Skip to main content

Verification of Data Collection Methods for Live Migration Protection Mechanism

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 7))

Abstract

This paper describes the live migration data protection mechanism. At the beginning of the live migration process, the proposed data protection mechanism verifies whether movement of the application’s data is allowed, based on the content of regulations related to data usage issued by the country and organization. This mechanism performs live migration only when migration is allowed. This mechanism enables the use of appropriate data while protecting privacy during the live migration process. We will describe and evaluate the implementation of the data protection mechanism. As a result, our mechanism is considered that there is no influence on the live migration time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. EU FP7/ICT project 257115. Optimis: optimized infrastructure services, June 2010–May 2013

    Google Scholar 

  2. EU FP7/ICT project 287708. icore: internet connected objects for reconfigurable ecosystems, October 2011–September 2014

    Google Scholar 

  3. de Meer, H., Pohls, H.C., Posegga, J., Samelin, K.: On the relation between redactable and sanitizable signature schemes, pp. 113–130. Springer (2014)

    Google Scholar 

  4. Kiyomoto, S., Nakamura, T., Takasaki, H., Watanabe, R., Miyake, Y.: PPM: privacy policy manager for personalized services. In: Security Engineering and Intelligence Informatics, pp. 377–392. Springer (2013)

    Google Scholar 

  5. EU HORIZON 2020 project 643262. ikaas: intelligent knowledge as a service, 2014–2017

    Google Scholar 

  6. Vlacheas, P., Stavroulaki, V., Georgakopoulos, A., Kelaidonis, D., Rahim, A., Moessner, K., Miyake, Y., Kiyomoto, S., Yamada, K., Hashimoto, K.: An overview and main benefits of an intelligent knowledge-as-a-service platform. In: WWRF 34th Meeting (2015)

    Google Scholar 

  7. VMware KB. http://kb.vmware.com/kb/2106949

Download references

Acknowledgements

The work is supported by the collaborative European Union and Ministry of Internal Affairs and Communication, Japan, Research and Innovation action: iKaaS. EU Grant number 643262.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toshihiro Uchibayashi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Uchibayashi, T., Hashi, Y., Hidano, S., Kiyomoto, S., Suganuma, T., Hiji, M. (2018). Verification of Data Collection Methods for Live Migration Protection Mechanism. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65521-5_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65520-8

  • Online ISBN: 978-3-319-65521-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics