Endogenous Security Protection Method Suitable for the Full Life Cycle of Docker

Conference: ISCTT 2021 - 6th International Conference on Information Science, Computer Technology and Transportation
11/26/2021 - 11/28/2021 at Xishuangbanna, China

Proceedings: ISCTT 2021

Pages: 4Language: englishTyp: PDF

Personal VDE Members are entitled to a 10% discount on this title

Authors:
Guo, Wei; Hang, Feilu; Xie, Linjiang; Lv, Yao; Chen, Hexiong (Information Center, Yunnan Power Grid Co., Ltd, Kunming, China)

Abstract:
The cloud computing has been already extensively used and developed in depth with the increasing innovation of information technology. And it can be more efficient, flexible and expandable due to the key technology - virtualization technology. Among them, docker container technology has been widely adopted due to its light weight and high performance, but at the same time, the security problems brought by docker have gradually attracted people's attention. Aiming at the problem that project researchers cannot participate in policy formulation and security policies cannot be freely migrated with docker containers, an endogenous security protection method suitable for the full life cycle of docker is proposed in this paper. Before the project is delivered, the security policy is encapsulated in the docker image by the R&D personnel; the host machine with security software deployed can monitor the startup behavior of the docker image dynamically at any time and run the security policy in the image. After performance analysis, this solution can effectively achieve security protection for the entire life cycle of docker mirroring.