To Docker or Not to Docker: A Security Perspective

被引:141
作者
Combe, Theo [1 ]
Martin, Antony [2 ]
Di Pietro, Roberto [3 ]
机构
[1] Telecom Paris Tech, Paris, France
[2] Nokia Bell Labs, Secur Dept, Nozay, France
[3] Nokia Bell Labs, Paris, France
关键词
cloud computing; containers; Docker; security; virtualization;
D O I
10.1109/MCC.2016.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Container solutions such as the popular Docker environment provide more flexibility than virtual machines and offer near-native performance in cloud-based infrastructures. However, Docker and its current usage scenarios entail security vulnerabilities that must be addressed.
引用
收藏
页码:54 / 62
页数:9
相关论文
共 12 条
[1]  
Biederman E.W., 2006, Proceedings of the Linux Symposium, V1, P101
[2]  
Bui T., 2015, ARXIV150102967V1
[3]  
Cappos J, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P565
[4]  
ClusterHQ and DevOps.com, 2015, CURRENT STATE CONTAI
[5]  
Combe T., CONTAINERS VULNERABI
[6]  
Docker, 2016, DOCK US GUID
[7]  
Lombardi F, 2015, ARTECH HSE INF SECUR, P1
[8]  
Lombardi F., 2014, CLOUD COMPUTING, P237, DOI DOI 10.1007/978-3-319-10530-7_10
[9]  
Novell, 2007, NOV APPARMOR ADM GUI
[10]  
Reshetova Elena, 2014, Secure IT Systems 19th Nordic Conference, NordSec 2014. Proceedings: LNCS 8788, P77, DOI 10.1007/978-3-319-11599-3_5