Research on Security Issues of Docker and Container Monitoring System in Edge Computing System

With the development of the 5G technology, edge computing will sink the computing center to the edge of the network close to the user, with low latency, high security, and lightweight features. The development of edge computing also puts forward a series of requirements for security, standardization, and unification. Docker container technology highly meets the existing needs of edge computing due to its lightweight, standardization, convenience, and security isolation. This article mainly analyzes the vulnerability of Docker containers and summarizes the security problems faced by the application of Docker container technology under edge computing systems. It also introduces a container monitoring software Prometheus and proposes a feasible edge computing risk monitoring model based on the Docker engine and Prometheus monitoring software.

[1]  Hong Wen,et al.  Transmission Scheduling and Game Theoretical Power Allocation for Interference Coordination in CoMP , 2014, IEEE Transactions on Wireless Communications.

[2]  Lei Zhang,et al.  Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks , 2014, IEEE Transactions on Communications.

[3]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[4]  Ningfang Mi,et al.  Docker Container Scheduler for I/O Intensive Applications Running on NVMe SSDs , 2018, IEEE Transactions on Multi-Scale Computing Systems.

[5]  JONG-HYOUK LEE,et al.  DIVDS: Docker Image Vulnerability Diagnostic System , 2020, IEEE Access.

[6]  Hong Wen,et al.  Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks , 2017, IEEE Communications Letters.

[7]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[8]  Hong Wen,et al.  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.

[9]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[10]  Hong Wen,et al.  Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.

[11]  Hong Wen,et al.  Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting , 2019, IEEE Access.

[12]  David Bernstein,et al.  Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.

[13]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[14]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.