The state‐of‐the‐art in container technologies: Application, orchestration and security

E Casalicchio, S Iannucci - Concurrency and Computation …, 2020 - Wiley Online Library
Containerization is a lightweight virtualization technology enabling the deployment and
execution of distributed applications on cloud, edge/fog, and Internet‐of‐Things platforms …

A secure container deployment strategy by genetic algorithm to defend against co-resident attacks in cloud computing

T Kong, L Wang, D Ma, Z Xu, Q Yang… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
Linux container mechanism is constantly gaining ground in the virtualization landscape as a
lightweight and efficient alternative to hypervisor-based Virtual Machine (VM). Lightweight …

{SimEnc}: A {High-Performance}{Similarity-Preserving} Encryption Approach for Deduplication of Encrypted Docker Images

T Sun, B Jiang, B Li, J Lv, Y Gao, W Dong - 2024 USENIX Annual …, 2024 - usenix.org
Encrypted Docker images are becoming increasingly popular in Docker registries for
privacy. As the Docker registry is tasked with managing an increasing number of images, it …

[PDF][PDF] Performance Analysis of an Hyperconverged Infrastructure using Docker Containers and GlusterFS.

R Leite, P Solís, E Alchieri - CLOSER, 2019 - scitepress.org
The adoption of hyperconverged infrastructures is a trend in datacenters, because it merges
different type of computing and storage resources. Hyperconverged infrastructures use …

Optimizing docker image encryption—tradeoff between performance and protection level

K Wolfson, J Shemer, S Sapir, A Zamir… - US Patent …, 2022 - Google Patents
One example method includes inserting a signal layer in an image, the signal layer
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …

Write-only limited-read filesystem

JJB Lum, A Youssef, DJ Arroyo - US Patent 10,733,306, 2020 - Google Patents
A secure filesystem provides write-only access with limited read. The filesystem stores data
as an encrypted block on a user machine using a symmetric (active) key, along with …

System for securing software containers with embedded agent

A Gerebe, R Osnat - US Patent 11,762,986, 2023 - Google Patents
A computer-implemented method of providing security for a software container, according to
an example of the present disclosure includes, receiving a software container image with a …

[PDF][PDF] A Review of Edge Computing Nodes based on the Internet of Things.

Y Dong, J Bai, X Chen - IoTBDS, 2020 - scitepress.org
Due to the limitations of resources on the IoT device side, it is necessary to provide users
with services not only by means of a long-distance cloud computing center node, but also by …

Optimizing docker image encryption-tradeoff between performance and protection level

K Wolfson, J Shemer, S Sapir, A Zamir… - US Patent …, 2023 - Google Patents
One example method includes inserting a signal layer in an image, the signal layer
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …

Optimizing container image encryption

K Wolfson, J Shemer, S Sapir, A Zamir… - US Patent …, 2023 - Google Patents
2020-09-18 Assigned to EMC IP Holding Company LLC reassignment EMC IP Holding
Company LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …