{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T21:06:38Z","timestamp":1773349598347,"version":"3.50.1"},"reference-count":122,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"(a) the University of Z\u00fcrich UZH, Switzerland and (b) the Horizon Europe Framework Program\u2019s project NATWORK","award":["101139285"],"award-info":[{"award-number":["101139285"]}]},{"name":"Swiss State Secretariat for Education, Research, and Innovation SERI","award":["22.00642"],"award-info":[{"award-number":["22.00642"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>Emerging cloud-centric networks span from edge clouds to large-scale datacenters with shared infrastructure among multiple tenants and applications with high availability, isolation, fault tolerance, security, and energy efficiency demands. Live migration (LiMi) plays an increasingly critical role in these environments by enabling seamless application mobility covering the edge-to-cloud continuum and maintaining these requirements. This paper presents a comprehensive survey of recent advancements that democratize LiMi, making it more applicable to a broader range of scenarios and network environments both for virtual machines (VMs) and containers, and analyzes LiMi\u2019s technical underpinnings and optimization techniques. It also delves into the issue of connections handover, presenting a taxonomy to categorize methods of traffic redirection synthesized from the existing literature. Finally, it identifies technical challenges and paves the way for future research directions in this key technology.<\/jats:p>","DOI":"10.1145\/3704436","type":"journal-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T10:04:39Z","timestamp":1731578679000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Democratizing Container Live Migration for Enhanced Future Networks - A Survey"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7493-4816","authenticated-orcid":false,"given":"Wissem","family":"Soussi","sequence":"first","affiliation":[{"name":"Institute of Computer Science (InIT), Zurich University of Applied Sciences ZHAW, Winterthur, Switzerland and Department of Informatics (IfI), University of Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3105-4904","authenticated-orcid":false,"given":"G\u00fcrkan","family":"G\u00fcr","sequence":"additional","affiliation":[{"name":"Institute of Computer Science (InIT), Zurich University of Applied Sciences ZHAW, Winterthur, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7461-7463","authenticated-orcid":false,"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"Institut f\u00fcr Informatik (IfI), Communication Systems Group, University of Zurich Faculty of Economics Business Administration and Information Technology, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.09.005"},{"issue":"1","key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"2140","DOI":"10.1038\/s41467-021-22294-x","article-title":"Net-zero emission targets for major emitting countries consistent with the Paris Agreement","volume":"12","author":"Soest Heleen L. Van","year":"2021","unstructured":"Heleen L. Van Soest, Michel G. J. den Elzen, and Detlef P. van Vuuren. 2021. Net-zero emission targets for major emitting countries consistent with the Paris Agreement. Nature Communications 12, 1 (2021), 2140.","journal-title":"Nature Communications"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/S10619-021-07387-2\/FIGURES\/7"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2794881"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2492705"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514357"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.002"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828102"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"108297","DOI":"10.1016\/j.compeleceng.2022.108297","article-title":"Live virtual machine migration: A survey, research challenges, and future directions","volume":"103","author":"Imran Muhammad","year":"2022","unstructured":"Muhammad Imran, Muhammad Ibrahim, Muhammad Salah Ud Din, Muhammad Atif Ur Rehman, and Byung Seo Kim. 2022. Live virtual machine migration: A survey, research challenges, and future directions. Computers and Electrical Engineering 103 (2022), 108297. https:\/\/www.sciencedirect.com\/journal\/computers-and-electrical-engineering\/vol\/103\/suppl\/C","journal-title":"Computers and Electrical Engineering"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3615353"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326540"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","DOI":"10.3390\/s19071488","article-title":"Container migration in the Fog: A performance evaluation","author":"Puliafito Carlo","year":"2019","unstructured":"Carlo Puliafito, Carlo Vallati, Enzo Mingozzi, Giovanni Merlino, Francesco Longo, and Antonio Puliafito. 2019. Container migration in the Fog: A performance evaluation. Sensors 19, 7 (2019). https:\/\/www.mdpi.com\/1424-8220\/19\/7\/1488","journal-title":"Sensors"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/NEM.2212"},{"key":"e_1_3_1_18_2","unstructured":"OpenVZ. Checkpoint\/Restore In Userspace - CRIU. Retrieved January 10 2024 from https:\/\/criu.org. ([n. d.])."},{"key":"e_1_3_1_19_2","first-page":"163","volume-title":"Proceedings of the 2009 IEEE International Symposium on Performance Analysis of Systems and Software","author":"Bakhoda Ali","year":"2009","unstructured":"Ali Bakhoda, George L. Yuan, Wilson W. L. Fung, Henry Wong, and Tor M. Aamodt. 2009. Analyzing CUDA workloads using a detailed GPU simulator. In Proceedings of the 2009 IEEE International Symposium on Performance Analysis of Systems and Software. IEEE, 163\u2013174."},{"key":"e_1_3_1_20_2","volume-title":"Proceedings of the IEEE Trustcom\/BigDataSE\/Ispa","author":"Sabt Mohamed","year":"2015","unstructured":"Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: What it is, and what it is not. In Proceedings of the IEEE Trustcom\/BigDataSE\/Ispa."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813706"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.22323\/1.299.0008"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.28"},{"issue":"3152676","key":"e_1_3_1_25_2","first-page":"10","article-title":"The EU general data protection regulation (GDPR)","volume":"10","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussche. 2017. The EU general data protection regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10, 3152676 (2017), 10\u20135555.","journal-title":"A Practical Guide, 1st Ed., Cham: Springer International Publishing"},{"key":"e_1_3_1_26_2","unstructured":"NIST. 2024. NIST Glossary: Moving Target Defense. Retrieved 21 November 2024 from https:\/\/csrc.nist.gov\/glossary\/term\/moving_target_defense. (Jan 2024)."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106449"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600249CM"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869954"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2916577"},{"key":"e_1_3_1_31_2","unstructured":"International Energy Agency (IEA). 2024. Data Centres and Data Transmission Networks. Retrieved 21 November 2024 from https:\/\/www.iea.org\/energy-system\/buildings\/data-centres-and-data-transmission-networks. (2024)."},{"key":"e_1_3_1_32_2","first-page":"407","volume-title":"Proceedings of the International Symposium on Parallel and Distributed Processing and Applications","author":"Hermenier Fabien","year":"2006","unstructured":"Fabien Hermenier, Nicolas Loriant, and Jean-Marc Menaud. 2006. Power management in grid computing with xen. In Proceedings of the International Symposium on Parallel and Distributed Processing and Applications. Springer, 407\u2013416."},{"key":"e_1_3_1_33_2","first-page":"337","volume-title":"Proceedings of the NSDI","author":"Chen Gong","year":"2008","unstructured":"Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, and Feng Zhao. 2008. Energy-aware server provisioning and load dispatching for connection-intensive internet services. In Proceedings of the NSDI. 337\u2013350."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2011.62"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251223"},{"key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/978-3-642-10665-1_23","volume-title":"Cloud Computing: 1st International Conference, CloudCom 2009, Beijing, China, December 1\u20134, 2009. Proceedings 1","author":"Voorsluys William","year":"2009","unstructured":"William Voorsluys, James Broberg, Srikumar Venugopal, and Rajkumar Buyya. 2009. Cost of virtual machine live migration in clouds: A performance evaluation. In Cloud Computing: 1st International Conference, CloudCom 2009, Beijing, China, December 1\u20134, 2009. Proceedings 1. Springer, 254\u2013265."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/1551609.1551630"},{"key":"e_1_3_1_38_2","article-title":"Efficient live migration of virtual machines using shared storage","author":"Jo Changyeon","year":"2013","unstructured":"Changyeon Jo, Erik Gustafsson, Jeongseok Son, and Bernhard Egger. 2013. Efficient live migration of virtual machines using shared storage. ACM Sigplan Notices 48, 7 (2013), 41--50.","journal-title":"ACM Sigplan Notices"},{"key":"e_1_3_1_39_2","article-title":"Post-copy live migration of virtual machines","author":"Hines Michael R.","year":"2009","unstructured":"Michael R. Hines, Umesh Deshpande, and Kartik Gopalan. 2009. Post-copy live migration of virtual machines. ACM SIGOPS Operating Systems Review 43, 3 (2009), 14--26.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.03.007"},{"key":"e_1_3_1_41_2","first-page":"230","volume-title":"Proceedings of the 2010 IEEE International Conference on Software Engineering and Service Sciences","author":"Ma Fei","year":"2010","unstructured":"Fei Ma, Feng Liu, and Zhen Liu. 2010. Live virtual machine migration based on improved pre-copy approach. In Proceedings of the 2010 IEEE International Conference on Software Engineering and Service Sciences. IEEE, 230\u2013233."},{"key":"e_1_3_1_42_2","first-page":"1","volume-title":"Proceedings of the 2012 IEEE International Conference on Cloud Computing in Emerging Markets.","author":"Sahni Shashank","year":"2012","unstructured":"Shashank Sahni and Vasudeva Varma. 2012. A hybrid approach to live migration of virtual machines. In Proceedings of the 2012 IEEE International Conference on Cloud Computing in Emerging Markets.IEEE, 1\u20135."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155403"},{"key":"e_1_3_1_44_2","volume-title":"Comparing Live Migration between Linux Containers and Kernel Virtual Machine: Investigation Study inTerms of Parameters","author":"Kotikalapudi Sai Venkat Naresh","year":"2017","unstructured":"Sai Venkat Naresh Kotikalapudi. 2017. Comparing Live Migration between Linux Containers and Kernel Virtual Machine: Investigation Study inTerms of Parameters. Master\u2019s Thesis."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/1618525.1618528"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100304"},{"key":"e_1_3_1_48_2","unstructured":"OpenStack Foundation. 2024. OpenStack. (2024). Retrieved April 04 2024 from https:\/\/www.openstack.org\/"},{"key":"e_1_3_1_49_2","unstructured":"Proxmox VE. 2024. Proxmox Virtual Environment. (2024). Retrieved April 04 2024 from https:\/\/www.proxmox.com\/en\/proxmox-ve"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2007.4629212"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134445"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357526.3357542"},{"key":"e_1_3_1_53_2","unstructured":"OpenVZ. 2024. OpenVZ. Retrieved April 04 2024 from https:\/\/www.openvz.org\/. (2024)."},{"key":"e_1_3_1_54_2","unstructured":"Adrian Reber (Red Hat). Forensic Container Checkpointing in Kubernetes. ([n. d.]). Retrieved August 14 2024 from https:\/\/kubernetes.io\/blog\/2022\/12\/05\/forensic-container-checkpointing-alpha\/"},{"key":"e_1_3_1_55_2","unstructured":"Peter Schuurman (Google). Kubernetes 1.27: StatefulSet Start Ordinal Simplifies Migration. ([n. d.]). Retrieved August 14 2024 from https:\/\/kubernetes.io\/blog\/2023\/04\/28\/statefulset-start-ordinal\/"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Spring62846.2024.10683429"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254834"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2019.00062"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.31"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/1408654.1408662"},{"key":"e_1_3_1_61_2","volume-title":"Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks","author":"Lemmi Laura","year":"2023","unstructured":"Laura Lemmi, Carlo Puliafito, Antonio Virdis, and Enzo Mingozzi. 2023. Ensuring lossless workload migration at the edge with SRv6. In Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks."},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP50058.2020.00022"},{"key":"e_1_3_1_63_2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-24315-3_2","volume-title":"Proceedings of the Information and Communication Technology.","author":"Binder Andrej","year":"2015","unstructured":"Andrej Binder, Tomas Boros, and Ivan Kotuliak. 2015. A SDN based method of TCP connection handover. In Proceedings of the Information and Communication Technology.Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, and Ilsun You (Eds.), Springer International Publishing, Cham, 13\u201319."},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN50289.2020.9289898"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154367"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_1_67_2","unstructured":"C. Filsfils P. Camarillo J. Leddy D. Voyer S. Matsushima and Z. Li. 2021. RFC 8986: Segment Routing over IPv6 (SRv6) Network Programming. RFC Editor USA."},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.01.019"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629556"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3524270"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446714"},{"key":"e_1_3_1_72_2","first-page":"47","volume-title":"Proceedings of the 2021 USENIX Annual Technical Conference","author":"Planeta Maksym","year":"2021","unstructured":"Maksym Planeta, Jan Bierbaum, Leo Sahaya Daphne Antony, Torsten Hoefler, and Hermann H\u00e4rtig. 2021. MigrOS: Transparent live-migration support for containerised RDMA applications. In Proceedings of the 2021 USENIX Annual Technical Conference. USENIX Association, 47\u201363. Retrieved from https:\/\/www.usenix.org\/conference\/atc21\/presentation\/planeta"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101580"},{"key":"e_1_3_1_74_2","doi-asserted-by":"crossref","first-page":"103767","DOI":"10.1016\/j.jnca.2023.103767","article-title":"Enabling containerized Central Unit live migration in 5G radio access network: An experimental study","volume":"221","author":"Ramanathan Shunmugapriya","year":"2024","unstructured":"Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, and Andrea Fumagalli. 2024. Enabling containerized Central Unit live migration in 5G radio access network: An experimental study. Journal of Network and Computer Applications 221 (2024), 103767. https:\/\/www.sciencedirect.com\/journal\/journal-of-network-and-computer-applications\/vol\/221\/suppl\/C","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1002\/CPE.6474"},{"key":"e_1_3_1_76_2","volume-title":"Proceedings of the 2019 IEEE Symposium on Computers and Communications","author":"Liang Hongliang","unstructured":"Hongliang Liang, Qiong Zhang, Mingyu Li, and Jianqiang Li. Toward migration of SGX-enabled containers. In Proceedings of the 2019 IEEE Symposium on Computers and Communications."},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.37"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00031"},{"key":"e_1_3_1_79_2","first-page":"405","volume-title":"Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops","author":"McGrath Garrett","year":"2017","unstructured":"Garrett McGrath and Paul R. Brenner. 2017. Serverless computing: Design, implementation, and performance. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops. IEEE, 405\u2013410."},{"key":"e_1_3_1_80_2","unstructured":"Open Container Initiative - OCI. Release Notices. Retrieved August 07 2024 from https:\/\/opencontainers.org\/release-notices\/overview\/. ([n. d.])."},{"key":"e_1_3_1_81_2","article-title":"Performance-reliability model for computing systems","author":"Castillo Xavier","year":"1980","unstructured":"Xavier Castillo and Daniel P. Siewiorek. 1980. Performance-reliability model for computing systems. NTIS, SPRINGFIELD, VA, 1980, 26 (1980). https:\/\/apps.dtic.mil\/sti\/tr\/pdf\/ADA099482.pdf","journal-title":"NTIS, SPRINGFIELD, VA, 1980, 26"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(83)90093-5"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3246539"},{"key":"e_1_3_1_84_2","volume-title":"Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing","author":"Yussupov Vladimir","year":"2019","unstructured":"Vladimir Yussupov, Uwe Breitenb\u00fccher, Frank Leymann, and Christian M\u00fcller. 2019. Facing the unplanned migration of serverless applications: A study on portability problems, solutions, and dead ends. In Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing."},{"key":"e_1_3_1_85_2","doi-asserted-by":"crossref","DOI":"10.1109\/MCC.2018.022171666","article-title":"TOSCA solves big problems in the cloud and beyond!","author":"Lipton Paul","year":"2018","unstructured":"Paul Lipton, Derek Palma, Matt Rutkowski, and Damian Andrew Tamburri. 2018. TOSCA solves big problems in the cloud and beyond! IEEE Cloud Computing 5, 2 (2018), 37--47.","journal-title":"IEEE Cloud Computing"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW59300.2023.00065"},{"key":"e_1_3_1_87_2","volume-title":"Signaling System No. 7 (SS7\/C7): Protocol, Architecture, and Services","author":"Dryburgh Lee","year":"2005","unstructured":"Lee Dryburgh and Jeff Hewett. 2005. Signaling System No. 7 (SS7\/C7): Protocol, Architecture, and Services. Cisco press."},{"key":"e_1_3_1_88_2","volume-title":"Intel Trust Domain Extension (TDX) Module","author":"Corporation Intel","year":"2024","unstructured":"Intel Corporation. 2024. Intel Trust Domain Extension (TDX) Module. Technical Report. Intel."},{"key":"e_1_3_1_89_2","volume-title":"Intel\u00ae TDX Module Architecture Specification: TD Migration","author":"Corporation Intel","year":"2024","unstructured":"Intel Corporation. 2024. Intel\u00ae TDX Module Architecture Specification: TD Migration. Technical Report. Intel."},{"key":"e_1_3_1_90_2","unstructured":"Intel. Github: MigTD. Retrieved April 14 2024 from https:\/\/github.com\/intel\/MigTD. ([n. d.])."},{"key":"e_1_3_1_91_2","volume-title":"AMD SEV Secure Nested Paging Firmware ABI Specification","unstructured":"AMD. AMD SEV Secure Nested Paging Firmware ABI Specification. Technical Report 56860. AMD."},{"key":"e_1_3_1_92_2","unstructured":"Velero. 2023. Velero [Official Site]. (August 2023). Retrieved August 19 2023 from https:\/\/velero.io\/"},{"key":"e_1_3_1_93_2","unstructured":"OpenVZ. 2023. CRIU Image Streamer. Retrieved February 28 2024 from https:\/\/github.com\/checkpoint-restore\/criu-image-streamer. (August 2023). ."},{"key":"e_1_3_1_94_2","unstructured":"KubeVirt. KubeVirt [Official Site]. Retrieved August 19 2023 from https:\/\/kubevirt.io\/. ([n. d.])."},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225858"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3149965"},{"key":"e_1_3_1_98_2","article-title":"Live service migration in mobile edge clouds","author":"Machen Andrew","year":"2018","unstructured":"Andrew Machen, Shiqiang Wang, Kin K. Leung, Bong Jun Ko, and Theodoros Salonidis. 2018. Live service migration in mobile edge clouds. IEEE Wireless Communications 25, 1 (2018), 140--147.","journal-title":"IEEE Wireless Communications"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.85"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102062"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2827070"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.406"},{"key":"e_1_3_1_103_2","article-title":"Osmotic bio-inspired load balancing algorithm in cloud computing","author":"Gamal Marwa","year":"2019","unstructured":"Marwa Gamal, Rawya Rizk, Hani Mahdi, and Basem E. Elnaghi. 2019. Osmotic bio-inspired load balancing algorithm in cloud computing. IEEE Access 7 (2019), 42735--42744.","journal-title":"IEEE Access"},{"key":"e_1_3_1_104_2","doi-asserted-by":"crossref","DOI":"10.1504\/IJICA.2015.073007","article-title":"Bio-inspired algorithms for cloud computing: A review","author":"Balusamy Balamurugan","year":"2015","unstructured":"Balamurugan Balusamy, Jayashree Sridhar, Dhamodaran Divya, and P. Venkata Krishna. 2015. Bio-inspired algorithms for cloud computing: A review. International Journal of Innovative Computing and Applications 6, 3--4 (2015), 181--202.","journal-title":"International Journal of Innovative Computing and Applications"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.12.005"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2012.11"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012671"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2009.5347800"},{"issue":"12","key":"e_1_3_1_110_2","article-title":"Security in live migration of virtual machine with automated load balancing","volume":"3","author":"Tamrakar Anupam","year":"2014","unstructured":"Anupam Tamrakar. 2014. Security in live migration of virtual machine with automated load balancing. International Journal of Engineering Research and Technology 3, 12 (2014), 806--811.","journal-title":"International Journal of Engineering Research and Technology"},{"key":"e_1_3_1_111_2","first-page":"21","article-title":"A secure model for efficient live migration of containers","author":"Mavus Zeynep","year":"2019","unstructured":"Zeynep Mavus and Pelin Ang\u0131n. 2019. A secure model for efficient live migration of containers. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 10, 3 (2019), 21\u201344. https:\/\/hdl.handle.net\/11511\/38239","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076759"},{"key":"e_1_3_1_113_2","article-title":"An improved vTPM-VM live migration protocol","author":"Fan Peiru","year":"2015","unstructured":"Peiru Fan, Bo Zhao, Yuan Shi, Zhihong Chen, and Mingtao Ni. 2015. An improved vTPM-VM live migration protocol. Wuhan University Journal of Natural Sciences 20, 6 (2015), 512--520.","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.028"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","unstructured":"Huangxin Wang Fei Li and Songqing Chen. 2016. Towards cost-effective moving target defense against DDoS and covert channel attacks.In Proceedings of the 2016 ACM Workshop on Moving Target Defense. Association for Computing Machinery New York NY USA 15\u201325. DOI:10.1145\/2995272.2995281","DOI":"10.1145\/2995272.2995281"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN59219.2023.10329594"},{"key":"e_1_3_1_118_2","unstructured":"OpenVZ. Advanced Usage - CRIU. Retrieved August 07 2024 from https:\/\/criu.org\/Advanced_usage. ([n. d.])."},{"key":"e_1_3_1_119_2","volume-title":"Address Space Layout Randomization","author":"Team PaX","unstructured":"PaX Team. Address Space Layout Randomization. PaX Team. Retrieved 21 November 2024 from https:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"e_1_3_1_120_2","volume-title":"Proceedings of the 2023 IEEE Global Communications Conference: Mobile and Wireless Networks.","author":"Motalleb Mojdeh Karbalaee","year":"2023","unstructured":"Mojdeh Karbalaee Motalleb, Chafika Benza\u00efd, Tarik Taleb, and Vahid Shah-Mansouri. 2023. Moving target defense based secured network slicing system in the O-RAN architecture. In Proceedings of the 2023 IEEE Global Communications Conference: Mobile and Wireless Networks."},{"key":"e_1_3_1_121_2","volume-title":"Proceedings of the Decision and Game Theory for Security","author":"Sengupta Sailik","year":"2019","unstructured":"Sailik Sengupta, Tathagata Chakraborti, and Subbarao Kambhampati. 2019. MTDeep: Boosting the security of deep neural nets against adversarial attacks with moving target defense. In Proceedings of the Decision and Game Theory for Security. Springer International Publishing."},{"key":"e_1_3_1_122_2","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D. Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell Sandhini Agarwal Ariel Herbert-Voss Gretchen Krueger Tom Henighan Rewon Child Aditya Ramesh Daniel Ziegler Jeffrey Wu Clemens Winter Chris Hesse Mark Chen Eric Sigler Mateusz Litwin Scott Gray Benjamin Chess Jack Clark Christopher Berner Sam McCandlish Alec Radford Ilya Sutskever and Dario Amodei. 2020. Language models are few-shot learners. In Advances in Neural Information Processing Systems Curran Associates Inc. 1877--1901. Retrieved from https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/1457c0d6bfcb4967418bfb8ac142f64a-Paper.pdf"},{"key":"e_1_3_1_123_2","unstructured":"Anakin.ai. Can You Really Run Llama 3.1 405B Locally? Retrieved August 23 2024 from https:\/\/anakin.ai\/blog\/can-you-really-run-llama-3-1-405b-locally\/. ([n. d.])."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:05Z","timestamp":1750295885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":122,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3704436"],"URL":"https:\/\/doi.org\/10.1145\/3704436","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"2024-04-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}