A Systematic Literature Review on Maintenance of Software Containers

Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualiza...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM computing surveys 2024-08, Vol.56 (8), p.1-38, Article 193
Hauptverfasser: Malhotra, Ruchika, Bansal, Anjali, Kessentini, Marouane
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 38
container_issue 8
container_start_page 1
container_title ACM computing surveys
container_volume 56
creator Malhotra, Ruchika
Bansal, Anjali
Kessentini, Marouane
description Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.
doi_str_mv 10.1145/3645092
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3090664444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3090664444</sourcerecordid><originalsourceid>FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWKt49xTw4Gl1ZvOxzbHU-gEVwep5yWYT2GI3NUkt_e-NbHUu7_B-84Z5hFwi3CJyccckF6DKIzJCIaqiYhyPyQiYhAIYwCk5i3EFACVHOSL3U7rcx2TXOnWGLrpkg07bYOmb_e7sjvqevuiuT7bXvbHUO7r0Lu10Jma-T9myIZ6TE6c_o7046Jh8PMzfZ0_F4vXxeTZdFLqUVSrQgdGNayYVGqkqg8Koti1FOWHYMGdaprTUjXEOGAKX-Q2urIC8wN1EIRuT6yF3E_zX1sZUr_w29PlkzUCBlDxPpm4GygQfY7Cu3oRurcO-Rqh_K6oPFWXyaiC1Wf9Df-YP0dpfTg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3090664444</pqid></control><display><type>article</type><title>A Systematic Literature Review on Maintenance of Software Containers</title><source>Association for Computing Machinery</source><creator>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</creator><creatorcontrib>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</creatorcontrib><description>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</description><identifier>ISSN: 0360-0300</identifier><identifier>EISSN: 1557-7341</identifier><identifier>DOI: 10.1145/3645092</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Cloud computing ; Computer science ; Computing methodologies ; Containers ; Cybersecurity ; General and reference ; Image detection ; Literature reviews ; Machine learning ; Maintenance ; Performance evaluation ; Resource scheduling ; Resource utilization ; Scheduling algorithms ; Security and privacy ; Software and its engineering ; Surveys and overviews ; Systematic review ; Theory of computation ; Virtual environments ; Virtualization and security</subject><ispartof>ACM computing surveys, 2024-08, Vol.56 (8), p.1-38, Article 193</ispartof><rights>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from</rights><rights>Copyright Association for Computing Machinery Aug 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</cites><orcidid>0000-0002-0053-3443 ; 0000-0001-5253-4870 ; 0000-0003-3872-6213</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3645092$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,776,780,2275,27903,27904,40175,75975</link.rule.ids></links><search><creatorcontrib>Malhotra, Ruchika</creatorcontrib><creatorcontrib>Bansal, Anjali</creatorcontrib><creatorcontrib>Kessentini, Marouane</creatorcontrib><title>A Systematic Literature Review on Maintenance of Software Containers</title><title>ACM computing surveys</title><addtitle>ACM CSUR</addtitle><description>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</description><subject>Cloud computing</subject><subject>Computer science</subject><subject>Computing methodologies</subject><subject>Containers</subject><subject>Cybersecurity</subject><subject>General and reference</subject><subject>Image detection</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Maintenance</subject><subject>Performance evaluation</subject><subject>Resource scheduling</subject><subject>Resource utilization</subject><subject>Scheduling algorithms</subject><subject>Security and privacy</subject><subject>Software and its engineering</subject><subject>Surveys and overviews</subject><subject>Systematic review</subject><subject>Theory of computation</subject><subject>Virtual environments</subject><subject>Virtualization and security</subject><issn>0360-0300</issn><issn>1557-7341</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo9kM1LAzEQxYMoWKt49xTw4Gl1ZvOxzbHU-gEVwep5yWYT2GI3NUkt_e-NbHUu7_B-84Z5hFwi3CJyccckF6DKIzJCIaqiYhyPyQiYhAIYwCk5i3EFACVHOSL3U7rcx2TXOnWGLrpkg07bYOmb_e7sjvqevuiuT7bXvbHUO7r0Lu10Jma-T9myIZ6TE6c_o7046Jh8PMzfZ0_F4vXxeTZdFLqUVSrQgdGNayYVGqkqg8Koti1FOWHYMGdaprTUjXEOGAKX-Q2urIC8wN1EIRuT6yF3E_zX1sZUr_w29PlkzUCBlDxPpm4GygQfY7Cu3oRurcO-Rqh_K6oPFWXyaiC1Wf9Df-YP0dpfTg</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Malhotra, Ruchika</creator><creator>Bansal, Anjali</creator><creator>Kessentini, Marouane</creator><general>ACM</general><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-0053-3443</orcidid><orcidid>https://orcid.org/0000-0001-5253-4870</orcidid><orcidid>https://orcid.org/0000-0003-3872-6213</orcidid></search><sort><creationdate>20240801</creationdate><title>A Systematic Literature Review on Maintenance of Software Containers</title><author>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Computer science</topic><topic>Computing methodologies</topic><topic>Containers</topic><topic>Cybersecurity</topic><topic>General and reference</topic><topic>Image detection</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Maintenance</topic><topic>Performance evaluation</topic><topic>Resource scheduling</topic><topic>Resource utilization</topic><topic>Scheduling algorithms</topic><topic>Security and privacy</topic><topic>Software and its engineering</topic><topic>Surveys and overviews</topic><topic>Systematic review</topic><topic>Theory of computation</topic><topic>Virtual environments</topic><topic>Virtualization and security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Malhotra, Ruchika</creatorcontrib><creatorcontrib>Bansal, Anjali</creatorcontrib><creatorcontrib>Kessentini, Marouane</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM computing surveys</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Malhotra, Ruchika</au><au>Bansal, Anjali</au><au>Kessentini, Marouane</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Systematic Literature Review on Maintenance of Software Containers</atitle><jtitle>ACM computing surveys</jtitle><stitle>ACM CSUR</stitle><date>2024-08-01</date><risdate>2024</risdate><volume>56</volume><issue>8</issue><spage>1</spage><epage>38</epage><pages>1-38</pages><artnum>193</artnum><issn>0360-0300</issn><eissn>1557-7341</eissn><abstract>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3645092</doi><tpages>38</tpages><orcidid>https://orcid.org/0000-0002-0053-3443</orcidid><orcidid>https://orcid.org/0000-0001-5253-4870</orcidid><orcidid>https://orcid.org/0000-0003-3872-6213</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0360-0300
ispartof ACM computing surveys, 2024-08, Vol.56 (8), p.1-38, Article 193
issn 0360-0300
1557-7341
language eng
recordid cdi_proquest_journals_3090664444
source Association for Computing Machinery
subjects Cloud computing
Computer science
Computing methodologies
Containers
Cybersecurity
General and reference
Image detection
Literature reviews
Machine learning
Maintenance
Performance evaluation
Resource scheduling
Resource utilization
Scheduling algorithms
Security and privacy
Software and its engineering
Surveys and overviews
Systematic review
Theory of computation
Virtual environments
Virtualization and security
title A Systematic Literature Review on Maintenance of Software Containers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T20%3A38%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Systematic%20Literature%20Review%20on%20Maintenance%20of%20Software%20Containers&rft.jtitle=ACM%20computing%20surveys&rft.au=Malhotra,%20Ruchika&rft.date=2024-08-01&rft.volume=56&rft.issue=8&rft.spage=1&rft.epage=38&rft.pages=1-38&rft.artnum=193&rft.issn=0360-0300&rft.eissn=1557-7341&rft_id=info:doi/10.1145/3645092&rft_dat=%3Cproquest_cross%3E3090664444%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3090664444&rft_id=info:pmid/&rfr_iscdi=true