TY - GEN
T1 - Design and Implementation of a Data-Auditing Mechanism for Container Migration
AU - Uchibayashi, Toshihiro
AU - Apduhan, Bernady
AU - Suganuma, Takuo
AU - Hiji, Masahiro
N1 - Funding Information:
ACKNOWLEDGMENT This work was supported by JSPS KAKENHI Grant Number JP20K19778.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Virtualization technology has become indispensable in edge computing environments where applications are deployed to many nodes. In the past few years, the technology has improved dramatically, and is not only used in the field, but is also the subject of much research. In particular, containers which are lighter in weight than virtual machines, have greatly expanded their market share in recent years. The problem is the migration of containers. Migration is the process of creating a container checkpoint image and moving the image so the container can be restored at a different location while maintaining its state. While migration is very easy to perform, it may also violate company regulations and/or national laws, depending on the destination. Therefore, we propose and implement a data-auditing mechanism for containers, which has been used for virtual machines. We evaluate the feasibility of the proposed mechanism.
AB - Virtualization technology has become indispensable in edge computing environments where applications are deployed to many nodes. In the past few years, the technology has improved dramatically, and is not only used in the field, but is also the subject of much research. In particular, containers which are lighter in weight than virtual machines, have greatly expanded their market share in recent years. The problem is the migration of containers. Migration is the process of creating a container checkpoint image and moving the image so the container can be restored at a different location while maintaining its state. While migration is very easy to perform, it may also violate company regulations and/or national laws, depending on the destination. Therefore, we propose and implement a data-auditing mechanism for containers, which has been used for virtual machines. We evaluate the feasibility of the proposed mechanism.
UR - http://www.scopus.com/inward/record.url?scp=85145358239&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85145358239&partnerID=8YFLogxK
U2 - 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927748
DO - 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927748
M3 - Conference contribution
AN - SCOPUS:85145358239
T3 - Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022
BT - Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022
A2 - Fortino, Giancarlo
A2 - Gravina, Raffaele
A2 - Guerrieri, Antonio
A2 - Savaglio, Claudio
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 20th IEEE International Conference on Dependable, Autonomic and Secure Computing, 20th IEEE International Conference on Pervasive Intelligence and Computing, 7th IEEE International Conference on Cloud and Big Data Computing, 2022 IEEE International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022
Y2 - 12 September 2022 through 15 September 2022
ER -