A Systematic Literature Review on Maintenance of Software Containers
Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualiza...
Gespeichert in:
Veröffentlicht in: | ACM computing surveys 2024-08, Vol.56 (8), p.1-38, Article 193 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 38 |
---|---|
container_issue | 8 |
container_start_page | 1 |
container_title | ACM computing surveys |
container_volume | 56 |
creator | Malhotra, Ruchika Bansal, Anjali Kessentini, Marouane |
description | Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers. |
doi_str_mv | 10.1145/3645092 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3090664444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3090664444</sourcerecordid><originalsourceid>FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWKt49xTw4Gl1ZvOxzbHU-gEVwep5yWYT2GI3NUkt_e-NbHUu7_B-84Z5hFwi3CJyccckF6DKIzJCIaqiYhyPyQiYhAIYwCk5i3EFACVHOSL3U7rcx2TXOnWGLrpkg07bYOmb_e7sjvqevuiuT7bXvbHUO7r0Lu10Jma-T9myIZ6TE6c_o7046Jh8PMzfZ0_F4vXxeTZdFLqUVSrQgdGNayYVGqkqg8Koti1FOWHYMGdaprTUjXEOGAKX-Q2urIC8wN1EIRuT6yF3E_zX1sZUr_w29PlkzUCBlDxPpm4GygQfY7Cu3oRurcO-Rqh_K6oPFWXyaiC1Wf9Df-YP0dpfTg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3090664444</pqid></control><display><type>article</type><title>A Systematic Literature Review on Maintenance of Software Containers</title><source>Association for Computing Machinery</source><creator>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</creator><creatorcontrib>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</creatorcontrib><description>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</description><identifier>ISSN: 0360-0300</identifier><identifier>EISSN: 1557-7341</identifier><identifier>DOI: 10.1145/3645092</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Cloud computing ; Computer science ; Computing methodologies ; Containers ; Cybersecurity ; General and reference ; Image detection ; Literature reviews ; Machine learning ; Maintenance ; Performance evaluation ; Resource scheduling ; Resource utilization ; Scheduling algorithms ; Security and privacy ; Software and its engineering ; Surveys and overviews ; Systematic review ; Theory of computation ; Virtual environments ; Virtualization and security</subject><ispartof>ACM computing surveys, 2024-08, Vol.56 (8), p.1-38, Article 193</ispartof><rights>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from</rights><rights>Copyright Association for Computing Machinery Aug 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</cites><orcidid>0000-0002-0053-3443 ; 0000-0001-5253-4870 ; 0000-0003-3872-6213</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3645092$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,776,780,2275,27903,27904,40175,75975</link.rule.ids></links><search><creatorcontrib>Malhotra, Ruchika</creatorcontrib><creatorcontrib>Bansal, Anjali</creatorcontrib><creatorcontrib>Kessentini, Marouane</creatorcontrib><title>A Systematic Literature Review on Maintenance of Software Containers</title><title>ACM computing surveys</title><addtitle>ACM CSUR</addtitle><description>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</description><subject>Cloud computing</subject><subject>Computer science</subject><subject>Computing methodologies</subject><subject>Containers</subject><subject>Cybersecurity</subject><subject>General and reference</subject><subject>Image detection</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Maintenance</subject><subject>Performance evaluation</subject><subject>Resource scheduling</subject><subject>Resource utilization</subject><subject>Scheduling algorithms</subject><subject>Security and privacy</subject><subject>Software and its engineering</subject><subject>Surveys and overviews</subject><subject>Systematic review</subject><subject>Theory of computation</subject><subject>Virtual environments</subject><subject>Virtualization and security</subject><issn>0360-0300</issn><issn>1557-7341</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo9kM1LAzEQxYMoWKt49xTw4Gl1ZvOxzbHU-gEVwep5yWYT2GI3NUkt_e-NbHUu7_B-84Z5hFwi3CJyccckF6DKIzJCIaqiYhyPyQiYhAIYwCk5i3EFACVHOSL3U7rcx2TXOnWGLrpkg07bYOmb_e7sjvqevuiuT7bXvbHUO7r0Lu10Jma-T9myIZ6TE6c_o7046Jh8PMzfZ0_F4vXxeTZdFLqUVSrQgdGNayYVGqkqg8Koti1FOWHYMGdaprTUjXEOGAKX-Q2urIC8wN1EIRuT6yF3E_zX1sZUr_w29PlkzUCBlDxPpm4GygQfY7Cu3oRurcO-Rqh_K6oPFWXyaiC1Wf9Df-YP0dpfTg</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Malhotra, Ruchika</creator><creator>Bansal, Anjali</creator><creator>Kessentini, Marouane</creator><general>ACM</general><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-0053-3443</orcidid><orcidid>https://orcid.org/0000-0001-5253-4870</orcidid><orcidid>https://orcid.org/0000-0003-3872-6213</orcidid></search><sort><creationdate>20240801</creationdate><title>A Systematic Literature Review on Maintenance of Software Containers</title><author>Malhotra, Ruchika ; Bansal, Anjali ; Kessentini, Marouane</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a267t-1f0cabfb871c697c15c9dd252831b3fcd39a6abcff03104650949e50b874f8913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cloud computing</topic><topic>Computer science</topic><topic>Computing methodologies</topic><topic>Containers</topic><topic>Cybersecurity</topic><topic>General and reference</topic><topic>Image detection</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Maintenance</topic><topic>Performance evaluation</topic><topic>Resource scheduling</topic><topic>Resource utilization</topic><topic>Scheduling algorithms</topic><topic>Security and privacy</topic><topic>Software and its engineering</topic><topic>Surveys and overviews</topic><topic>Systematic review</topic><topic>Theory of computation</topic><topic>Virtual environments</topic><topic>Virtualization and security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Malhotra, Ruchika</creatorcontrib><creatorcontrib>Bansal, Anjali</creatorcontrib><creatorcontrib>Kessentini, Marouane</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM computing surveys</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Malhotra, Ruchika</au><au>Bansal, Anjali</au><au>Kessentini, Marouane</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Systematic Literature Review on Maintenance of Software Containers</atitle><jtitle>ACM computing surveys</jtitle><stitle>ACM CSUR</stitle><date>2024-08-01</date><risdate>2024</risdate><volume>56</volume><issue>8</issue><spage>1</spage><epage>38</epage><pages>1-38</pages><artnum>193</artnum><issn>0360-0300</issn><eissn>1557-7341</eissn><abstract>Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving resource utilization. Hypervisor-based virtualization and containerization are two commonly used approaches in operating system virtualization. In this article, we provide a systematic literature review on various phases in maintenance of containers including container image detection, container scheduling, container security measures, and performance evaluation of containers. We have selected 145 primary studies out of which 24% of studies are related to container performance evaluation, 42% of studies are related to container scheduling techniques, 22% of studies are related to container security measures, and 12% of studies are related to container image detection process. A few studies are related to container image detection process and evaluation of container security measures. Resource utilization is the most considered performance objective in almost all container scheduling techniques. We conclude that there is a need to introduce new tagging approaches, smell detection approaches, and also new approaches to detect and resolve threat issues in containers so that we can maintain the security of containers.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3645092</doi><tpages>38</tpages><orcidid>https://orcid.org/0000-0002-0053-3443</orcidid><orcidid>https://orcid.org/0000-0001-5253-4870</orcidid><orcidid>https://orcid.org/0000-0003-3872-6213</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0360-0300 |
ispartof | ACM computing surveys, 2024-08, Vol.56 (8), p.1-38, Article 193 |
issn | 0360-0300 1557-7341 |
language | eng |
recordid | cdi_proquest_journals_3090664444 |
source | Association for Computing Machinery |
subjects | Cloud computing Computer science Computing methodologies Containers Cybersecurity General and reference Image detection Literature reviews Machine learning Maintenance Performance evaluation Resource scheduling Resource utilization Scheduling algorithms Security and privacy Software and its engineering Surveys and overviews Systematic review Theory of computation Virtual environments Virtualization and security |
title | A Systematic Literature Review on Maintenance of Software Containers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T20%3A38%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Systematic%20Literature%20Review%20on%20Maintenance%20of%20Software%20Containers&rft.jtitle=ACM%20computing%20surveys&rft.au=Malhotra,%20Ruchika&rft.date=2024-08-01&rft.volume=56&rft.issue=8&rft.spage=1&rft.epage=38&rft.pages=1-38&rft.artnum=193&rft.issn=0360-0300&rft.eissn=1557-7341&rft_id=info:doi/10.1145/3645092&rft_dat=%3Cproquest_cross%3E3090664444%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3090664444&rft_id=info:pmid/&rfr_iscdi=true |