Abstract
Containers are one of the deployment solutions that possess attention. It is always compared to virtual machines (VM). Thus, there is a debate about its capabilities. It supports software agility that helps satisfy users’ requirements and shorten deployment time. Many works of literature have discussed the advantages of containers and promoted their role in developing the software industry. However, the actual migration rate in the software market is not as expected compared to the advantages.
This research highlights the barriers to adopting containers. Also, it digs in depth into two main barriers to adoption, namely security risks and refactoring of monolithic applications. It aims to study the impact of cyber risks on the applications’ performance. The risks will be studied from a narrow view focusing on sharing resources and a broader view focusing on using malicious container images in project performance. Moreover, it will investigate the requirements and practices of refactoring monolithic applications into a container-based format. This research aims to address the container security risks and provide a systemized refactoring model for monolithic applications. The research is qualitative. The empirical data will be collected from primary studies, surveys, and interviews to explain the container adoption barriers. Providing more understanding of the adoption barriers’ causes will help to avoid them, consequently increasing container adoption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Donca, I.-C., Stan, O.P., Misaros, M., Gota, D., Miclea, L.: Method for continuous integration and deployment using a pipeline generator for agile software projects. Sensors 22, 4637 (2022). https://doi.org/10.3390/s22124637
Crnkovic, I.: Component-based software engineering — new challenges in software development. Softw. Focus 2, 127–133 (2001). https://doi.org/10.1002/swf.45
Reifer, D.J.: How good are agile methods? IEEE Softw. 19, 16–18 (2002). https://doi.org/10.1109/MS.2002.1020280
Smith, J.E., Nair, R.: The architecture of virtual machines. Computer 38, 32–38 (2005). https://doi.org/10.1109/MC.2005.173
Zhang, Q., Liu, L., Pu, C., Dou, Q., Wu, L., Zhou, W.: A Comparative Study of Containers and Virtual Machines in Big Data Environment. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). pp. 178–185 (2018). https://doi.org/10.1109/CLOUD.2018.00030
Koskinen, M., Mikkonen, T., Abrahamsson, P.: Containers in software development: a systematic mapping study. In: Franch, X., Männistö, T., Martínez-Fernández, S. (eds.) PROFES 2019. LNCS, vol. 11915, pp. 176–191. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35333-9_13
Hoenisch, P., Weber, I., Schulte, S., Zhu, L., Fekete, A.: Four-fold auto-scaling on a contemporary deployment platform using Docker containers. In: Barros, A., Grigori, D., Narendra, N.C., Dam, H.K. (eds.) ICSOC 2015. LNCS, vol. 9435, pp. 316–323. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48616-0_20
Dua, R., Raja, A.R., Kakadia, D.: Virtualization vs containerization to support PaaS. In: 2014 IEEE International Conference on Cloud Engineering. pp. 610–614 (2014). https://doi.org/10.1109/IC2E.2014.41
Woodfield, S.N., Dunsmore, H.E., Shen, V.Y.: The effect of modularization and comments on program comprehension. In: Proceedings of the 5th International Conference on Software Engineering, pp. 215–223. IEEE Press, San Diego (1981)
Crnković, I.: Component-based software engineering - new challenges in software development. J. Comput. Inf. Technol. 11, 151–161 (2003). https://doi.org/10.2498/cit.2003.03.02
Amaral, M., Polo, J., Carrera, D., Mohomed, I., Unuvar, M., Steinder, M.: Performance evaluation of microservices architectures using containers. In: 2015 IEEE 14th International Symposium on Network Computing and Applications, pp. 27–34 (2015). https://doi.org/10.1109/NCA.2015.49
Jaramillo, D., Nguyen, D.V., Smart, R.: Leveraging microservices architecture by using Docker technology. In: SoutheastCon 2016, pp. 1–5 (2016). https://doi.org/10.1109/SECON.2016.7506647
Hasselbring, W., Steinacker, G.: Microservice architectures for scalability, agility and reliability in E-Commerce. In: 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), pp. 243–246 (2017). https://doi.org/10.1109/ICSAW.2017.11
Watada, J., Roy, A., Kadikar, R., Pham, H., Xu, B.: Emerging trends, techniques and open issues of containerization: a review. IEEE Access. 7, 152443–152472 (2019). https://doi.org/10.1109/ACCESS.2019.2945930
Sultan, S., Ahmad, I., Dimitriou, T.: Container security: issues, challenges, and the road Ahead. IEEE Access. 7, 52976–52996 (2019). https://doi.org/10.1109/ACCESS.2019.2911732
Auer, F., Lenarduzzi, V., Felderer, M., Taibi, D.: From monolithic systems to Microservices: An assessment framework. Inf. Softw. Technol. 137, 106600 (2021). https://doi.org/10.1016/j.infsof.2021.106600
Pahl, C., Brogi, A., Soldani, J., Jamshidi, P.: Cloud container technologies: a state-of-the-art review. IEEE Trans. Cloud Comput. 7, 677–692 (2019). https://doi.org/10.1109/TCC.2017.2702586
Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on Docker Hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 269–280. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3029806.3029832
Kuryazov, D., Jabborov, D., Khujamuratov, B.: Towards decomposing monolithic applications into microservices. In: 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT), pp. 1–4 (2020). https://doi.org/10.1109/AICT50176.2020.9368571
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sroor, M. (2022). Leverage Software Containers Adoption by Decreasing Cyber Risks and Systemizing Refactoring of Monolithic Applications. In: Taibi, D., Kuhrmann, M., Mikkonen, T., Klünder, J., Abrahamsson, P. (eds) Product-Focused Software Process Improvement. PROFES 2022. Lecture Notes in Computer Science, vol 13709. Springer, Cham. https://doi.org/10.1007/978-3-031-21388-5_55
Download citation
DOI: https://doi.org/10.1007/978-3-031-21388-5_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21387-8
Online ISBN: 978-3-031-21388-5
eBook Packages: Computer ScienceComputer Science (R0)