Systems and methods for securing virtual machines
Abstract:
A system includes a first computing device comprising a virtual machine (VM), a second computing device, and a third computing device coupled to the first and second computing devices. The third computing device includes a management module configured to migrate the VM from the first computing device to the second computing device. The management module is also configured to create a first signature of data associated with the VM stored by the first computing device over a first period of time and create a second signature of data associated with the VM stored by the first computing device over a second period of time. The management module is further configured to compare the first signature and the second signature throughout the migration process to determine whether the data has been altered and generate an alert when a difference between the first signature and the second signature is detected.
Public/Granted literature
Information query
Patent Agency Ranking
0/0