Title :
Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments
Author :
Yu, Lei ; Weng, Chuliang ; Li, Minglu ; Luo, Yuan
Author_Institution :
Dept. of Comput. Sci. & Eng., Shanghai Jiaotong Univ., Shanghai, China
Abstract :
While virtual machines provide significant flexibility for users and administrators to clone, snapshot, migration and rollback with unprecedented ease, it also bring forth some new problems and negative effects to the security of computing environments. The applications and operating systems are forced to run in a dynamical and unregulated computing environment, which gives rise to so radical difference that the administrator is difficult to maintain the security of computing environment. This paper summarizes and presents some types of security challenges based on existing viewpoints, then we analysis the similar challenges in Xen and discuss the potential directions and implementations for modifying it to adapt to these challenges.
Keywords :
security of data; virtual machines; operating systems applications; security challenges; virtual machines; xen based computing environments; Cloning; Computers; File systems; Operating systems; Security; Tin; Virtual machining; Security; Version managament; Virtualization;
Conference_Titel :
ChinaGrid Conference (ChinaGrid), 2010 Fifth Annual
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4244-7543-8
Electronic_ISBN :
978-1-4244-7544-5
DOI :
10.1109/ChinaGrid.2010.47