eXtension (SGX) (Hoekstra et al., 2013) for running
Linux applications in secure containers.
Some researches aim to provide secure connec-
tions for Docker containers. In the work of Kelbert
et al. (2017) and Ranjbar et al. (2017), both of them
propose solutions to build secure and persistent con-
nectivities between containers. The work of Secure
Cloud proposed by Kelbert et al. (2017) is realized
with the support of Intel’s SGX. While the SynAP-
TIC architecture from Ranjbar et al. (2017) is based
on the standard host identity protocol (HIP). Cilium
30
is open-source software for securing the network con-
nectivity between containerized application services.
9 CONCLUSION AND FUTURE
WORK
In this paper, we have proposed a secure cloud service
to generate runtime AppArmor profiles for Docker
containers. The cloud service is user-friendly and of-
floads the administrator of a container service the bur-
den of setting up a protection profile generation envi-
ronment. We evaluated the approach by running a set
of typical microservices on the cloud profile genera-
tor solution. We manually collected 11 most relevant
real-world exploits from Exploit-db, which target the
selected microservice’s software. Even if the num-
ber of exploits is not very large, it still gives us a
good view of our approach’s efficiency compared to
the strength of the default Docker profile. The results
show that the profile successfully defends 7 out of 11
exploits not covered by the default profile, a consider-
able improvement based on the evaluation set-up. By
analyzing the defending principles, we found that the
profile is more efficient against complicated exploits
that require many file manipulations. The results also
indicate that among all kinds of rules generated in the
profile, the file access rules play a much more signifi-
cant role in defending exploits than other rules.
It is left to future work to compare our profile gen-
erator cloud service with other commercial products
mentioned in Section 1 to get a comprehensive un-
derstanding of the proposed service’s strengths and
weaknesses.
ACKNOWLEDGEMENTS
Work supported by framework grant RIT17-0032
from the Swedish Foundation for Strategic Research
30
https://github.com/cilium/cilium
as well as the EU H2020 project CloudiFacturing un-
der grant 768892.
REFERENCES
Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A.,
Priebe, C., Lind, J., Muthukumaran, D., O’Keeffe, D.,
Stillwell, M. L., et al. (2016). {SCONE}: Secure
linux containers with intel {SGX}. In 12th {USENIX}
Symposium on Operating Systems Design and Imple-
mentation ({OSDI} 16), pages 689–703.
Azab, A. (2017). Enabling docker containers for high-
performance and many-task computing. In 2017 ieee
international conference on cloud engineering (ic2e),
pages 279–285. IEEE.
Bacis, E., Mutti, S., Capelli, S., and Paraboschi, S. (2015).
Dockerpolicymodules: mandatory access control for
docker containers. In 2015 IEEE Conference on Com-
munications and Network Security (CNS), pages 749–
750. IEEE.
Casalicchio, E. and Iannucci, S. (2020). The state-of-the-art
in container technologies: Application, orchestration
and security. Concurrency and Computation: Practice
and Experience, page e5668.
Chelladhurai, J., Chelliah, P. R., and Kumar, S. A. (2016).
Securing docker containers from denial of service
(dos) attacks. In 2016 IEEE International Conference
on Services Computing (SCC), pages 856–859. IEEE.
Daniel, J. and El-Moussa, F. (2019). Software container
profiling. US Patent App. 16/300,169.
De Benedictis, M. and Lioy, A. (2019). Integrity verifi-
cation of docker containers for a lightweight cloud
environment. Future Generation Computer Systems,
97:236–246.
Hoekstra, M., Lal, R., Pappachan, P., Phegade, V., and
Del Cuvillo, J. (2013). Using innovative instructions
to create trustworthy software solutions. HASP@
ISCA, 11(10.1145):2487726–2488370.
Hunger, C., Vilanova, L., Papamanthou, C., Etsion, Y., and
Tiwari, M. (2018). Dats-data containers for web appli-
cations. In Proceedings of the Twenty-Third Interna-
tional Conference on Architectural Support for Pro-
gramming Languages and Operating Systems, pages
722–736.
Jian, Z. and Chen, L. (2017). A defense method against
docker escape attack. In Proceedings of the 2017
International Conference on Cryptography, Security
and Privacy, pages 142–146. ACM.
Kelbert, F., Gregor, F., Pires, R., K
¨
opsell, S., Pasin, M.,
Havet, A., Schiavoni, V., Felber, P., Fetzer, C., and
Pietzuch, P. (2017). Securecloud: Secure big data pro-
cessing in untrusted clouds. In Design, Automation
& Test in Europe Conference & Exhibition (DATE),
2017, pages 282–285. IEEE.
Levin, L., Stopel, D., and Yanay, E. (2020a). Filesystem ac-
tion profiling of containers and security enforcement.
US Patent 10,664,590.
CLOSER 2021 - 11th International Conference on Cloud Computing and Services Science
54