Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.5.901

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing  

Byeon, Wonjun (Sejong University)
Lim, Han-wool (Sejong University)
Yun, Joobeom (Sejong University)
Abstract
Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.
Keywords
Edge Computing; Migration; Docker Container; SCP; NFS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Satyanarayana, "Cloud computing: SAAS," Computer Sciences and Telecommunications 2012 vol 4, no. 36, pp.76-79, Dec. 2011.
2 T. Baltrusaitis, P. Robinson and L. Morency, "OpenFace: An open source facial behavior analysis toolkit," 2016 IEEE Winter Conference on Applications of Computer Vision, pp. 1-10, Mar. 2016.
3 T. Salah, M. J. Zemerly, C. Y. Teun, M. Al-Qutayri and Y. Al-Hammadi, "Performance comparison between container-based and VM-based services", 2017 20th Conference on Innovations in Clouds, Internet and Networks, pp. 185-190, Mar. 2017.
4 W. Yu et al. "A Survey on the Edge Computing for the Internet of Things," in IEEE Access, vol. 6, pp. 6900-6919, Nov. 2017.   DOI
5 L. Klozar and J. Prokopec, "Propagation path loss models for mobile communication", Proceedings of 21st International Conference Radioelektronika 2011, pp. 1-4, Apr. 2011.
6 T. Ylonen, C. Lonvick, Ed. "The Secure Sehll (SSH) Protocol Architecture" Internet Engineering Task Force, RFC4251, Jan. 2006.
7 T. Taleb and A. Ksentini, "Follow me cloud: interworking federated clouds and distributed mobile networks," in IEEE Network, vol. 27, no. 5, pp. 12-19, Oct. 2013.   DOI
8 Hejtmanek, Lukas, David Antos, and Lubos Kopecky. "Choice of Data Transfer Protocols in Remote Storage Applications." CESNET Technical Report 1/2013, Jun. 2013.
9 S. Wang, J. Xu, N. Zhang and Y. Liu, "A Survey on Service Migration in Mobile Edge Computing", in IEEE Access, vol. 6, pp. 235511-23528, Apr. 2018.