments. In: Italian Conference on Cyber security (ITASEC 2017), pp. 146–155 (2017)

    Google Scholar 

  19. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: The 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468-477 (2017)

    Google Scholar 

  20. Xu, C., Wang, K., Guo, M.: Intelligent resource management in blockchain-based cloud datacenters. IEEE Cloud Comput. 4(6), 50–59 (2017)

    Google Scholar 

  21. Sharma, P.K., Chen, M., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, 115–124 (2018)

    Google Scholar 

  22. Rahalkar, C., Gujar, D.: Content addressed P2P file system for the web with blockchain-based meta-data integrity. In: 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), pp. 1–4 (2019)

    Google Scholar 

  23. KVM. https://www.linux-kvm.org. Accessed Jun 2019

  24. Xen Project. https://xenproject.org/. Accessed Jun 2019

  25. Compute Engine - IaaS|Compute Engine. https://cloud.google.com/compute/. Accessed Jun 2019

  26. Build the future of Open Infrastructure. https://www.openstack.org/. Accessed Jun 2019

Download references

Acknowledgements.

This work was supported by JSPS KAKENHI Grant Number JP20K19778.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Toshihiro Uchibayashi , Bernady Apduhan , Takuo Suganuma or Masahiro Hiji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Uchibayashi, T., Apduhan, B., Suganuma, T., Hiji, M. (2020). A Cloud VM Migration Control Mechanism Using Blockchain. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12252. Springer, Cham. https://doi.org/10.1007/978-3-030-58811-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58811-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58810-6

  • Online ISBN: 978-3-030-58811-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics