Security challenges on the clone, snapshot, migration and rollback of Xen based computing environments

  • Lei Yu*
  • , Chuliang Weng
  • , Minglu Li
  • , Yuan Luo
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

While virtual machines provide significant flexibility for users and administrators to clone, snapshot, migration and rollback with unprecedented ease, it also bring forth some new problems and negative effects to the security of computing environments. The applications and operating systems are forced to run in a dynamical and unregulated computing environment, which gives rise to so radical difference that the administrator is difficult to maintain the security of computing environment. This paper summarizes and presents some types of security challenges based on existing viewpoints, then we analysis the similar challenges in Xen and discuss the potential directions and implementations for modifying it to adapt to these challenges.

Original languageEnglish
Title of host publicationProceedings - 5th Annual ChinaGrid Conference, ChinaGrid 2010
Pages223-227
Number of pages5
DOIs
StatePublished - 2010
Externally publishedYes
Event5th Annual ChinaGrid Conference, ChinaGrid 2010 - Guangzhou, Guangdong, China
Duration: 16 Jul 201018 Jul 2010

Publication series

NameProceedings - 5th Annual ChinaGrid Conference, ChinaGrid 2010

Conference

Conference5th Annual ChinaGrid Conference, ChinaGrid 2010
Country/TerritoryChina
CityGuangzhou, Guangdong
Period16/07/1018/07/10

Keywords

  • Security
  • Version managament
  • Virtualization

Fingerprint

Dive into the research topics of 'Security challenges on the clone, snapshot, migration and rollback of Xen based computing environments'. Together they form a unique fingerprint.

Cite this