Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment

Toshihiro Uchibayashi, Bernady Apduhan, Takuo Suganuma, Masahiro Hiji

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

With the proliferation of IoT sensors and devices, storing collected data in the cloud has become common. A wide variety of data with different purposes and forms are not directly stored in the cloud but are sent to the cloud via edge servers. At the edge server, applications are running in containers and virtual machines to collect data. However, the current deployment and movement mechanisms for containers and virtual machines do not consider any conventions or regulations for the applications and the data it contains. Therefore, it is easy to deploy and migrate containers and virtual machines. However, the problem arises when it is deployed or migrated, which may violate the licensing terms of the contained applications, the rules of the organization, or the laws and regulations of the concerned country. We have already proposed a data-audit control mechanism for the migration of virtual machines. The proposed mechanism successfully controls the unintentional and malicious migration of virtual machines. We expect similar problems with containers to occur as the number of edge servers increases. Therefore, we propose a policy-based data-audit control system for container migration. The proposed system was verified in the implemented edge computing environment and the results showed that adding the proposed data-audit control mechanism had a minimal impact on migration time and that the system was practical enough. In the future, we intend to conduct verification not in a very compact and short-range environment such as this one but on an existing wide-area network.

Original languageEnglish
Article number27
JournalComputers
Volume12
Issue number2
DOIs
Publication statusPublished - Feb 2023

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment'. Together they form a unique fingerprint.

Cite this