Yong Shi
Beijing Jiaotong University

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

A Virtual Machine Cloning Approach Based on Trusted Computing Wei Ma; Xiaoyong Li; Yong Shi; Yu Guo
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computing has become more and more popular and the technology of rapid virtual machine (VM) cloning is widely used in cloud computing environment to implement the fast deployment of VMs to meet the need of bursting computational request. However, the security issue of VM cloning technology is not considered thoroughly in current approaches. This paper proposes a virtual machine cloning approach based on trusted computing which deals with memory and disk of a VM separately. This approach resolves three problems: the identities verification of involved servers; the attestation of source VM and destination VM; the protection of integrity of transmitted data. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3558