Virtualization technology adds great opportunities and challenges to the cloud computing paradigm. Resource management can be efficiently enhanced by employing Live Virtual Machine Migration (LVMM) techniques. Based on the literature of LVMM implementation in virtualization environment, middleboxes such as firewalls do not work effectively. LVMM introduces dynamic changes in network states and traffic, which may lead to critical security vulnerabilities. One key security hole is that the security rules set in the firewall do not move with the Virtual Machine after LVMM is triggered. This leads to inconsistency in the firewalls level of protection of the migrated Virtual Machine. There is a lack in the literature of practical studies that address this problem. The first stage of this PhD research is to investigate this problem based on experiment in order to find a proper approach to solve the problem
Virtualization technology adds great opportunities and challenges to the cloud computing paradigm. Resource management can be efficiently enhanced by employing Live Virtual Machine Migration (LVMM) techniques. Based on the literature of LVMM implementation in virtualization environment, middleb...
مادة فرعية