skip to main content
10.1109/CCGRID.2017.62acmconferencesArticle/Chapter ViewAbstractPublication PagesccgridConference Proceedingsconference-collections
tutorial

SynAPTIC: Secure And Persistent connecTIvity for Containers

Published:14 May 2017Publication History

ABSTRACT

Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints, and some of the communication taking place over untrusted networks. Yet, the services are typically designed with the assumption of scalable, persistent and secure connectivity. In this paper, we present the SynAPTIC architecture, which enables secure and persistent connectivity between mobile containers, especially in the hybrid cloud and in multi-tenant cloud networks. The solution is based on the standardized Host Identity Protocol (HIP) that tenants can deploy on top of existing cloud infrastructure independently of their cloud provider. Optional cloud-provider extensions based on Software-Defined Networking (SDN) further optimize the networking architecture. Our qualitative and quantitative evaluation shows that SynAPTIC performs better than some of the existing solutions.

References

  1. Calico Project. http://projectcalico.org.Google ScholarGoogle Scholar
  2. Docker Containers. http://docker.com.Google ScholarGoogle Scholar
  3. HIP for Linux. http://infrahip.hiit.fi.Google ScholarGoogle Scholar
  4. How to secure containers and microservices. www.infoworld.com/article/3029772/cloud-computing/how-to-secure-containers-and-microservices.html.Google ScholarGoogle Scholar
  5. IPSec connection between LXC containers. http://flockport.com/connect-lxc-containers-with-an-ipsec-vpn.Google ScholarGoogle Scholar
  6. Kubernetes. http://kubernetes.io.Google ScholarGoogle Scholar
  7. Linux Containers. http://linuxcontainers.org.Google ScholarGoogle Scholar
  8. Microservice architecture. http://microservices.io.Google ScholarGoogle Scholar
  9. Netperf. http://www.netperf.org/netperf.Google ScholarGoogle Scholar
  10. Open VSwitch. http://openvswitch.org.Google ScholarGoogle Scholar
  11. OpenContrail. http://opencontrail.org.Google ScholarGoogle Scholar
  12. Pertino. http://pertino.com.Google ScholarGoogle Scholar
  13. VirtualBox. https://www.virtualbox.org.Google ScholarGoogle Scholar
  14. Weave. http://weave.works.Google ScholarGoogle Scholar
  15. P. Berde et al. ONOS: Towards an open, distributed SDN OS. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN '14, pages 1--6, New York, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Berger et al. vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, 2006. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Farinacci, V. Fuller, D. Meyer, and D. Lewis. The Locator/ID Separation Protocol (LISP). RFC 6830 (Experimental), Jan. 2013.Google ScholarGoogle Scholar
  18. B. Gleeson et al. A Framework for IP Based Virtual Private Networks. RFC 2764 (Informational), Feb. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Heer, R. Hummen, M. Komu, S. Gotz, and K. Wehrle. Endhost authentication and authorization for middleboxes based on a cryptographic namespace. In 2009 IEEE International Conference on Communications, pages 1--6, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. Henderson and A. Gurtov. The Host Identity Protocol (HIP) Experiment Report. RFC 6538 (Informational), Mar. 2012.Google ScholarGoogle Scholar
  21. K.-H. Kim et al. Flexible network address mapping for container-based clouds. In Network Softwarization (NetSoft), 2015 1st IEEE Conference on, pages 1--5, April 2015.Google ScholarGoogle Scholar
  22. T. Koponen et al. Network virtualization in multi-tenant datacenters. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 203--216, Apr. 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Mahalingam et al. Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. RFC 7348 (Informational), Aug. 2014.Google ScholarGoogle Scholar
  24. R. Moskowitz et al. Host Identity Protocol Version 2 (HIPv2). RFC 7401 (Proposed Standard), Apr. 2015.Google ScholarGoogle Scholar
  25. R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), May 2006.Google ScholarGoogle Scholar
  26. Y. Nakagawa et al. Dynamic virtual network configuration between containers using physical switch functions for NFV infrastructure. In IEEE Conference on NFV-SDN, pages 156--162, Nov. 2015.Google ScholarGoogle ScholarCross RefCross Ref
  27. D. Namiot and M. Sneps-Sneppe. On micro-services architecture. International Journal of Open Information Technologies, 2(9), 2014.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
    May 2017
    1167 pages
    ISBN:9781509066100

    Publisher

    IEEE Press

    Publication History

    • Published: 14 May 2017

    Check for updates

    Qualifiers

    • tutorial
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader