Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The state-of-the-art in container technologies: Application, orchestration and security
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-3118-5058
Mississippi State University, .
2020 (English)In: Concurrency and Computation, ISSN 1532-0626, E-ISSN 1532-0634, Vol. 32, no 17, article id e5668Article in journal (Refereed) Published
Abstract [en]

Containerization is a lightweight virtualization technology enabling the deployment and execution of distributed applications on cloud, edge/fog, and Internet-of-Things platforms. Container technologies are evolving at the speed of light, and there are many open research challenges. In this paper, an extensive literature review is presented that identifies the challenges related to the adoption of container technologies in High Performance Computing, Big Data analytics, and geo-distributed (Edge, Fog, Internet-of-Things) applications. From our study, it emerges that performance, orchestration, and cyber-security are the main issues. For each challenge, the state-of-the-art solutions are then analyzed. Performance is related to the assessment of the performance footprint of containers and comparison with the footprint of virtual machines and bare metal deployments, the monitoring, the performance prediction, the I/O throughput improvement. Orchestration is related to the selection, the deployment, and the dynamic control of the configuration of multi-container packaged applications on distributed platforms. The focus of this work is on run-time adaptation. Cyber-security is about container isolation, confidentiality of containerized data, and network security. From the analysis of 97 papers, it came out that the state-of-the-art is more mature in the area of performance evaluation and run-time adaptation rather than in security solutions. However, the main unsolved challenges are I/O throughput optimization, performance prediction, multilayer monitoring, isolation, and data confidentiality (at rest and in transit). © 2020 John Wiley & Sons, Ltd.

Place, publisher, year, edition, pages
John Wiley and Sons Ltd , 2020. Vol. 32, no 17, article id e5668
Keywords [en]
Big Data, cloud computing, cyber-security, docker, orchestration, run-time adaptation, Containers, Data Analytics, Internet of things, Cyber security, Distributed applications, High performance computing, Runtime adaptation, Throughput optimization, Virtualization technologies, Network security
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-19181DOI: 10.1002/cpe.5668ISI: 000507898400001Scopus ID: 2-s2.0-85078679571OAI: oai:DiVA.org:bth-19181DiVA, id: diva2:1392048
Part of project
Bigdata@BTH- Scalable resource-efficient systems for big data analytics, Knowledge FoundationAvailable from: 2020-02-06 Created: 2020-02-06 Last updated: 2021-07-31Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Casalicchio, Emiliano

Search in DiVA

By author/editor
Casalicchio, Emiliano
By organisation
Department of Computer Science
In the same journal
Concurrency and Computation
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 381 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf