Concept and Model for Cloud Infrastructure Protection by Using Containers

Yaroslav Stefinko1 jarik.bit [at] gmail.com
Andrian Piskozub2 piskozub [at] polynet.lviv.ua
Roman Banakh3 banakh.ri [at] gmail.com
  1. Computer technologies, automation and metrology institute, Lviv Polytechnic National University, Ukraine, Lviv, S. Bandery street 12.
Abstract 

According to current best practices in using containers we suggest an overview on using it in cloud and potential for using in security field. Interaction and attacks vectors used in virtual cloud systems are described. Built and analyzed conceptual scheme for penetration testing. Patterns of security improvements in cloud computing infrastructure are presented in following article.

References 

[1] Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V. et al. Security Issues in Cloud Environments - A Survey: Int. J. Inf. Secur. (2014), Issue 2, pp 113–170. doi:10.1007/s10207-013-0208-7

[2] Y. Stefinko, A. Piskozub and R. Banakh, "Manual and automated penetration testing. Benefits and drawbacks. Modern tendency," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 488-491.  doi: 10.1109/TCSET.2016.7452095

[3] R. Banakh, A. Piskozub and Y. Stefinko, "External elements of honeypot for wireless network," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 480-482.  doi: 10.1109/TCSET.2016.7452093

[4] Pearson, S.: Privacy, Security and Trust in Cloud Computing. In: S. Pearson, G. Yee (eds.) Privacy and Security for Cloud Computing, pp. 3-42. Springer London (2013). DOI 10.1007/978-1-4471-4189-1_1

[5] NIST: The NIST Definition of Cloud Computing (2011).http://nvlpubs.nist.gov/nistpubs/Legacy/SP/ni stspecialpublication800-145.pdf Accessed Oct. 2016

[6] Internet Security Threat Report 2016- https:// www.symantec.com/security-center/threat-report Accessed Oct. 2016