Skip to main content

Leverage Software Containers Adoption by Decreasing Cyber Risks and Systemizing Refactoring of Monolithic Applications

  • Conference paper
  • First Online:
Product-Focused Software Process Improvement (PROFES 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13709))

Abstract

Containers are one of the deployment solutions that possess attention. It is always compared to virtual machines (VM). Thus, there is a debate about its capabilities. It supports software agility that helps satisfy users’ requirements and shorten deployment time. Many works of literature have discussed the advantages of containers and promoted their role in developing the software industry. However, the actual migration rate in the software market is not as expected compared to the advantages.

This research highlights the barriers to adopting containers. Also, it digs in depth into two main barriers to adoption, namely security risks and refactoring of monolithic applications. It aims to study the impact of cyber risks on the applications’ performance. The risks will be studied from a narrow view focusing on sharing resources and a broader view focusing on using malicious container images in project performance. Moreover, it will investigate the requirements and practices of refactoring monolithic applications into a container-based format. This research aims to address the container security risks and provide a systemized refactoring model for monolithic applications. The research is qualitative. The empirical data will be collected from primary studies, surveys, and interviews to explain the container adoption barriers. Providing more understanding of the adoption barriers’ causes will help to avoid them, consequently increasing container adoption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Donca, I.-C., Stan, O.P., Misaros, M., Gota, D., Miclea, L.: Method for continuous integration and deployment using a pipeline generator for agile software projects. Sensors 22, 4637 (2022). https://doi.org/10.3390/s22124637

    Article  Google Scholar 

  2. Crnkovic, I.: Component-based software engineering — new challenges in software development. Softw. Focus 2, 127–133 (2001). https://doi.org/10.1002/swf.45

    Article  Google Scholar 

  3. Reifer, D.J.: How good are agile methods? IEEE Softw. 19, 16–18 (2002). https://doi.org/10.1109/MS.2002.1020280

    Article  Google Scholar 

  4. Smith, J.E., Nair, R.: The architecture of virtual machines. Computer 38, 32–38 (2005). https://doi.org/10.1109/MC.2005.173

    Article  Google Scholar 

  5. Zhang, Q., Liu, L., Pu, C., Dou, Q., Wu, L., Zhou, W.: A Comparative Study of Containers and Virtual Machines in Big Data Environment. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). pp. 178–185 (2018). https://doi.org/10.1109/CLOUD.2018.00030

  6. Koskinen, M., Mikkonen, T., Abrahamsson, P.: Containers in software development: a systematic mapping study. In: Franch, X., Männistö, T., Martínez-Fernández, S. (eds.) PROFES 2019. LNCS, vol. 11915, pp. 176–191. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35333-9_13

  7. Hoenisch, P., Weber, I., Schulte, S., Zhu, L., Fekete, A.: Four-fold auto-scaling on a contemporary deployment platform using Docker containers. In: Barros, A., Grigori, D., Narendra, N.C., Dam, H.K. (eds.) ICSOC 2015. LNCS, vol. 9435, pp. 316–323. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48616-0_20

  8. Dua, R., Raja, A.R., Kakadia, D.: Virtualization vs containerization to support PaaS. In: 2014 IEEE International Conference on Cloud Engineering. pp. 610–614 (2014). https://doi.org/10.1109/IC2E.2014.41

  9. Woodfield, S.N., Dunsmore, H.E., Shen, V.Y.: The effect of modularization and comments on program comprehension. In: Proceedings of the 5th International Conference on Software Engineering, pp. 215–223. IEEE Press, San Diego (1981)

    Google Scholar 

  10. Crnković, I.: Component-based software engineering - new challenges in software development. J. Comput. Inf. Technol. 11, 151–161 (2003). https://doi.org/10.2498/cit.2003.03.02

    Article  Google Scholar 

  11. Amaral, M., Polo, J., Carrera, D., Mohomed, I., Unuvar, M., Steinder, M.: Performance evaluation of microservices architectures using containers. In: 2015 IEEE 14th International Symposium on Network Computing and Applications, pp. 27–34 (2015). https://doi.org/10.1109/NCA.2015.49

  12. Jaramillo, D., Nguyen, D.V., Smart, R.: Leveraging microservices architecture by using Docker technology. In: SoutheastCon 2016, pp. 1–5 (2016). https://doi.org/10.1109/SECON.2016.7506647

  13. Hasselbring, W., Steinacker, G.: Microservice architectures for scalability, agility and reliability in E-Commerce. In: 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), pp. 243–246 (2017). https://doi.org/10.1109/ICSAW.2017.11

  14. Watada, J., Roy, A., Kadikar, R., Pham, H., Xu, B.: Emerging trends, techniques and open issues of containerization: a review. IEEE Access. 7, 152443–152472 (2019). https://doi.org/10.1109/ACCESS.2019.2945930

    Article  Google Scholar 

  15. Sultan, S., Ahmad, I., Dimitriou, T.: Container security: issues, challenges, and the road Ahead. IEEE Access. 7, 52976–52996 (2019). https://doi.org/10.1109/ACCESS.2019.2911732

    Article  Google Scholar 

  16. Auer, F., Lenarduzzi, V., Felderer, M., Taibi, D.: From monolithic systems to Microservices: An assessment framework. Inf. Softw. Technol. 137, 106600 (2021). https://doi.org/10.1016/j.infsof.2021.106600

    Article  Google Scholar 

  17. Pahl, C., Brogi, A., Soldani, J., Jamshidi, P.: Cloud container technologies: a state-of-the-art review. IEEE Trans. Cloud Comput. 7, 677–692 (2019). https://doi.org/10.1109/TCC.2017.2702586

    Article  Google Scholar 

  18. Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on Docker Hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 269–280. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3029806.3029832

  19. Kuryazov, D., Jabborov, D., Khujamuratov, B.: Towards decomposing monolithic applications into microservices. In: 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT), pp. 1–4 (2020). https://doi.org/10.1109/AICT50176.2020.9368571

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maha Sroor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sroor, M. (2022). Leverage Software Containers Adoption by Decreasing Cyber Risks and Systemizing Refactoring of Monolithic Applications. In: Taibi, D., Kuhrmann, M., Mikkonen, T., Klünder, J., Abrahamsson, P. (eds) Product-Focused Software Process Improvement. PROFES 2022. Lecture Notes in Computer Science, vol 13709. Springer, Cham. https://doi.org/10.1007/978-3-031-21388-5_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21388-5_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21387-8

  • Online ISBN: 978-3-031-21388-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics