Abstract: The aim of the work is to provide an overview of virtualization methods, while focusing on Docker. This new virtualization stage, which incredibly contrasts from the customary, virtual machine based way to deal with virtualization, has started gigantic enthusiasm for Linux holders. Accordingly, numerous Docker based activities have risen extending from straightforward order line apparatuses to whole working frameworks. To pick up a more profound comprehension of Docker's inside components, the proposed work shows working with Docker's Remote API. In this work, an attempt has been made to address the imperative security issues of the Docker compartments. Additionally, security calculations and strategies have been proposed to address DoS attacks related issues in the Docker holder innovation. The preparatory investigations and testing of the security strategies are promising. Results show that the Validation, Authentication and security is noticeably increased in proposed model as comparison to existing model.

Keywords: Information Security; Docker Technology; User Authentication; AES; Cryptography


PDF | DOI: 10.17148/IARJSET.2018.5126

Open chat