Skip to main content
Erschienen in:

30.08.2024

A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology

verfasst von: Ambika Gupta, Suyel Namasudra, Prabhat Kumar

Erschienen in: The Journal of Supercomputing | Ausgabe 19/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data centres have become the backbone of infrastructure for delivering cloud services. In the emerging cloud computing paradigm, virtual machine (VM) live migration involves moving a running VM across hosts without visible interruption to the client. Security vulnerabilities, resource optimization, and maintaining the quality of service are key issues in live VM migration. Maintaining security in VM live migration is one of the critical concerns. To create a secure environment, this paper proposes a live migration technique using the blowfish cryptographic algorithm for encryption and decryption, along with blockchain technology, to address challenges such as decentralization, data privacy, and VM security. The algorithms, namely key management blowfish encryption (KMBE), access control searchable encryption (ACSE), protected searchable destination server (PSDS), and key expansion blowfish decryption (KEBD), improve security in VM live migration in terms of various parameters such as data centre request servicing time, response time, and data transfer cost. The proposed technique KMBE improves migration cost ($) by 60–70%, ACSE reduces overall energy consumption (w) by 70–80%, PSDS reduces makespan (ms) by 40–50%, and KEBD improves the security in live VM migration by 30–40%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chaudhari RA, Gohil BN, Rao UP (2023) A review on cloud security issues and solutions. J Comput Secur 31:365–391CrossRef Chaudhari RA, Gohil BN, Rao UP (2023) A review on cloud security issues and solutions. J Comput Secur 31:365–391CrossRef
2.
Zurück zum Zitat Abdul-Jabbar SS, Aldujaili A, Mohammed SG, Saeed HS (2020) Integrity and security in cloud computing environment: a review. J Southwest Jiaotong Univ 55:1–15 Abdul-Jabbar SS, Aldujaili A, Mohammed SG, Saeed HS (2020) Integrity and security in cloud computing environment: a review. J Southwest Jiaotong Univ 55:1–15
3.
Zurück zum Zitat Gupta S, Kumar P, Singh JP, Singh MP (2016) Privacy preservation of source location using phantom nodes. In: Latifi S (ed) Information technology: new generations. Springer, New York, pp 247–256CrossRef Gupta S, Kumar P, Singh JP, Singh MP (2016) Privacy preservation of source location using phantom nodes. In: Latifi S (ed) Information technology: new generations. Springer, New York, pp 247–256CrossRef
5.
Zurück zum Zitat Das S, Namasudra S, Deb S, Ger PM, Crespo RG (2023) Securing IoT-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J 1:1–10 Das S, Namasudra S, Deb S, Ger PM, Crespo RG (2023) Securing IoT-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J 1:1–10
6.
Zurück zum Zitat Hongyou L, Jiangyong W, Jian P, Junfeng W, Tang L (2013) Energy-aware scheduling scheme using workload-aware consolidation technique in cloud data centres. China Commun 10:114–124CrossRef Hongyou L, Jiangyong W, Jian P, Junfeng W, Tang L (2013) Energy-aware scheduling scheme using workload-aware consolidation technique in cloud data centres. China Commun 10:114–124CrossRef
8.
Zurück zum Zitat Dhanoa I, Khurni S (2014) Energy-efficient virtual machine live migration in cloud data centers. Int J Comput Sci Technol 5:43–47 Dhanoa I, Khurni S (2014) Energy-efficient virtual machine live migration in cloud data centers. Int J Comput Sci Technol 5:43–47
9.
Zurück zum Zitat Ding Y, Qin X, Liu L, Wang T (2015) Energy efficient scheduling of virtual machines in cloud with deadline constraint. Future Gener Comput Syst 50:62–74CrossRef Ding Y, Qin X, Liu L, Wang T (2015) Energy efficient scheduling of virtual machines in cloud with deadline constraint. Future Gener Comput Syst 50:62–74CrossRef
10.
Zurück zum Zitat Allouch H, Belkasmi M (2015) Distributed CloudIMS: future-generation network with internet of thing based on distributed cloud computing. In: Jain LC, Patnaik S, Ichalkaranje N (eds) Intelligent computing, communication and devices. Springer, New York, pp 31–45CrossRef Allouch H, Belkasmi M (2015) Distributed CloudIMS: future-generation network with internet of thing based on distributed cloud computing. In: Jain LC, Patnaik S, Ichalkaranje N (eds) Intelligent computing, communication and devices. Springer, New York, pp 31–45CrossRef
11.
Zurück zum Zitat Kaur P, Rani A (2014) Virtual machine migration in cloud computing. Int J Grid Distrib Comput 8:337–342CrossRef Kaur P, Rani A (2014) Virtual machine migration in cloud computing. Int J Grid Distrib Comput 8:337–342CrossRef
12.
Zurück zum Zitat Motru V, Raja P, Kote A, Rao G, Duvvuru R (2015) A guideline for virtual machine migration algorithm in cloud computing environment. Int J Comput Commun Eng Res 3:93–97 Motru V, Raja P, Kote A, Rao G, Duvvuru R (2015) A guideline for virtual machine migration algorithm in cloud computing environment. Int J Comput Commun Eng Res 3:93–97
13.
Zurück zum Zitat Ali M, Khan S, Vasilakos A (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383MathSciNetCrossRef Ali M, Khan S, Vasilakos A (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383MathSciNetCrossRef
14.
Zurück zum Zitat Datta S, Namasudra S (2024) Blockchain-based smart contract model for securing healthcare transactions by using consumer electronics and mobile edge computing. IEEE Trans Consum Electron 70:4026CrossRef Datta S, Namasudra S (2024) Blockchain-based smart contract model for securing healthcare transactions by using consumer electronics and mobile edge computing. IEEE Trans Consum Electron 70:4026CrossRef
15.
Zurück zum Zitat Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4:150–154 Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4:150–154
16.
Zurück zum Zitat Saikumar M, Vasanth K (2015) Blowfish encryption algorithm for information security. ARPN J Eng Appl Sci 10:4717–4719 Saikumar M, Vasanth K (2015) Blowfish encryption algorithm for information security. ARPN J Eng Appl Sci 10:4717–4719
17.
Zurück zum Zitat Haldankar C, Kuwelkar S (2014) Implementation of AES and blowfish algorithm. Int J Res Eng Technol 3:143–146CrossRef Haldankar C, Kuwelkar S (2014) Implementation of AES and blowfish algorithm. Int J Res Eng Technol 3:143–146CrossRef
18.
Zurück zum Zitat Valmik N, Krshirsagar V (2014) Blowfish algorithm. IOSR J Comput Eng 16:80–83CrossRef Valmik N, Krshirsagar V (2014) Blowfish algorithm. IOSR J Comput Eng 16:80–83CrossRef
19.
Zurück zum Zitat Ali S, Wang J, Bhuiyan M, Jiang H (2018) Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In: IEEE SmartWorld, Guangzhou, pp 991–998 Ali S, Wang J, Bhuiyan M, Jiang H (2018) Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In: IEEE SmartWorld, Guangzhou, pp 991–998
20.
Zurück zum Zitat Niranjanamurthy M, Nithya BN, Jagannatha S (2019) Analysis of blockchain technology: Pros, cons and SWOT. Clust Comput 22:14743–14757CrossRef Niranjanamurthy M, Nithya BN, Jagannatha S (2019) Analysis of blockchain technology: Pros, cons and SWOT. Clust Comput 22:14743–14757CrossRef
21.
Zurück zum Zitat Pitropakis N, Pikrakis A, Lambrinoudakis C (2014) Behaviour reflects personality: detecting co-residence attacks on xen-based cloud environments. Int J Inf Secur 14:299–305CrossRef Pitropakis N, Pikrakis A, Lambrinoudakis C (2014) Behaviour reflects personality: detecting co-residence attacks on xen-based cloud environments. Int J Inf Secur 14:299–305CrossRef
22.
Zurück zum Zitat Ranjan P, Singh V, Kumar P, Prakash S (2018) Models for the detection of malicious intent people in society. Int J Digit Crime Forensics 10:15–22CrossRef Ranjan P, Singh V, Kumar P, Prakash S (2018) Models for the detection of malicious intent people in society. Int J Digit Crime Forensics 10:15–22CrossRef
23.
Zurück zum Zitat Sura K, Khalid D, Mustafa M, Hassan R, Ahmed M (2021) Using energy efficient security technique to protect live virtual machine migration in cloud computing infrastructure. J Eng Sci Technol 16:2629–2651 Sura K, Khalid D, Mustafa M, Hassan R, Ahmed M (2021) Using energy efficient security technique to protect live virtual machine migration in cloud computing infrastructure. J Eng Sci Technol 16:2629–2651
24.
Zurück zum Zitat Hui Y, Zheng Q, JiXin Z, Ou L, Keqin L (2021) achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data. IEEE Trans Cloud Comput 9:27–39CrossRef Hui Y, Zheng Q, JiXin Z, Ou L, Keqin L (2021) achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data. IEEE Trans Cloud Comput 9:27–39CrossRef
25.
Zurück zum Zitat Divyambika R, Umamakeswari A (2015) Protection of virtual machines during live migration in cloud environment. Indian J Sci Technol 8:333–339CrossRef Divyambika R, Umamakeswari A (2015) Protection of virtual machines during live migration in cloud environment. Indian J Sci Technol 8:333–339CrossRef
26.
Zurück zum Zitat Soltanshahi M, Asemi R, Shafiei N (2019) Energy-aware virtual machines allocation by krill herd algorithm in cloud data centers. Heliyon 5:1–6CrossRef Soltanshahi M, Asemi R, Shafiei N (2019) Energy-aware virtual machines allocation by krill herd algorithm in cloud data centers. Heliyon 5:1–6CrossRef
27.
Zurück zum Zitat Mavus Z, Angın P (2019) A secure model for efficient live migration of containers. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 10:21–44 Mavus Z, Angın P (2019) A secure model for efficient live migration of containers. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 10:21–44
28.
Zurück zum Zitat Dickinson M et al (2021) Multi-cloud performance and security driven federated workflow management. IEEE Trans Cloud Comput 9:240–257CrossRef Dickinson M et al (2021) Multi-cloud performance and security driven federated workflow management. IEEE Trans Cloud Comput 9:240–257CrossRef
29.
Zurück zum Zitat Satpathy A, Addya S, Turuk A, Majhi B, Sahoo G (2018) Crow search based virtual machine placement strategy in cloud data centers with live migration. Comput Electr Eng 69:334–350CrossRef Satpathy A, Addya S, Turuk A, Majhi B, Sahoo G (2018) Crow search based virtual machine placement strategy in cloud data centers with live migration. Comput Electr Eng 69:334–350CrossRef
30.
Zurück zum Zitat Nguyen D, Pathirana P, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun Surv Tutor 22:2521–2549CrossRef Nguyen D, Pathirana P, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun Surv Tutor 22:2521–2549CrossRef
31.
Zurück zum Zitat Karthikeyan K et al (2018) Energy consumption analysis of VM migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput 76:3374–3390CrossRef Karthikeyan K et al (2018) Energy consumption analysis of VM migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput 76:3374–3390CrossRef
32.
Zurück zum Zitat Basset M, Fatah L, Sangaiah A (2019) An improved Levy based whale optimization algorithm for bandwidth-efficient virtual machine placement in cloud computing environment. Clust Comput 22:8319–8334CrossRef Basset M, Fatah L, Sangaiah A (2019) An improved Levy based whale optimization algorithm for bandwidth-efficient virtual machine placement in cloud computing environment. Clust Comput 22:8319–8334CrossRef
33.
Zurück zum Zitat Namasudra S, Lorenz P, Kadry S, Bukhari SAC (2023) Introduction to the special issue on DNA-centric modeling and practice for next-generation computing and communication systems. ACM Trans Multim Comput Commun Appl 20:1–17CrossRef Namasudra S, Lorenz P, Kadry S, Bukhari SAC (2023) Introduction to the special issue on DNA-centric modeling and practice for next-generation computing and communication systems. ACM Trans Multim Comput Commun Appl 20:1–17CrossRef
34.
Zurück zum Zitat Basu S, Karmakar S, Bera D (2021) Blockchain-based secured virtual machine image monitor. In: International conference on information systems security and privacy, pp 432–439 Basu S, Karmakar S, Bera D (2021) Blockchain-based secured virtual machine image monitor. In: International conference on information systems security and privacy, pp 432–439
35.
Zurück zum Zitat Sutar S, Mali P, More A (2020) Resource utilization enhancement through live VM migration in cloud using ant colony optimization algorithm. Int J Speech Technol 23:79–85CrossRef Sutar S, Mali P, More A (2020) Resource utilization enhancement through live VM migration in cloud using ant colony optimization algorithm. Int J Speech Technol 23:79–85CrossRef
36.
Zurück zum Zitat Jinglin Z et al (2021) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1–36 Jinglin Z et al (2021) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1–36
38.
Zurück zum Zitat Kumar T, Namasudra S, Kumar P (2023) Providing data security using DNA computing in the cloud computing environment. Int J Web Grid Serv 19:463–486CrossRef Kumar T, Namasudra S, Kumar P (2023) Providing data security using DNA computing in the cloud computing environment. Int J Web Grid Serv 19:463–486CrossRef
39.
Zurück zum Zitat Zou J, He D, Kumar N, Wang H, Choo K (2019) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1–7CrossRef Zou J, He D, Kumar N, Wang H, Choo K (2019) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1–7CrossRef
40.
Zurück zum Zitat Kalpanadevi D, Rani MJ, Karuppasamy M (2022) k-out-of-n systems growth study focusing on redundant reliability systems by using heuristic programming approach. Math Stat Eng Appl 71:2326–9865 Kalpanadevi D, Rani MJ, Karuppasamy M (2022) k-out-of-n systems growth study focusing on redundant reliability systems by using heuristic programming approach. Math Stat Eng Appl 71:2326–9865
42.
Zurück zum Zitat Rahman M, Murmu A, Kumar P, Rao NM, Namasudra S (2024) A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J Inform Secur Appl 80:1–12 Rahman M, Murmu A, Kumar P, Rao NM, Namasudra S (2024) A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J Inform Secur Appl 80:1–12
43.
Zurück zum Zitat Gao X, Xiao J, Wang H, Stavrou A (2022) Understanding the security implication of aborting virtual machine live migration. IEEE Trans Cloud Comput 10:1275–1286CrossRef Gao X, Xiao J, Wang H, Stavrou A (2022) Understanding the security implication of aborting virtual machine live migration. IEEE Trans Cloud Comput 10:1275–1286CrossRef
46.
Zurück zum Zitat Infantia HN, Anbuananth C, Kalarani S (2023) An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment. Intell Decis Technol 17:983–1006 Infantia HN, Anbuananth C, Kalarani S (2023) An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment. Intell Decis Technol 17:983–1006
47.
Zurück zum Zitat Narayanan G, Kannan S (2024) Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. Int Arab J Inform Technol 21:166–178 Narayanan G, Kannan S (2024) Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. Int Arab J Inform Technol 21:166–178
48.
Zurück zum Zitat Naeem H (2023) Analysis of network security in IoT-based cloud computing using machine learning. Int J Electron Crime Investig 7:1–16 Naeem H (2023) Analysis of network security in IoT-based cloud computing using machine learning. Int J Electron Crime Investig 7:1–16
Metadaten
Titel
A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology
verfasst von
Ambika Gupta
Suyel Namasudra
Prabhat Kumar
Publikationsdatum
30.08.2024
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 19/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-024-06461-7