• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2015, Volume: 8, Issue: Supplementary 9, Pages: 1-7

Original Article

Protection of Virtual Machines during Live Migration in Cloud Environment

Abstract

Live migration of Virtual Machines (VM) is a fundamental highlight of "virtualization" that permits transition of a running VM from one physical server to the next without interrupting the VM. The main aim of this paper is to migrate the virtual machines in the cloud environment and thus avoid threats and vulnerabilities. In the previous technique, Protection Aegis for Live Migration (PALM) is used in which the virtual machines migrate in three different methods. They are Process Migration, Memory Migration and Resume/Suspend Migration. The main drawback of the existing technique is the performance degradation due to high downtime. But in the proposed technique, the migration of virtual machines is carried out by using XEN hypervisor which uses Regular and Live Migration techniques. In that XEN hypervisor, the MultiPass Algorithm is used to perform migration in an efficient way. When compared with other techniques, the XEN server has an advantage of lower total migration time for virtual machine migration. In earlier live migration, the current execution of running virtual machine is paused and then the VM is migrated to the destination server. After reaching the destination, the execution of virtual machine is resumed. So the migration time is very high. But in proposed method, the current execution of the virtual machine is not paused. The execution of the VM is not interrupted and also the migration time is very low. Also the downtime for migration is reduced by using XEN server. This improves the efficiency and performance by reducing the migration time and down time during live migration of virtual machines. This helps the business providers and industries to increase their productivity
Keywords: Cloud Computing, Downtime Analysis, Elliptic Curve Cryptography (ECC) Security, Live Migration, Virtualization, XEN Hypervsior Protocol

DON'T MISS OUT!

Subscribe now for latest articles and news.