Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment

被引:2
作者
Uchibayashi, Toshihiro [1 ]
Apduhan, Bernady [2 ]
Suganuma, Takuo [3 ]
Hiji, Masahiro [4 ]
机构
[1] Kyushu Univ, Res Inst Informat Technol, Fukuoka 8168580, Japan
[2] Kyushu Sangyo Univ, Fac Informat Sci, Fukuoka 8130004, Japan
[3] Tohoku Univ, Cybersci Ctr, Sendai 9808577, Japan
[4] Tohoku Univ, Fac Econ, Sendai 9808577, Japan
关键词
container; edge computing; migration; data-audit; policy; PLACEMENT;
D O I
10.3390/computers12020027
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the proliferation of IoT sensors and devices, storing collected data in the cloud has become common. A wide variety of data with different purposes and forms are not directly stored in the cloud but are sent to the cloud via edge servers. At the edge server, applications are running in containers and virtual machines to collect data. However, the current deployment and movement mechanisms for containers and virtual machines do not consider any conventions or regulations for the applications and the data it contains. Therefore, it is easy to deploy and migrate containers and virtual machines. However, the problem arises when it is deployed or migrated, which may violate the licensing terms of the contained applications, the rules of the organization, or the laws and regulations of the concerned country. We have already proposed a data-audit control mechanism for the migration of virtual machines. The proposed mechanism successfully controls the unintentional and malicious migration of virtual machines. We expect similar problems with containers to occur as the number of edge servers increases. Therefore, we propose a policy-based data-audit control system for container migration. The proposed system was verified in the implemented edge computing environment and the results showed that adding the proposed data-audit control mechanism had a minimal impact on migration time and that the system was practical enough. In the future, we intend to conduct verification not in a very compact and short-range environment such as this one but on an existing wide-area network.
引用
收藏
页数:18
相关论文
共 33 条
[1]   Secure Live Virtual Machines Migration: Issues and Solutions [J].
Aiash, Mahdi ;
Mapp, Glenford ;
Gemikonakli, Orhan .
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, :160-165
[2]  
[Anonymous], Open Source Container Networking
[3]  
[Anonymous], HOME DOCKER
[4]  
[Anonymous], LINUX CONTAINERS
[5]  
[Anonymous], 2015, INT J SCI RES DEV
[6]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[7]   PLAN: A Policy-Aware VM Management Scheme for Cloud Data Centres [J].
Cui, Lin ;
Tso, Fung Po ;
Pezaros, Dimitrios P. ;
Jia, Weijia .
2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, :142-151
[8]  
Delu Huang, 2019, 2019 IEEE 5th International Conference on Computer and Communications (ICCC), P1214, DOI 10.1109/ICCC47050.2019.9064441
[9]  
Deshpande L, 2017, 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI)
[10]  
Flores H, 2020, IEEE INFOCOM SER, P2549, DOI [10.1109/infocom41043.2020.9155472, 10.1109/INFOCOM41043.2020.9155472]