Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5874
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPandya, Tanvi-
dc.date.accessioned2015-07-31T07:37:05Z-
dc.date.available2015-07-31T07:37:05Z-
dc.date.issued2015-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/5874-
dc.description.abstractCloud computing is a technology which allows the users to access the storage and resources on the subscription basis.One of the powerful concept of the cloud computing technique is virtualization.The main reason behind the hosting of VM(Virtual Machine) in servers is to provide optimality in resource utilization in response to the user's request. Live migration is a process in which an application running on one system can be moved to another physical machine without disconnecting the application, the possible reasons of doing live migration may include fault tolerance ,load balancing and the ease of server maintenance . There are various reasons for performing live migration in Cloud Data center but it is still in an early stage of implementation and its security is yet to be explored in more detailed manner. The main concern of IT companies behind live migration are its security issues as there are many attacks possible ,which can leads to compromise of security in cloud environment. Unfortunately the disclosed vulnerabilities with the live migration pose significant security risks. Because of these security risks the industry is hesitant to adapt the tech- nology for sensitive applications. This report is a complete study of the various live migration issues,its analysis and implementation using proposed model. An attack can be done on the live migration process by just snifing the network and the data ow between the hypervisor during the migration which can lead to loss of the confidentiality of data. The research shows how a malicious attacker can snif the network and do the attack while the process of live migration. On basis of this, using cryptographic techniques a way have been proposed to secure the complete live migration process.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries13MCEI27;-
dc.subjectComputer 2013en_US
dc.subjectProject Report 2013en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject13MCEIen_US
dc.subject13MCEI27en_US
dc.subjectINSen_US
dc.subjectINS 2013en_US
dc.subjectCE (INS)en_US
dc.titleAvailing Security During Live Migration in Cloud Environmenten_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
13MCEI27.pdf13MCEI272.45 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.