Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/5874
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pandya, Tanvi | - |
dc.date.accessioned | 2015-07-31T07:37:05Z | - |
dc.date.available | 2015-07-31T07:37:05Z | - |
dc.date.issued | 2015-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5874 | - |
dc.description.abstract | Cloud computing is a technology which allows the users to access the storage and resources on the subscription basis.One of the powerful concept of the cloud computing technique is virtualization.The main reason behind the hosting of VM(Virtual Machine) in servers is to provide optimality in resource utilization in response to the user's request. Live migration is a process in which an application running on one system can be moved to another physical machine without disconnecting the application, the possible reasons of doing live migration may include fault tolerance ,load balancing and the ease of server maintenance . There are various reasons for performing live migration in Cloud Data center but it is still in an early stage of implementation and its security is yet to be explored in more detailed manner. The main concern of IT companies behind live migration are its security issues as there are many attacks possible ,which can leads to compromise of security in cloud environment. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the tech- nology for sensitive applications. This report is a complete study of the various live migration issues,its analysis and implementation using proposed model. An attack can be done on the live migration process by just snifing the network and the data ow between the hypervisor during the migration which can lead to loss of the confidentiality of data. The research shows how a malicious attacker can snif the network and do the attack while the process of live migration. On basis of this, using cryptographic techniques a way have been proposed to secure the complete live migration process. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 13MCEI27; | - |
dc.subject | Computer 2013 | en_US |
dc.subject | Project Report 2013 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 13MCEI | en_US |
dc.subject | 13MCEI27 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2013 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Availing Security During Live Migration in Cloud Environment | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
13MCEI27.pdf | 13MCEI27 | 2.45 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.