2019
DOI: 10.1016/j.future.2019.02.026
|View full text |Cite
|
Sign up to set email alerts
|

Integrity verification of Docker containers for a lightweight cloud environment

Abstract: Virtualisation techniques are growing in popularity and importance, given their application to server consolidation and to cloud computing. Remote Attestation is a well-known technique to assess the software integrity of a node. It works well with physical platforms, but not so well with virtual machines hosted in a full virtualisation environment (such as the Xen hypervisor or Kernel-based Virtual Machine) and it is simply not available for a lightweight virtualisation environment (such as Docker). On the con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(44 citation statements)
references
References 6 publications
0
40
0
2
Order By: Relevance
“…DIVE [5] is a very recent approach allowing an orchestrator to check the integrity of a given container on a remote compute node. DIVE relies on a modified version of IMA [27] supporting containers and a remote attestation framework (OpenAttestation).…”
Section: Configuration-based Defensementioning
confidence: 99%
See 1 more Smart Citation
“…DIVE [5] is a very recent approach allowing an orchestrator to check the integrity of a given container on a remote compute node. DIVE relies on a modified version of IMA [27] supporting containers and a remote attestation framework (OpenAttestation).…”
Section: Configuration-based Defensementioning
confidence: 99%
“…Because Pledge and Seccomp-BPF provide mechanisms for a process to confine itself while other frameworks confine a full environment, modifications have to be made directly in the source code of this software and thus are less suitable to protect closed-source software. Genericity and integration column (5) shows whether the framework has been designed in a generic way, is well integrated into production environments and is usable in real life scenarios. For instance, in its current version, Landlock actually requires administrator rights to work thus limiting its usability in production where containers run in usermode.…”
Section: Recap Chartmentioning
confidence: 99%
“…The main advantage of DIVE is its behaviour of detecting compromised container, so that it be stopped and replaced as early as possible without refreshing the whole system. It has also improved Remote Attestation efficiency and verified using OAT core tool [20]. In 2019, Yongfeng Yin et al proposed an experimentation platform architecture design to analyse the effectiveness of cyber security based on Docker.…”
Section: Literature Surveymentioning
confidence: 99%
“…A guest network is capable of data communication between virtual instances which are running on one host, multiple hosts, or across the different subnets [4][5][6]. The Docker [7] container platform is an open-source container management project launched by Docker Inc. This is a lightweight container technology that bundles and runs the service operating environment.…”
Section: Introductionmentioning
confidence: 99%
“…This is a lightweight container technology that bundles and runs the service operating environment. When configuring a cloud environment based on the Docker container, an orchestration software such as Kubernetes or Docker Swarm is needed to effectively manage and efficiently allocate the resources required for containers [8][9][10].…”
Section: Introductionmentioning
confidence: 99%