{"title":"Security Enhancement using Image verification method to Secure Docker Containers","authors":"V. Saxena, Deepika Saxena, U. Singh","doi":"10.1145/3590837.3590879","DOIUrl":null,"url":null,"abstract":"Now with the dawn of the internet, cloud computing has been reformed by opening new horizons at an inclusive level with auspicious opportunities. With the rise of opportunities, popularity, and public connectivity by the internet, it is the next foremost edge for Trojans, worms, viruses, hackers and cyber-attacks will broaden because a hacker would see this as a new edge to try to steal confidential interrupt, information, services and route damage to the originality cloud computing Docker system. Security in Docker container over the cloud is of great anxiety hence care needs to be taken to provide secure Docker containers and secure cloud services. Docker is usual within the software development community due to the portability, versatility, and scalability of containers. In this paper, we analyze the Docker storage-based security and by applying the methods of Docker image verification, checking capabilities, and storage selection, improve the security in Docker containers.","PeriodicalId":112926,"journal":{"name":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3590837.3590879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Now with the dawn of the internet, cloud computing has been reformed by opening new horizons at an inclusive level with auspicious opportunities. With the rise of opportunities, popularity, and public connectivity by the internet, it is the next foremost edge for Trojans, worms, viruses, hackers and cyber-attacks will broaden because a hacker would see this as a new edge to try to steal confidential interrupt, information, services and route damage to the originality cloud computing Docker system. Security in Docker container over the cloud is of great anxiety hence care needs to be taken to provide secure Docker containers and secure cloud services. Docker is usual within the software development community due to the portability, versatility, and scalability of containers. In this paper, we analyze the Docker storage-based security and by applying the methods of Docker image verification, checking capabilities, and storage selection, improve the security in Docker containers.