149
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Container Security in Cloud Environments

      Preprint
      In review
      research-article
        1 , , 2 , 3 , 2
      ScienceOpen Preprints
      ScienceOpen
      Bookmark

            Abstract

            A bstract:

            The widespread adoption of containers in modern software applications has introduced new challenges to security and integrity. Containers, known for their lightweight and portable nature, facilitate agile deployment across diverse environments. However, this popularity has led to security risks such as vulnerabilities in container images, misconfigurations, and insecure runtime environments. This paper addresses these challenges by proposing automated and robust security techniques integrated into continuous integration and continuous development pipelines. The work emphasizes the importance of a solid security policy, container image scanning, orchestration security, and runtime monitoring. The study also identifies specific issues faced by the DevSecOps community and proposes initial fixes to fortify container security.

            In the cloud environment, containers play a pivotal role in application deployment by sharing the same OS kernel, reducing resource requirements, and minimizing start-up times. Despite their advantages, weak container isolation poses security challenges, including privilege escalation and information leaks. To mitigate these concerns, the paper conducts an in-depth analysis of existing access control mechanisms for container security. It discusses challenges in architecture modeling and presents use cases for fulfilling security requirements, encompassing container, inter-container, and

            host protection. The work emphasizes the need for both software and hardware solutions to enhance container security.

            Containers have emerged as a lightweight alternative to virtual machines, supporting microservices architecture. The container market is growing rapidly, but security concerns remain a significant barrier to adoption. This paper surveys existing literature on container security, categorizing it into four use cases: protecting containers from internal applications, inter-container protection, safeguarding the host from containers, and defending containers froma malicious or semi-honest host. The analysis reveals that software-based solutions, leveraging Linux kernel features and security modules, address the first three use cases, while the last use case relies on hardware-based solutions. The paper concludes with highlighting open research problems and future directions to guide further exploration in container security.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            28 February 2024
            Affiliations
            [1 ] Sheffiled Hallam University , Sheffield, South Yorkshire, United Kindgdom;
            [2 ] Austin Peay State University, Clarksville, TN, United States;
            [3 ] Indiana University of Pennsylvania, Indiana, PA, United States;
            Author notes
            Author information
            https://orcid.org/0009-0003-8754-0754
            https://orcid.org/0009-0000-9832-879X
            https://orcid.org/0009-0007-3428-4442
            https://orcid.org/0009-0001-0866-7649
            Article
            10.14293/PR2199.000730.v1
            aee47129-8a2a-42d4-b583-4e1a5f9f1497

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 28 February 2024
            Categories

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Security & Cryptology

            Comments

            Comment on this article