
Research on Security Issues of Docker and Container Monitoring System in Edge Computing System
Author(s) -
Xiaofei Xu,
Aidong Xu,
Yixin Jiang,
Zhen Wang,
Qianru Wang,
Yunan Zhang,
Hong Wen
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1673/1/012067
Subject(s) - container (type theory) , computer science , standardization , edge computing , computer security , software security assurance , enhanced data rates for gsm evolution , operating system , cloud computing , cloud computing security , engineering , telecommunications , mechanical engineering
With the development of the 5G technology, edge computing will sink the computing center to the edge of the network close to the user, with low latency, high security, and lightweight features. The development of edge computing also puts forward a series of requirements for security, standardization, and unification. Docker container technology highly meets the existing needs of edge computing due to its lightweight, standardization, convenience, and security isolation. This article mainly analyzes the vulnerability of Docker containers and summarizes the security problems faced by the application of Docker container technology under edge computing systems. It also introduces a container monitoring software Prometheus and proposes a feasible edge computing risk monitoring model based on the Docker engine and Prometheus monitoring software.