Live VM Migration Polices Attacks and Security A Survey
Live VM Migration Polices Attacks and Security A Survey
Live VM Migration Polices Attacks and Security A Survey
Abstract— Cloud Computing enables shared pool of IT resources as service. Cloud computing facilitate Virtualization
through which it increase the provider „s density which turn into better server utilization, multi- tenancy and great
profit margin. Virtualization provides an essential feature “Live-VM migration” which provides the capability to
balance the load, system maintenance and fault tolerant, etc. There are many approaches for Live-VM migration like
Pre-Copy, Improved Pre-Copy; which aimed to minimize the downtime and total migration time. When VM is
migrated from one host to other host machine the data are susceptible to be attacked due to incongruous access
channel, vulnerabilities in hypervisor and unsecured network routes. An attacker may gain privilege on migrated VM
and divers it on untrusted host; it may overwhelm the legitimate destination host and may drip the information. To
mitigate this situation VM access policies must define properly like who has right to migrate it, Strong encryption
techniques or properly configured firewalls.
I. INTRODUCTION
A. CLOUD COMPUTING
Cloud computing enables IT resources as a service, providers are developing a shared pool of configurable computing
resources, which customers can dynamically provision and release on demands payable basis. Providers can reuse
computing resources, and consumers reduce costs through on demand resource provisioning thus both provider and
consumers get profited [1]. Cloud computing has three service models and four deployment models. A Service model
includes Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS) [1]. Provider &
consumer share the control of resources. According to the classical software stack notation In SaaS model service provider
provides application as a service. Consumer is capable to use application running on a cloud Infrastructure via internet
connection but could not access underlying software building block such as libraries, database, operating system drivers
etc. SaaS provider has control at operating system level only. In PaaS model consumer can deploy onto the cloud
infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and
tools supported by the provider. Consumer has no accessibility to the operating system layer at provider side. Lastly in
IaaS model provider enables the consumer to deploy and run arbitrary software, which can include operating systems and
applications by provisioning processing, storage, networks, and other fundamental computing resources [13].
A deployment model includes private, public, hybrid and community cloud. A private cloud owns by an organizational
for internal use only and exposed to its clients and employees. The public cloud is exposed publically. Hybrid cloud is
mixture of private and public clod while the community cloud serves the consumer having shared concerns, such as
mission objectives, security, privacy and compliance policy [13].
B. VIRTUALIZATION
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware
resource sharing. Virtualization can be achieved at different levels. The types of virtualizations are Server Virtualization,
Network virtualization, Storage Virtualization and Operating system virtualization. System virtualization is when a single
physical host runs a number of VMs on it. This VM has its own applications that run on its OS (guest OS). For the user, a
VM behaves just like an independent physical machine.
Figure V-1 Server Virtualization
Hardware Platform
C. HYPERVISOR
The most essential part of virtualization is the hypervisor or MMU is middleware between the virtualized guest
operating system and the real hardware [10]. MMU has two types Type 1 hypervisors run directly on the system hardware
and has self-contained operating platform that’s why called bare metal hypervisor. Type 2 hypervisors run on a host
operating system that delivers virtualization services, such as I/O device support and memory management. As Types1
hypervisor deals with hardware directly virtualization efficiency is higher make it more preferred approach than Type 2.
Type1 hypervisors also provide higher performance efficiency, availability, and security than type 2 hypervisors. Type 2
hypervisors are used mainly on systems where support for a broad range of I/O devices is important and can be provided
by the host operating system [11].
There are many hypervisor available like Xen, VMWare, KVM etc. Xen is type 1 while KVM is type 2 hypervisor.
D. VIRTUAL MACHINE
Virtual machine (VM) encapsulates an operating system and application in one unit. Server virtualization provide an
ability to run entire VM including its own operating system i.e. guest operating system on another operating system i.e.
host operating system.
VM can be migrated from one host to other host machine.VM migration is easier than the process migration as process
migration suffers from residual dependency in which original host machine must remain present and network accessible in
order to service certain calls or even memory accesses on behalf of migrated process while after successfully migrating
VM the source machine is free [2]. VM migration would to consider three things one to minimize the downtime during
which the execution of VM is suspended. Second minimize total migration time, time taken to transfer and activate the
consistent copy of VM at destination. There are two kinds of migration cold VM migration and live VM migration.
Cold Migration – In which VM stop current execution and migrate at destination side. There is no iterative phase in
which modified page has to resend. Cold migration minimizes the total migration time but increases the downtime
[16].
Live Migration- In which the VM execution is not interrupted, first some of memory pages are copied to the
destination after that VM halt and remaining pages are copied to destination and VM resume the execution at
destination [14]. Live VM migration minimizes the downtime. The total migration time is higher compared to cold
migration due to iteratively copy the dirty pages which are pre copy before migration [16].
There are many benefits of Live-VM migration includes easy maintenance, separation of concern between consumer
and provider, fault tolerant and workload balancing etc. [2]. In this paper, the section II and section III, we discuss live VM
migration policies and techniques. Section IV and Section V we layout the breaches in security mechanism and possible
attacks due to these breaches respectively. In Section VI presents the security mechanism for migration and evaluation
scheme is surveyed. Finally the conclusion and directions of future work are given in last section.
Technique Categories
A. Resource Migration
Memory can be easily transferred but what about the local resources that are associates to physical machine like disk
and network. The challenge is what to do with network resource and local storage. To address network resources, the
migrating OS i.e. OS of VM will take care of all it and includes the protocol states and IP addresses. Migrated host
generate the ARP reply to advertise the new address in single switched LAN [2].
B. Migrating Memory
There are three phases for migrating memory. A migrating scheme generally uses two of them [2].
Push phase: in this phase certain pages of source VM is pushed across the destination host while VM is running.
The dirty pages are resend for consistency.
Stop-and-copy phase: The source VM is halt, pages are copied across to the destination VM, and then the new
VM is started.
Pull phase: At the destination host the new VM starts its execution and, if it accesses a missing page that has not
yet been copied, this page is faulted in across the network from the source VM.
The memory migration scheme uses one or two from the three phases. Pre-Migration and Improved Pre-Copy algorithm
are described as follows.
Stage 0. Pre-Migration
Active source host and preselect a target for speed up the future migration.
Stage 1. Reservation
Initially get conformation of availability of required resources then initialize same size VM container on the
destination. In case if required resources are not available, VM simply run on source machine.
Stage 2. Iterative Pre-Copy
In very first iteration all pages are copied to destination after that only those pages which get dirtied during first
iteration are transferred.
Stage 3. Stop-and-Copy
VM is paused on destination and remaining pages are transferred. Consistent suspended copy is there at both
source and destination side.
Stage 4. Commitment
Destination host inform the source of having consistent copy of VM, destination acknowledges this message as
commitment of migration process and delete the VM image at source.
Stage 5. Activation
Destination VM is activated in this stage.
Stage 1: Reservation
Stage 4: Commitment
Stage 5: Activation
Total Total
No. Of
Mechanism Downtime Migration Transferred
Iteration
Time Data
Pre-Copy High Low High Low
Improved
Low High Low High
Pre-Copy
Data Plane
The data plane across which VM migrations occur must be secured and protected against snooping and tampering of
guest OS state. Passive attacks against the data plane may result in leakage of sensitive information from the guest OS,
while active attacks may result in a complete compromise of the guest OS.
Migration Module
If the VMM component that implements migration functionality is vulnerable, an attacker may able to subvert the
VMM and may gain complete control over both the VMM and any guest OSes; that why it must be robust against
attacks. VMM must be updated with necessary patches.
Each row illustrates a potential attack path; starting at some trigger source, exploiting a Xen Hypervisor functionality,
to attack a set of targets. In each row, the trigger sources are less privileged software entities, while the attack targets
are the more privileged software entities, thus enabling privilege escalation [7].
V. THREATS OR ATTACKS
Followings are the threats during Live-VM migration
A. Man-In-Middle Attack
An attacker tries to include some malicious information into on-going conversation between sender and receiver and
to have knowledge of the important data transferred between them. In Cloud, an attacker is able to access the data
communication among data centres [5] [15].
E. DOS
A denial of service attack involves saturating the target with bogus requests to prevent it from responding to
legitimate requests in a timely manner [15]. Due to inappropriate outgoing migration channel is not properly
configured than the similarly, by initiating outgoing migrations, an attacker may migrate a large number of guest
VMs to a legitimate victim VMM, overloading it and causing disruptions [5]. The occurrence of a DoS attack
increases bandwidth consumption besides causing congestion, making certain parts of the clouds inaccessible to the
users [15].
F. VM Data Remanence
After successfully VM migration the image left behind known as data-remanence [15] on host must be deleted or
encrypted to give assurance that legitimate user cloud not recovers the data [3].
G. VM Diversity
By initiating unauthorized incoming migrations, an attacker may cause guest VMs to be live migrated to the
attacker’s machine and gain full control over guest VMs [5] [14].
Untrusted Platform
des
Migration Attestation Migration Attestation
Migration
Service Service
Attestation Service module gives confidence to a remote hypervisor by cryptographically identifies running hypervisor
which establish trust. Seal Storage store private key and role-based policies. Using the private key of the tamper resistant
TPM it encrypts the data that is responsible for attestation. A hash of the booted trusted OS is also included with the
encrypted data such that the TPM only allows a trusted OS with the same hash to unseal it. Policy Service module parses
and manages the role-based policies having decisions like who can migrate the VM, to which hosts VM can be migrated.
Migration Service module is responsible to check whether the target remote machines meet the security requirement
before migration if not it does the needful like software updating or patching. Secure Hypervisor This module protects
the process of guest OS by Runtime Memory Measurement [13]
The steps involved for securing VM migration are first building trustworthy container for VM, second securing VM
migrating and third securing hypervisor.
Building trustworthy container for virtual machine
Remote attestation first checks the equality of destination VM container’s security requirements. If the requirement
doesn’t meet the back-end cloud will guide to build a trust worthy container with the help of hardware support.
After the installation of trusted container, its integrity is checked.
Securing VM Migration
The figure shows the detailed steps for role based migration. There are two kinds of migration migrate-out and
Migrate-in. In Migrate-out, the owner of VM make request for going outside to migration service module. The
request verification done based on pre deployed policy means where it is allowed to migrate or not while in
Migrating-In the VM owner initiate incoming request to migrating service module and VM policies are loaded
Apps
1. Incoming 4. Outgoing
Migration Migration
Kernel Apps
Kernel
2 Deploy
5 Get 7 Get Key &
Service
permission Certificate
6 Storage read
Policy Seal Storage
Service Service
3 Storage write
<Policy>
<VM0>
<UUID>
123456</UUID>
<Migration>
<Bot>allowed</Bot>
<Ale>forbidden</Ale>
</VM0>
</Policy>
SPCA configures the firewall for hypervisor whether to accept or discard the packet. When the SCMA is disabled, the
downloading will be stopped after migration, otherwise the downloading will be continued after a short downtime.
REFERENCES
[1] P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” NIST Spe. Pub. 800-145.
[2] C. Clark, K. Fraser, S. Hand, J.Hansen, E.Jul, C. Limpach, I. Pratt, A. Warfield “ Live Migration of Virtual
Machins”, 2005.
[3] D. Asprey, R. Zhao, K.Balraj, A.Chaudhri, M. Rodriguez, “ Security Guidance for Critical Areas of Focus in Cloud
Computing”, V3.0, Domain 13 Page 157-161, 2009.
[4] P. Leelipushpam, Dr. J.Sharmila, “Live-VM Migration Techniques In Cloud Environment – A Survey”, In Proc.
IEEE Conference on Information and Communication Technologies,2013.
[5] J. Oberheide, E. Cooke, F.Jahanian, “Empirical Exploitation of Live Virtual Machine Migration”, In: Proce. of
Black Hat Security Conference,Washington, DC. 2008 http://www.eecs.umich.edu/fjgroup/pubs/blackhat08-
migration.pdf .
[6] W. Wang, Y. Zhang, B. Lin, X. Wu, K. Miao, “Secured and Reliable VM Migration in Personal Cloud”, In
Proceedings of 16th ACM Conference on Computer and Communications Security, CCS, 2009. ICCET, China.
[7] D. Botero, J. Szefer, R. Lee,” Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers “,in
Proceedings of the Workshop on Security in Cloud Computing (SCC), Hangzhou - China 2013.
[8] Fei Ma, Feng Liu, Zhen Liu, “Live Virtual Machine Migration based on Improved Pre-copy Approach”, Beijing –
China,2010
[9] G. Xiaopeng, W. Sumei,C.Xianqin, “VNSS: A Network Security Sandbox For Virtual Computing Environment” ,
[10] S. Biedermann, M. Zittel, S.Katzenbeisser, “Improving Security of Virtual Machines during Live Migrations”, In
Proce Eleventh Annual Conference on Privacy, Security and Trust (PST), 2013.
[11] YamunaDevi. L, Aruna. P, Sudha Devi. D, Priya. N, “Security in Virtual Machine Live Migration for KVM”, 2011.
[12] C. Ghribi, M. Hadji,D. Zeghlache, “Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and
migration algorithms”, In Proc. 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing,
2013.
[13] F. Liu, J. Tong, J.Mao, R.Bohn, J. Messina, L.Badger, D. Leaf, “ NIST Cloud Computing Reference Architecture
Recommendations”, NIST Spe. Pub. 500-292.
[14] H. Tsai, M.Siebenhaar, A. Miede, Yu-Lun Huang, R.Steinmetz, “Threat as a Service? Virtualization’s Impact on
Cloud Security”, Pub. The IEEE computer Society, Page 32-37, January/February 2012.
[15] R. Bhadauria, S.Sanyal, “Survey on Security Issues in Cloud Computing and Associated Mitigation
Techniques”, September 2011.
[16] Cold Migration and Live Migration ,
https://wiki.umiacs.umd.edu/VirtualMeshTest/index.php/Cold_Migration_and_Live_Migration