Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments | IEEE Conference Publication | IEEE Xplore