2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.68
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Although the adoption of Docker has enabled numerous automated acceleration, security issues have been affecting the widespread use of Docker, [16] proposes security algorithms and methods to address the issues in Docker container technology related to DoS attack-related issues in Docker container technology. [17] proposes a new security layer called Most Privileged Container (MPC) to improve container security by implementing permission-based access control. This layer assigns resource access privileges based on policies and security profiles and monitors the runtime behavior of containers.…”
Section: Selinux-based Container Security Researchmentioning
confidence: 99%
“…Although the adoption of Docker has enabled numerous automated acceleration, security issues have been affecting the widespread use of Docker, [16] proposes security algorithms and methods to address the issues in Docker container technology related to DoS attack-related issues in Docker container technology. [17] proposes a new security layer called Most Privileged Container (MPC) to improve container security by implementing permission-based access control. This layer assigns resource access privileges based on policies and security profiles and monitors the runtime behavior of containers.…”
Section: Selinux-based Container Security Researchmentioning
confidence: 99%
“…The lifetime of a container includes the service state and refactoring state, so the average lifetime of a container is 1/ . Assuming that the average number of service state containers is m, and the average number of reconstructed state containers is r c , there is r c m c =+ [8]. According to Little's law, we get:…”
Section: Dynamically Reconstruct Ctmc Modelmentioning
confidence: 99%
“…As a result of their ease-of-use and performance enhancements, such containers as Docker [15], OpenVZ [16], and Linux Container (LXC) [17], are being widely adopted in industry, academia, and other scientific communities. Undoubtedly, Container-based virtualization delivers a lightweight and efficient environment, but raises some security concerns as it allows an isolated process to utilize an underlying host kernel [18]. Moreover, Docker container is not suitable for IoT applications with frequent interaction of small data and resource-constrained IoT devices [19].…”
Section: Introductionmentioning
confidence: 99%