The Challenges of the Data Privacy in the Cloud using Docker: A Systematic Review
Abstract
Cloud Computing is a technology that provides on demand services to individuals, companies or governments using the Internet. The shared cost of cloud infrastructure has made this technology one of the most important in recent years. On the other hand, both customers and providers are increasingly concerned about the privacy of their data in these distributed environments. This work is a systematic review of 20 selected studies that report on the challenges and difficulties in maintaining data security and privacy in cloud computing technologies and more recently in Docker container technology.
References
Jian, Z. and Chen, L. (2017). A Defense Method against Docker Escape Attack. Proceedings of the 2017 International Conference on Cryptography, Security and Privacy - ICCSP ’17, pages 142–146.
Kumar, K. and Kurhekar, M. (2017). Economically Efficient Virtualization over Cloud Using Docker Containers. Proceedings - 2016 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2016, pages 95–100.
Makkaoui*, K. E., Ezzati, A., Beni-Hssane, A., and Motamed, C. (2016). Cloud Security and Privacy Model for Providing Secure Cloud Services.
Manu, A. R., Patel, J. K., Akhtar, S., Agrawal, V. K., and Murthy, K. N. B. S. (2016). A Study , Analysis and deep dive on Cloud PAAS security in terms of Docker Container security A Study , Analysis and deep dive on Cloud PAAS security in terms of Docker Container security. IEEE - 2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT], (March):1–13.
Martin, A., Raponi, S., Combe, T., and Di Pietro, R. (2018). Docker ecosystem – Vulnerability Analysis. Computer Communications, 122:30–43.
Mohammad, A. and Asadullah, Z. (2015). Factors Influencing Information Privacy Concern in Cloud Computing Environment. 2015:238–242.
Pai, S. J., Kumar, A., and Gopal, A. (2016). Linux hardening techniques. (1):94–99.
Radwan, T., Azer, M. A., and Abdelbaki, N. (2017). Cloud computing security: challenges and future trends. International Journal of Computer Applications in Technology, 55(2):158.
Shu, R., Gu, X., and Enck,W. (2017). A Study of Security Vulnerabilities on Docker Hub. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY ’17, pages 269–280.
Sun, Y., Zhang, J., Xiong, Y., and Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 2014:687–692.
Werner, J., Westphall, C. M., and Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122:29–42.
Yu, H., Powell, N., Stembridge, D., and Yuan, X. (2012). Cloud computing and security challenges. Proceeding ACM-SE ’12 Proceedings of the 50th Annual Southeast Regional Conference, page 298.
