The International Arab Journal of Information Technology (IAJIT)


Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach

Virtual Machine (VM) migration in cloud computing is essential to accomplishing various resource management goals, such as load balancing, power management, and resource sharing. Ensuring Quality of Service (QoS) is crucial while migrating VMs, which means that VMs must run continuously during the procedure. The dynamic nature of resource requirements in cloud computing, driven by “service-on-demand,” poses security risks, even while live VM migration mechanisms help to maintain VM availability. This paper addresses changing resource requirements and improves overall system security by introducing a novel method for safe live VM migration. In this paper, a robust optimization approach has been proposed for live VM migration named the Gorilla-based Shuffled Shepherd Optimization Approach (GBSSOA). The proposed approach maximizes the number of fitness targets, such as migration time, QoS parameters, and job runtime. The method takes into account trust values in addition to the previously described performance measures, with a focus on security. Key performance indicators QoS as workload, migration time, trust, and GBSSOA-based secure live VM migration are taken into account during the evaluation. The obtained values of 0.141, 0.654, 342.254ms, and 0.569, respectively, show noteworthy accomplishments in the results. These results highlight how well the strategy developed may simultaneously improve performance metrics and strengthen the security of live VM migration in dynamic cloud computing environments.

[1] Addya S., Turuk A., Satpathy A., Sahoo B., and Sarkar M., “A Strategy for Live Migration of Virtual Machines in a Cloud Federation,” IEEE Systems Journal, vol. 13, no. 3, pp. 2877-2887, 2019. DOI:10.1109/JSYST.2018.2872580

[2] Ahmad O., Haij L., Shukur H., Zebari R., Abas S., and Sadeeq M., “Comparison among Cloud Technologies and Cloud Performance,” Journal of Applied Science and Technology Trends, vol. 1, no. 2, pp. 40-47, 2020. 9/8

[3] Alqam S., Alzeidi N., Touzene A., and Day K., “Live Virtual Machine Migration in Fog Computing: State of the Art,” The International Arab Journal of Information Technology, vol. 20, no. 6, pp. 977-995, 2023.

[4] Bhardwaj A. and Challa R., “Virtualization in Cloud Computing: Moving from Hypervisor to Containerization-A Survey,” Arabian Journal for Science and Engineering, vol. 46, no. 11, pp. 8585-8601, 2021. 021-05553-3

[5] Bhat R., Sunitha N., and Iyengar S., “A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications,” International Journal of Information Technology, vol. 15, no. 2, pp. 675-690, 2023.

[6] Choudhary A., Govil M., Singh G., Awasthi L., Pilli E., and Kapil D., “A Critical Survey of Live Virtual Machine Migration Techniques,” Journal of Cloud Computing: Advances, Systems and Applications, vol. 6, no. 23, pp. 1-41, 2017. DOI:10.1186/s13677-017-0092-1

[7] Deylami H., Gutierrez J., and Sinha R., “Tailoring the Cyber Security Framework: How to Overcome the Complexities of Secure Live Virtual Machine Migration in Cloud Computing,” arXiv Preprint arXiv:2110.04457, 2020.

[8] García-Valls M., Cucinotta T., and Lu C., “Challenges in Real-Time Virtualization and Predictable Cloud Computing,” Journal of Systems Architecture, vol. 60, no. 9, pp. 726-740, 2014. 176 The International Arab Journal of Information Technology, Vol. 21, No. 1, January 2024

[9] Huang W., Gao Q., Liu J., and Panda D., “High Performance Virtual Machine Migration with RDMA over Modern Interconnects,” in Proceedings of the IEEE International Conference on Cluster Computing, Austin, pp. 11-20, 2007. DOI:10.1109/CLUSTR.2007.4629212

[10] Hu L., Zhao J., Xu G., Ding Y., and Chu J., “HMDC: Live Virtual Machine Migration Based on Hybrid Memory Copy and Delta Compression,” 01-Applied Mathematics and Information Sciences, vol. 7, no. 2L, pp. 639-646. 2013. DOI:10.12785/amis/072L38

[11] Huang C., Chen W., Yuan L., Ding Y., Jian S., Tan Y., Chen H., and Chen D., “Toward Security as a Service: A Trusted Cloud Service Architecture with Policy Ustomization,” Journal of Parallel and Distributed Computing, vol. 149, pp. 76-88, 2021.

[12] Kaveh A. and Zaerreza A, Studies in Systems, Decision and Control, Springer, 2023.

[13] Li C., Wang Y., Tang H., and Luo Y., “Dynamic Multi-Objective Optimized Replica Placement and Migration Strategies for SAAS Applications in Edge Cloud,” Future Generation Computer Systems, vol. 100, pp. 921-937, 2019.

[14] Lichtenthäler R., “Model-Driven Software Migration towards Fine-Grained Cloud Architectures,” in Proceedings of the 11th ZEUS Workshop, Bayreuth, pp. 35-38, 2019. https://ceur-

[15] Malhotra L., Agarwal D., and Jaiswal A., “Virtualization in Cloud Computing,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 8, pp. 745-749, 2014. 201499a19.pdf

[16] Nelson M., Lim B., and Hutchins G., “Fast Transparent Migration for Virtual Machines,” in Proceedings of the USENIX Annual Technical Conference, California, pp. 391-394, 2005. ch/general/full_papers/short_papers/nelson/nelso n.pdf

[17] Noshy M., Ibrahim A., and Ali H., “Optimization of Live Virtual Machine Migration in Cloud Computing: A Survey and Future Directions,” Journal of Network and Computer Applications, vol. 110, pp. 1-10, 2018.

[18] Pal S., Kumar R., Son L., Saravanan K., Abdel- Basset M., Manogaran G., and Thong P., “Novel Probabilistic Resource Migration Algorithm for Cross-Cloud Live Migration of Virtual Machines in Public Cloud,” The Journal of Supercomputing, vol. 75, no. 9, pp. 5848-5865, 2019.

[19] Salehi M., Boukerche A., Darehshoorzadeh A., and Mammeri A., “Towards a Novel Trust-Based Opportunistic Routing Protocol for Wireless Networks,” Wireless Networks, vol. 22, no. 3, pp. 927-943, 2016. DOI:10.1007/s11276-015-1010-4

[20] Saraswathi A., Kalaashri Y., and Padmavathi S., “Dynamic Resource Allocation Scheme in Cloud Computing,” Procedia Computer Science, vol. 47, pp. 30-36, 2015.

[21] Seo D., Jeon Y., Lee S., and Lee K., “Cloud Computing for Ubiquitous Computing on M2M and IoT Environment Mobile Application,” Cluster Computing, vol. 19, no. 2, pp. 1001-1013, 2016.

[22] Shukur H., Zeebaree S., Zebari R., Zeebaree D., Ahmed O., and Salih A., “Cloud Computing Virtualization of Resources Allocation for Distributed Systems,” Journal of Applied Science and Technology Trends, vol. 1, no. 3, pp. 98-105, 2020. iew/31/14

[23] Sun D., Zhang J., Fan W., Wang T., Liu C., and Huang W., “SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing,” in Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, Xi'an, pp. 2-9, 2016.

[24] Torquato M., Maciel P., and Vieira M., “A Model for Availability and Security Risk Evaluation for Systems with VMM Rejuvenation Enabled by VM Migration Scheduling,” IEEE Access, vol. 7, pp. 138315-138326,2019. DOI:10.1109/ACCESS.2019.2943273

[25] Verma G., “Secure VM Migration in Cloud: Multi-Criteria Perspective with Improved Optimization Model,” Wireless Personal Communications, vol. 124, no. 5, pp. 75-102, 2022. w

[26] Wang W., Jiang Y., and Wu W., “Multiagent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 7, no. 2, pp. 205-220, 2017. DOI:10.1109/TSMC.2016.2523910

[27] Xiao Y., Sun X., Guo Y., Li S., Zhang Y., and Wang Y., “An Improved Gorilla Troops Optimizer Based on Lens Opposition-Based Learning and Adaptive β-Hill Climbing for Global Optimization,” Computer Modeling in Engineering and Sciences, vol. 131, no. 2, pp. 815-850, 2022.

[28] Xie X., Yuan T., Zhou X., and Cheng X., Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization ... 177 “Research on Trust Model in Container-Based Cloud Service,” Computers, Materials and Continua, vol. 56, no. 2, pp. 273-283, 2018. 10.3970/cmc.2018.03587

[29] Yang C., Chen S., Liu J., Chan Y., Chen C., and Verma V., “An Energy-Efficient Cloud System with Novel Dynamic Resource Allocation Methods,” The Journal of Supercomputing, vol. 75, no. 1, pp. 4408-4429, 2019. DOI:10.1007/s11227-019-02794-w

[30] Yang L., Yang D., Cao J., Sahni Y., and Xu X., “QoS Guaranteed Resource Allocation for Live Virtual Machine Migration in Edge Clouds,” IEEE Access, vol. 8, pp. 78441-78451, 2020. DOI:10.1109/ACCESS.2020.2989154

[31] Zeb T., Yousaf M., Afzal H., and Mufti M., “A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment,” China Communications, vol. 15, no. 8, pp. 126-140, 2018. DOI:10.1109/CC.2018.8438279

[32] Zeebaree S., Jacksi K., and Zebari R., “Impact Analysis of SYN Flood DDoS Attack on HAProxy and NLB Cluster-Based Web Servers,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 1, pp. 505-512, 2020. cle/view/20515/13894