The Challenges of the Data Privacy in the Cloud using Docker: A Systematic Review

  • João Paulo Silva CESAR School
  • Alaim Assis CESAR School
  • Mauricio Martins CESAR School
  • Reutman Oliveira CESAR School

Resumo


Cloud Computing é uma tecnologia que provê serviços on demand para pessoas, empresas ou governos utilizando a Internet. O custo compartilhado da infraestrutura em Cloud tornou essa tecnologia em uma das mais importantes dos últimos anos. Por outro lado, tanto clientes como providers se preocupam cada vez mais com a privacidade dos seus dados nestes ambientes distribuidos. Este trabalho é uma revisão sistemática realizada em 20 estudos selecionados que relatam sobre os desafios e dificuldades em manter a segurança e privacidade dos dados nas tecnologias de Cloud computing e mais recentemente na tecnologia de containeres em Docker.

Referências

A. Kitchenham, B. (2007). Kitchenham, B.: Guidelines for performing Systematic Literature Reviews in software engineering. EBSE Technical Report EBSE-2007-01.

Jian, Z. and Chen, L. (2017). A Defense Method against Docker Escape Attack. Proceedings of the 2017 International Conference on Cryptography, Security and Privacy - ICCSP ’17, pages 142–146.

Kumar, K. and Kurhekar, M. (2017). Economically Efficient Virtualization over Cloud Using Docker Containers. Proceedings - 2016 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2016, pages 95–100.

Makkaoui*, K. E., Ezzati, A., Beni-Hssane, A., and Motamed, C. (2016). Cloud Security and Privacy Model for Providing Secure Cloud Services.

Manu, A. R., Patel, J. K., Akhtar, S., Agrawal, V. K., and Murthy, K. N. B. S. (2016). A Study , Analysis and deep dive on Cloud PAAS security in terms of Docker Container security A Study , Analysis and deep dive on Cloud PAAS security in terms of Docker Container security. IEEE - 2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT], (March):1–13.

Martin, A., Raponi, S., Combe, T., and Di Pietro, R. (2018). Docker ecosystem – Vulnerability Analysis. Computer Communications, 122:30–43.

Mohammad, A. and Asadullah, Z. (2015). Factors Influencing Information Privacy Concern in Cloud Computing Environment. 2015:238–242.

Pai, S. J., Kumar, A., and Gopal, A. (2016). Linux hardening techniques. (1):94–99.

Radwan, T., Azer, M. A., and Abdelbaki, N. (2017). Cloud computing security: challenges and future trends. International Journal of Computer Applications in Technology, 55(2):158.

Shu, R., Gu, X., and Enck,W. (2017). A Study of Security Vulnerabilities on Docker Hub. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY ’17, pages 269–280.

Sun, Y., Zhang, J., Xiong, Y., and Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 2014:687–692.

Werner, J., Westphall, C. M., and Westphall, C. B. (2017). Cloud identity management: A survey on privacy strategies. Computer Networks, 122:29–42.

Yu, H., Powell, N., Stembridge, D., and Yuan, X. (2012). Cloud computing and security challenges. Proceeding ACM-SE ’12 Proceedings of the 50th Annual Southeast Regional Conference, page 298.

Publicado
16/10/2018
SILVA, João Paulo; ASSIS, Alaim ; MARTINS, Mauricio ; OLIVEIRA, Reutman . The Challenges of the Data Privacy in the Cloud using Docker: A Systematic Review. In: ESCOLA REGIONAL DE INFORMÁTICA DO PIAUÍ (ERI-PI), 4. , 2018, Teresina. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 190 - 195.