• DocumentCode
    680308
  • Title

    Virtual firewalling for migrating virtual machines in cloud computing

  • Author

    Anwar, Mohd

  • Author_Institution
    Sch. of Comput., HiQ Karlskrona AB, Karlskrona, Sweden
  • fYear
    2013
  • fDate
    14-15 Dec. 2013
  • Firstpage
    1
  • Lastpage
    11
  • Abstract
    Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. Hence, during live migration any security lax in VM firewall policy can put the VM at risk. A malicious VM can further pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider´s control. Source VMM-Ievel VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. This research contributes towards providing understanding of having open source virtual firewall at VM-Ievel for migrating VMs to reduce attack window of VM during the migration. The final contribution is the validation and uptime evaluation of the implemented Packet Filter firewall for VM at VM-level during migration in City Network data center. Such an approach would enable hardened security for overall VM migration.
  • Keywords
    cloud computing; computer centres; firewalls; virtual machines; virtualisation; CC; Internet; LAN; VF; VM firewall policy; VMM; city network data center; cloud computing; cloud provider; computing resources; data manipulation; fake migration initiations; local area network; malicious VM; network attacks; packet filter firewall; service interruptions; virtual firewalling; virtual machine monitor-level; virtual machines migration; virtual traffic; virtualization; Cities and towns; Hardware; Local area networks; Security; Sociology; Statistics; Virtualization; firewalling; migration; virtual machine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information & Communication Technologies (ICICT), 2013 5th International Conference on
  • Conference_Location
    Karachi
  • Print_ISBN
    978-1-4799-2621-3
  • Type

    conf

  • DOI
    10.1109/ICICT.2013.6732787
  • Filename
    6732787