Safe transfer method and system of wide area network trusted virtual machine

A technology for migrating systems and virtual machines, applied in the field of virtual machine migration, which can solve problems such as virtual machine security concerns, business failures, and complicated migration processes

Active Publication Date: 2014-10-22
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But the security of virtual machines has been a concern
In the WAN, this method will fail, and direct migration will cause the services deployed on the virtual machine to fail to run normally after migration.
[0007] 3) High latency and low bandwidth problems of networks between WANs
Connecting two data centers requires multiple routes and links. The network delay is large and the bandwidth is relatively small, which increases the total time and downtime of virtual machine migration and affects the business running in the virtual machine.
The NFS distributed shared file system is used in the LAN, and the shared disk does not need to be migrated. However, due to its high latency and low bandwidth, the use of shared disks in the WAN will cause a large delay. Therefore, NFS shared disks are generally not used for WAN migration. way, but need to use the way of disk migration
[0008] 4) Trusted virtual machines need to additionally migrate vTPM state data
Its migration process is more complicated than ordinary virtual machine migration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe transfer method and system of wide area network trusted virtual machine
  • Safe transfer method and system of wide area network trusted virtual machine
  • Safe transfer method and system of wide area network trusted virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The invention combines the VPN technology with the TPM&vTPM technology, and realizes the security and credibility of the virtual machine migration terminal, access terminal, network transmission, and the entire migration chain. Compared with the security migration protocol in the prior art, this patent does not need to rebuild the security migration protocol, and directly adopts the SSL mechanism in the existing VPN (OpenVPN), which greatly reduces the difficulty of implementation and the compatibility of products. The virtualization environment is a Xen virtualization environment, and the trusted virtual machine is a virtual machine that supports the TPM trusted computing function. The safe migration refers to carrying out credible verification on the transmission end, and using the VPN security protocol to monitor the transmission process. Perform encryption processing.

[0080] figure 1 It is a flow chart of the safe migration method of the trusted virtual machine i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe transfer method and system of a wide area network trusted virtual machine. The method includes the following steps that: S1, two data centers are deployed in a wide area network, and two layers of bride-pattern virtual private networks are constructed between the two data centers; S2, a virtual machine image file is split into a template and user private data, and hardware resources of each data center are virtualized, so that services can be provided for a user in the form of a virtual machine; S3, a trusted virtual machine which supports a vTPM is created and started between the two data centers through deploying a virtual trusted platform, and a vTPM example bound with the trusted virtual machine is generated, and TPM driving is loaded; S4, a source end and a destination end are configured according to the vTPM example, and then, the memory, CPU state, disk and vTPM state of the trusted virtual machine are transferred at the source end, and are restored at the destination end, and therefore, synchronous transfer of the vTPM and the virtual machine can be realized.

Description

technical field [0001] The invention relates to the field of virtual machine migration, in particular to a safe migration method of a trusted virtual machine in a wide area network. Background technique [0002] In recent years, virtualization technology, as one of the key technologies of cloud computing, can improve the utilization rate of server resources in the data center, reduce the difficulty of management, and reduce the IT cost of enterprises, so it has been widely concerned and used by enterprises. Among them, the virtual machine online migration technology is widely used in the fields of data center disaster recovery backup, load balancing, and data center energy saving because it can flexibly allocate and schedule server resources. [0003] But the security of virtual machines has been a concern. With the development of trusted computing technology, people began to try to combine trusted computing technology with virtualization technology to solve the security pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 杨坤宋莹孙毓忠
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products