Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment

被引:2
作者
Uchibayashi, Toshihiro [1 ]
Apduhan, Bernady [2 ]
Suganuma, Takuo [3 ]
Hiji, Masahiro [4 ]
机构
[1] Kyushu Univ, Res Inst Informat Technol, Fukuoka 8168580, Japan
[2] Kyushu Sangyo Univ, Fac Informat Sci, Fukuoka 8130004, Japan
[3] Tohoku Univ, Cybersci Ctr, Sendai 9808577, Japan
[4] Tohoku Univ, Fac Econ, Sendai 9808577, Japan
关键词
container; edge computing; migration; data-audit; policy; PLACEMENT;
D O I
10.3390/computers12020027
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the proliferation of IoT sensors and devices, storing collected data in the cloud has become common. A wide variety of data with different purposes and forms are not directly stored in the cloud but are sent to the cloud via edge servers. At the edge server, applications are running in containers and virtual machines to collect data. However, the current deployment and movement mechanisms for containers and virtual machines do not consider any conventions or regulations for the applications and the data it contains. Therefore, it is easy to deploy and migrate containers and virtual machines. However, the problem arises when it is deployed or migrated, which may violate the licensing terms of the contained applications, the rules of the organization, or the laws and regulations of the concerned country. We have already proposed a data-audit control mechanism for the migration of virtual machines. The proposed mechanism successfully controls the unintentional and malicious migration of virtual machines. We expect similar problems with containers to occur as the number of edge servers increases. Therefore, we propose a policy-based data-audit control system for container migration. The proposed system was verified in the implemented edge computing environment and the results showed that adding the proposed data-audit control mechanism had a minimal impact on migration time and that the system was practical enough. In the future, we intend to conduct verification not in a very compact and short-range environment such as this one but on an existing wide-area network.
引用
收藏
页数:18
相关论文
共 33 条
[21]   Container Migration in the Fog: A Performance Evaluation [J].
Puliafito, Carlo ;
Vallati, Carlo ;
Mingozzi, Enzo ;
Merlino, Giovanni ;
Longo, Francesco ;
Puliafito, Antonio .
SENSORS, 2019, 19 (07)
[22]  
Red Hat OpenShift, MAKES CONTAINER ORCH
[23]  
Shetty J., 2012, INT J COMPUT APPL, V39, P34, DOI DOI 10.5120/4875-7305
[24]  
Shirazi NU, 2014, IEEE INT CONF CL NET, P52, DOI 10.1109/CloudNet.2014.6968968
[25]  
Singh D, 2014, 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P287, DOI 10.1109/WF-IoT.2014.6803174
[26]  
Singh P, 2019, PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), P1098, DOI [10.1109/ICCS45141.2019.9065427, 10.1109/iccs45141.2019.9065427]
[27]   Container Security: Issues, Challenge and the Road Ahead [J].
Sultan, Sari ;
Ahmad, Imtiaz ;
Dimitriou, Tassos .
IEEE ACCESS, 2019, 7 :52976-52996
[28]  
Tao X, 2019, PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), P198, DOI [10.1109/netsoft.2019.8806659, 10.1109/NETSOFT.2019.8806659]
[29]   Policy Management Technique Using Blockchain for Cloud VM Migration [J].
Uchibayashi, Toshihiro ;
Apduhan, Bemady O. ;
Shiratori, Norio ;
Suganuma, Takuo ;
Hiji, Masahiro .
IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, :360-362
[30]   A Control Mechanism for Live Migration with Data Regulations Preservation [J].
Uchibayashi, Toshihiro ;
Hashi, Yuichi ;
Hidano, Seira ;
Kiyomoto, Shinsaku ;
Apduhan, Bernady ;
Abe, Toru ;
Suganuma, Takuo ;
Hiji, Masahiro .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2017, PT I, 2017, 10404 :509-522