<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Information Security Issues in Balancing Multiple Independent Containers on a Single Server</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Inna Rozlomii</string-name>
          <email>inna-roz@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Yarmilko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Naumenko</string-name>
          <email>naumenko.serhii1122@vu.cdu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bohdan Khmelnytsky National University of Cherkasy</institution>
          ,
          <addr-line>81, Shevchenko Blvd., Cherkasy, 18031</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This article addresses the challenges arising from the widespread approach to optimizing resource utilization and ensuring scalability - the balancing of multiple independent containers on a single server - from an information security perspective. The risks associated with this approach and the potential consequences of vulnerabilities and attacks in such an environment are analyzed. Techniques and practices that can be used to mitigate these risks and ensure an adequate level of security during container balancing are discussed. These techniques include regular vulnerability detection and remediation in containers and their components, proper security system configuration, the use of automated vulnerability analysis, and container activity monitoring. Security practices such as access management, the use of secure container images, and regular security training for personnel are also examined. Mathematical models of various aspects of security issues during container balancing are presented, including models of unauthorized access to containers on a single server and configuration interaction models. Risk-based strategies for protection using mathematical optimization methods to reduce risks and ensure the resilience of the information system are considered. Risks are identified with insufficient isolation between containers, code vulnerabilities, inadequate authentication, and access control mechanisms. Emphasis is placed on the critical importance of security in ensuring the reliability and integrity of data and systems as a whole and the need for systematic resolution of these container-balancing information security issues. It is underscored that none of the possible approaches to container security during balancing is universal, and developing comprehensive security strategies is critically important. It is recognized as promising to apply methods for detecting abnormal loads, protection against internal threats, and integrating security measures into the container development lifecycle when developing more secure container balancing methods.</p>
      </abstract>
      <kwd-group>
        <kwd>1 independent container</kwd>
        <kwd>server</kwd>
        <kwd>information security</kwd>
        <kwd>unauthorized access</kwd>
        <kwd>confidential data</kwd>
        <kwd>security vulnerabilities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        With the development of modern information technologies and the utilization of containerization
in cloud environments, an increasing number of companies and organizations are facing the need to
balance independent containers on a single server [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Containerization is a virtualization technology
that allows packaging and executing applications and their dependencies in isolated environments
known as containers [
        <xref ref-type="bibr" rid="ref2 ref3">2-3</xref>
        ]. Each container contains everything required to run an application,
including code, libraries, configuration files, and other resources. They enable applications to operate
consistently in any container-supported environment, providing significant flexibility and portability
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In the case of deploying numerous containers on one server or a server cluster, there arises a
necessity for container balancing [
        <xref ref-type="bibr" rid="ref5 ref6">5-6</xref>
        ]. This task involves distributing the workload (i.e., resources
and computational capacity) among containers to ensure efficient resource utilization and maintain
high availability and system resilience [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        In general, the mentioned technology allows for the efficient utilization of computational
resources, providing flexibility and scalability. However, one of the potential data security issues
when multiple independent containers are present on a single server as a result of balancing is the
possibility of one container affecting other containers residing on the same server [
        <xref ref-type="bibr" rid="ref8 ref9">8-9</xref>
        ]. Several
possible collisions that can arise in such a situation include:
1. Resource Overallocation: If one container consumes an excessive amount of resources such
as memory, CPU time, or network resources, it can lead to a reduction in available resources
for other containers [
        <xref ref-type="bibr" rid="ref10 ref11">10-11</xref>
        ]. The potential consequence is decreased performance or
operational failure.
2. Security Vulnerabilities: If one container has security vulnerabilities or operational
complexities, it can compromise the entire server and impact other containers running on that
server [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Inadequate isolation between containers can allow an attacker to propagate an
attack to other containers [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
3. Unauthorized Access: If access control for containers or the server is not sufficiently
strengthened, one container may gain unauthorized access to the resources or data of other
containers on the same server [
        <xref ref-type="bibr" rid="ref14">14-15</xref>
        ].
4. Configuration Interference: If one container influences the server's configuration or other
containers, conflicts or unforeseen consequences may arise, potentially resulting in decreased
performance or operational failure.
      </p>
      <p>The purpose of this article is to analyze the risks associated with balancing multiple independent
containers on a single server and the potential vulnerabilities and attacks that may pose challenges in
implementing this approach. Additionally, various techniques and practices are discussed that can be
employed to mitigate these risks and ensure an adequate level of information security. The proposed
solutions are examined in the context of facilitating systematic and timely resolution of information
security issues in container balancing scenarios, aiming to prevent unauthorized access, preserve data
integrity, and ensure overall system reliability.</p>
      <p>Load balancing in the context of independent containers that are not logically connected presents a
unique set of challenges and opportunities. The fundamental idea is to distribute the computational
workload efficiently across these disparate entities, optimizing resource utilization and ensuring that
no single container is overburdened. This, in turn, contributes to enhanced system performance and
responsiveness.</p>
      <p>One key consideration is the absence of logical connections between these independent containers.
In a traditional load balancing scenario, interconnected components can share information about their
current workloads, facilitating a more informed distribution of tasks. However, in the case of
independent containers, the challenge lies in devising mechanisms that allow for effective load
distribution without the luxury of direct communication.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>The relevance of information security issues in balancing multiple independent containers on a
single server in the context of the increasing use of containerization in the IT industry places them at
the forefront of scholarly analysis [16-17]. Remote consolidation of applications on a single server
through containers can significantly simplify administration and resource management. However, it
also opens up new opportunities for malicious attacks and security breaches [18].</p>
      <p>The heightened attention to this issue is driving the search for innovative solutions and
improvements to existing methods of securing containerized environments. Understanding the risks
and threats associated with load balancing contributes to enhancing the resilience and reliability of
these systems.</p>
      <p>Many academic works focus on using containers to isolate applications on a single server and
load-balancing methods between these containers. For instance, in [19], the effectiveness of Docker
containers in modern applications is examined, along with identified security issues related to their
usage.</p>
      <p>Other research concentrates on specific security issues associated with container adoption. In [20],
the risks of using vulnerable container images and strategies to minimize these risks are discussed.</p>
      <p>Some studies combine load balancing and security aspects. In [21], the relationship between load
distribution and the capabilities for detecting and preventing attacks on load-balancing systems is
explored.</p>
      <p>Although there is a substantial body of work related to containers, load balancing, and security
[22-23], certain aspects, including information security problems when balancing multiple
independent containers on a single server, remain inadequately explored for several reasons. Firstly,
there is instability in the realm of container identification and authentication, which can lead to
unauthorized data access. Additionally, aspects of ensuring data confidentiality between containers
that share server resources may create opportunities for data leakage. Another issue is that dynamic
scaling and deployment of containers can impact information security by introducing unexpected
vulnerabilities during the process. Furthermore, monitoring and auditing of container security are not
always given due attention, potentially resulting in overlooked threats. Lastly, the absence of
standardized security practices for container balancing complicates the development of effective
security strategies in this domain.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methodology</title>
      <p>As evidenced by practice, the use of containerization and cloud environments, along with
balancing multiple independent containers on a single server, is becoming an increasingly common
approach to resource optimization and scalability. However, this process introduces certain challenges
and potential information security issues.</p>
      <p>The roots of the problem are associated with the fact that when balancing containers on a single
server, there are risks of compromising confidentiality, integrity, and availability of information. The
increase in the number of containers operating on one server creates a conducive environment for
attacks and abuses that may target independent containers or the server infrastructure.</p>
      <p>To understand and develop an approach to analyzing information security problems when
balancing independent containers on a single server, it is necessary to implement systematic and
objective research methods. The research methodology provides a system of steps and analytical tools
for examining the issue and determining appropriate information security measures. It helps structure
the analysis process, identify threats and vulnerabilities, and develop protection strategies.</p>
      <p>The first step in this methodology is formalizing the research object, which allows for a
mathematical description of the system consisting of containers and a server. From this description,
we move on to identifying potential threats and vulnerabilities that can affect the system.
Subsequently, protection strategies are developed based on risk analysis and considering the identified
vulnerabilities.</p>
      <p>The formalization of the task involves creating a mathematical model that describes all
components of the system, their interactions, and parameters. This model can be represented as a
system of mathematical equations and inequalities that reflect the operation of containers and the
server.</p>
      <p>The mathematical model of the system can be expressed as follows:
1. Variables and Parameters:
 Ci – the state of container i;
 S – the state of the server;
 T – the time interval;
 Rij(t) – the state of interaction between container i and container j at time t;
 Vi(t) – the state of vulnerabilities of container i at time t.
2. Description of Functional Dependencies:
 Rij(t) depends on the configuration of containers and the server, as well as external factors
such as network traffic and the surrounding environment;
 Vi(t) depends on the configuration of containers and the server, as well as external factors
such as network traffic and the surrounding environment.
3. Formulation of Constraints and Conditions:
 Rij(t) must satisfy security requirements, i.e., Rij ≤ [Maximum acceptable risk level];
 Vi(t) must be minimized, i.e., Vi(t) ≤ [Maximum acceptable vulnerability level].</p>
      <p>It is evident that Rij(t) and Vi(t) are states described mathematically over time (t). The units and
scale for these variables would be contingent upon the specific metrics used to quantify the state of
interaction between containers (Rij) and the state of vulnerabilities (V). For example, Rij could be
measured in terms of network latency, data transfer rates, or any other relevant performance metric.
Similarly, V might be assessed based on the number or severity of vulnerabilities present in a
container.</p>
      <p>In terms of comparison with the maximum acceptable levels, the article establishes clear
constraints and conditions for Rij(t) and Vi(t). Rij(t) is constrained by security requirements,
specifically Rij ≤ [Maximum acceptable risk level]. This implies that the unit of measurement for Rij
should align with the chosen metric for risk assessment, and the scale should adhere to the defined
maximum acceptable risk level.</p>
      <p>Likewise, Vi(t) is constrained by the minimization of vulnerabilities, expressed as Vi(t) ≤
[Maximum acceptable vulnerability level]. The units and scale for Vi would be dictated by the chosen
metrics for quantifying vulnerabilities, and the scale should align with the stipulated maximum
acceptable vulnerability level.</p>
      <p>In essence, the units and scale used to measure R and V are context-specific, aligning with the
chosen metrics for risk and vulnerability assessment. Comparing these measurements with the
maximum acceptable levels ensures that the system's security is maintained within predefined
thresholds, as outlined in the formalization of the mathematical model. This meticulous approach
facilitates a robust analysis of the system and the formulation of protection strategies, contributing to
the overall objective of achieving an optimal level of information security in container balancing
scenarios.</p>
      <p>Such a mathematical model allows for the analysis of the system and the establishment of
parameters to achieve an optimal level of information security. Furthermore, based on this model,
potential threats and vulnerabilities of the system can be identified, and protection strategies can be
developed using mathematical optimization methods.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Vulnerabilities and configuration interference conflicts</title>
      <p>One of the potential information security issues associated with having multiple independent
containers on a single server is the possibility of one container influencing other containers that reside
on the same server. This problem becomes more pronounced when these containers are being
balanced. When containers are located on the same server and are load-balanced, they may share
server resources such as memory, computing power, and network resources. If one container becomes
compromised or is subjected to an attack, it can have a negative impact on other containers running on
the same server.</p>
      <p>Let's delve into this issue in more detail.
4.1.</p>
    </sec>
    <sec id="sec-5">
      <title>Risks and vulnerabilities in container balancing on a server</title>
      <p>The seriousness of the security vulnerability threat when balancing multiple independent
containers on a single server lies in the fact that if one container has such a vulnerability or
complexity, it can lead to the compromise of the entire server and impact other containers running on
that server.</p>
      <p>For a better understanding of this point, the risk of compromising the server can be represented as
a dependency that describes its value based on the number of vulnerable containers:
 
=</p>
      <p>,
 
where   – risk of compromise,   – number of vulnerable containers,   – the total number
of containers. Equation (1) demonstrates that the more vulnerable containers are present on the server
as a result of balancing, the higher the risk of server compromise.</p>
      <p>Table 1 presents the types of vulnerabilities and their potential impact on the server and containers.</p>
      <p>Unauthorized access is one of the serious security issues associated with balancing multiple
independent containers on a single server [24-25]. If access control to the containers or the server
itself is not properly enforced, it can open the possibility for one container to gain unauthorized access
to resources or data belonging to other containers on the same server [26]. This is a paramount and
pervasive information security concern. It represents a significant threat to the confidentiality,
integrity, and availability of data within containerized environments.</p>
      <p>In the context of balancing multiple independent containers on a single server, the potential for
unauthorized access is heightened. The dynamic and distributed nature of containerized environments
necessitates a meticulous examination of access control mechanisms to ensure the secure operation of
each container. Unauthorized access can lead to data breaches, system disruptions, and compromise
the overall security posture of the environment.</p>
      <p>The potential consequences of insufficient access control are described in Table 2.
{ 1,  2, … ,   }, where  – is the number of containers.
2. Server ( ): the server on which the containers are deployed.</p>
      <p>Users ( ): the set of users who have access to the server and containers.</p>
      <p>, 
( ):</p>
      <p>Define
the
set
of
all
possible</p>
      <p>access
} where 
– represents the right to read, 
rights</p>
      <p>as
– represents

 =1
 = ∑   ∙ 
2(  ),
(2)
4. Access</p>
      <p>Rights
 = {
the right to write,</p>
      <p>, 
where   is the probability of a certain event (for example, unauthorized access).</p>
      <p>– represents the right to execute.
5. Access Matrix (
): The access matrix</p>
      <p>of size ( ∗  ), where  – is the number of
containers and</p>
      <p>– is the number of users, defines which users have access to which
containers and with what rights. The element</p>
      <p>[ ][ ] represents the access rights of user 
to container  .</p>
      <p>functions and algorithms.
6. Authentication and Authorization System: This system defines the rules by which users
authenticate and authorize for access to containers. It can be described using mathematical
7. Vulnerabilities and Attacks ( ,  ): The set of vulnerabilities  and possible attacks  , that
attackers can use to gain unauthorized access.
8. Security</p>
      <p>Mathematical Functions: Mathematical functions can be used to determine the
security level of the system, such as information entropy, attack probability, and others.</p>
      <p>Let's express the mathematical relationships based on the outlined components in the model for
unauthorized access. Mathematical security functions will be calculated according to the formula for
determining information entropy:</p>
      <p>This formula encapsulate the mathematical relationships within the proposed model and the
information entropy provides quantitative measures for evaluating the security level of the system.</p>
      <p>Using this mathematical model, security analysis can be performed, risks can be identified, and
measures can be implemented to protect containers from unauthorized access. One of these measures
is container isolation, which is based on precise parameters and restrictions. They ensure resource
separation and security of container execution on a shared server. The use of specialized resource
control mechanisms allows mathematical determination of resource usage limitations for each
container, reducing the possibility of conflicts and resource overflows that could lead to unauthorized
access and affect other containers on the server.</p>
      <p>Let's note that in the Linux kernels, there is a mechanism called Cgroups (Control Groups), which
allows limiting and controlling resources used by processes, including Docker containers. The use of
Cgroups enables setting limits on resources such as the central processing unit (CPU), random-access
memory (RAM), input/output (I/O), and others. Mathematically, this can be expressed as follows.
Let's assume that  represents a resource (for example, CPU). Then, the limitation on resource usage
by container  can be expressed as:</p>
      <p>( ) ≤  ( ), (3)
where  ( ) – resource limits for container  ;  ( ) – available server resources.</p>
      <p>Taking such a dependency into account allows for resource consumption limitations by one
container and, thus, safeguards other containers from harm.</p>
      <p>For modeling access levels and identifying unauthorized access possibilities, the RBAC
(RoleBased Access Control) formula is used to assign roles and define access rights for each container. The
access control model assesses the level of access to resources or data for each container:
 _ =  _ ∩  _ , (4)
where  _ – is the access level determined as the intersection of role privileges and user
privileges;  _ – are privileges assigned to a specific container role;  _ –
are privileges held by the user executing the container.</p>
      <p>This formula helps identify unauthorized access possibilities when a user's access level intersects
with privileges assigned to the container.
4.3.</p>
    </sec>
    <sec id="sec-6">
      <title>Configuration interactions</title>
      <p>Configuration interactions are another issue associated with balancing multiple independent
containers on a single server. In this scenario, the influence of one container on the server's
configuration or other containers can lead to conflicts or unforeseen consequences that can
significantly impact system performance and reliability.</p>
      <p>One approach for analyzing and managing configuration interactions is to use conflict tables or
dependency tables. Such tables can reflect the relationships between different configuration
parameters of containers and the server, as well as define acceptable values, constraints, and
recommendations for their use.</p>
      <p>Table 3 illustrates potential conflicts between container configuration parameters and server
parameters, along with provided notes on each conflict and its consequences. Such a table helps
identify potential issues and avoid improper configurations that could affect system security and
efficiency.</p>
      <p>A schematic representation of the interaction of configurations between containers and the server
can take various forms, depending on the system's specifics and parameters. Figure 2 illustrates the
general structure of interactions between containers and the server. Such visualization helps track the
interplay of configurations and identify potential issues.</p>
      <p>In this diagram, each container and server have their configuration parameters, such as CPU,
RAM, Storage, Network, Port, and Protocol. The arrows depict the interaction between containers and
the server. For example, a container with a high-performance CPU interacts with a server that also has
a high-performance CPU. Each container can have its configuration, which may affect interactions
with other containers and the server.</p>
    </sec>
    <sec id="sec-7">
      <title>5. Modeling the interaction of configurations</title>
      <p>Modeling the interplay of configurations involves mathematical relationships between
configuration parameters and their impact on system performance or reliability [27]. This allows us to
forecast potential consequences of configuration changes and develop optimal management strategies.
Here are some of the relationships:
1. Linear Interplay Model: Suppose we have two configuration parameters, A and B, and we
want to determine how changes in one parameter affect the other. You can use a linear model,
such as  =  ∗  +  , where  and  are coefficients of the model that define the
relationship between parameters  and  . Using this formula, you can predict how changes in
parameter  will impact parameter  .
2. Functional Dependency: Sometimes, the interplay of configurations can be expressed using
functional dependencies. For example, if we have parameters  ,  , and  , we can have a
formula like  =  ( ,  ), where  is a function that defines the relationship between
parameters  and  and their influence on parameter  . This could be a mathematical
function or a set of rules determining the value of parameter  based on the values of  and
 .
3. Regression Models: In some cases, regression models can be used to analyze the interaction
between configuration parameters and performance indicators, such as system performance or
reliability. A regression model can include various factors and coefficients that determine the
impact of each parameter on the performance indicator.</p>
      <p>A scatter plot is used to illustrate the relationships between different configuration parameters,
where various configuration parameters are presented on the graph [28, 29]. This helps identify
correlation relationships between parameters and determine how they interact with each other.</p>
      <p>To create a scatter plot and determine the relationships between information security parameters
when balancing containers on a single server, the following parameters and their corresponding
security metrics can be used, among others:
1. Parameter  – Number of containers on the server.
2. Parameter  – System security level (numeric indicator ranging from 1 to 10).
3. Parameter  – Use of secure container images (binary indicator: "Yes" or "No").
4. Parameter  – Level of container activity monitoring (numeric indicator ranging from 1 to
5).
5. Parameter  – Authentication and authorization level (numeric indicator ranging from 1 to
10).</p>
      <p>These parameters represent key aspects of the information security landscape when balancing
containers on a single server. The scatter plot will visualize the relationships between these
parameters, allowing for the identification of correlation patterns and insights into how they interact
with each other.</p>
      <p>The proposed parameters encompass both quantitative and qualitative indicators, providing a
holistic view of the system's configuration and its impact on security. For example, the binary
indicator SCI denotes the use of secure container images, while SL, CAM, and AA represent numeric
indicators, offering a nuanced understanding of system security levels, container activity monitoring,
and authentication and authorization levels, respectively.</p>
      <p>The impact of configuration parameters on system performance is presented in Table 4. This table
provides generalized information about the impact of various configuration parameters on the
performance of system components. The specific impact of each parameter may vary depending on
the specific system and its requirements.</p>
      <sec id="sec-7-1">
        <title>Network throughput</title>
      </sec>
      <sec id="sec-7-2">
        <title>Cache memory</title>
      </sec>
      <sec id="sec-7-3">
        <title>Impact on system performance</title>
      </sec>
      <sec id="sec-7-4">
        <title>Increasing CPU power has a positive impact on system performance,</title>
        <p>providing faster execution of computational tasks</p>
      </sec>
      <sec id="sec-7-5">
        <title>A larger amount of RAM allows the system to simultaneously process</title>
        <p>more data and programs, increasing performance.</p>
      </sec>
      <sec id="sec-7-6">
        <title>High network throughput enables fast data exchange between</title>
        <p>system components, which positively affects performance</p>
      </sec>
      <sec id="sec-7-7">
        <title>High network throughput enables fast data exchange between system components, which positively affects performance</title>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>6. Security strategies</title>
      <p>After analyzing risks and identifying system vulnerabilities, developing security strategies
becomes the next crucial step to ensure system safety. This phase involves devising and implementing
protective measures aimed at reducing risks and ensuring system resilience. Security strategies based
on risk analysis and accounting for identified vulnerabilities aim to provide effective and targeted
protection for a containerized server environment. Security strategies that utilize mathematical
optimization methods include:
1. Optimal Container Placement: Mathematical models and optimization algorithms determine
the most efficient placement of containers on the server. This reduces potential risks and
vulnerabilities while ensuring optimal resource utilization.
2. Risk Management: Mathematical models help assess risks and their impact on the system.</p>
      <p>Optimization methods identify the best approach to manage these risks, including the
selection of protective measures and their priorities.
3. Vulnerability Minimization: Using mathematical methods to identify the most critical
vulnerabilities in the system and developing strategies to minimize them. This includes
patching vulnerabilities, enhancing security policies, and implementing other measures.
4. Resource Optimization: Utilizing mathematical models to optimize resource allocation
between containers and the server while considering security aspects. This helps achieve
efficient utilization of computational and network resources.</p>
      <p>The application of mathematical optimization methods enables the development of optimal and
effective security strategies, reducing risks, and enhancing system security in the context of
containerized server balancing.</p>
    </sec>
    <sec id="sec-9">
      <title>7. Discussions</title>
      <p>The article brings attention to certain critical aspects that have remained inadequately explored in
the existing body of literature. Specifically, the issues of instability in container identification and
authentication, challenges in ensuring data confidentiality, and the impact of dynamic scaling on
information security are identified as key gaps. By delving into these areas, our work contributes vital
insights that complement and extend the current state of knowledge.</p>
      <p>The absence of standardized security practices for container balancing, as highlighted in our
analysis, poses a significant challenge. Our results contribute by shedding light on the intricacies of
security issues specific to the dynamic environment of balancing multiple independent containers on a
single server. This insight is crucial for the development of effective and tailored security strategies,
filling a crucial void in the current scholarly discourse.</p>
      <p>While some studies have explored the relationship between load distribution and security aspects,
our work adds depth to this exploration. By focusing on the security problems inherent in balancing
multiple independent containers, we provide a more nuanced understanding of the intersection
between load balancing and security, offering valuable perspectives that go beyond the existing
analyses in the field.</p>
      <p>In conclusion, the obtained results stand out as a significant advancement in scholarly analysis by
addressing critical gaps, tailoring security strategies, integrating load balancing and security
considerations, and adopting a holistic approach to container security. The relevance of our findings
lies in their ability to enhance the resilience and reliability of systems in the face of evolving
challenges associated with the increasing use of containerization in the IT industry.</p>
    </sec>
    <sec id="sec-10">
      <title>8. Conclusion</title>
      <p>In conclusion, the article addresses critical issues related to information security when balancing
independent containers on a single server. It emphasizes the need to pay proper attention to these
aspects since inadequate measures can lead to serious consequences, including data compromise and
threats to system security. The article proposes various techniques and practices to mitigate risks and
ensure an adequate level of security, such as regular vulnerability detection and remediation, security
system configuration, the use of automated vulnerability analysis, and proper access management.
Ultimately, the article underscores the importance of systematically addressing these information
security issues in container-balancing environments, which are becoming increasingly prevalent. It
highlights that security is critically important for ensuring the reliability and integrity of data and
systems as a whole.</p>
    </sec>
    <sec id="sec-11">
      <title>9. References</title>
      <p>[15] S. K. Mondal, R. Pan, H. D. Kabir, T. Tian, H. N. Dai, Kubernetes in IT administration and
serverless computing: An empirical study and research challenges, The Journal of
Supercomputing (2022) 1-51.
[16] K. German, O. Ponomareva, An Overview of Container Security in a Kubernetes Cluster,
in: 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and
Information Technology (USBEREIT), IEEE, 2023, pp. 283-285.
[17] O. Bentaleb, A. S. Belloum, A. Sebaa, A. El-Maouhab, Containerization technologies:
Taxonomies, applications and challenges, The Journal of Supercomputing 78(1) (2022)
11441181.
[18] M. Kaur, R. Aron, A systematic study of load balancing approaches in the fog computing
environment, The Journal of supercomputing 77(8) (2021) 9202-9247.
[19] X. Gao, Z. Gu, M. Kayaalp, D. Pendarakis, H. Wang, Containerleaks: Emerging security
threats of information leakages in container clouds, in: 2017 47th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN), 2017, pp. 237-248.
[20] X. Gao, B. Steenkamer, Z. Gu, M. Kayaalp, D. Pendarakis, H. Wang, A study on the
security implications of information leakages in container clouds, IEEE Transactions on
Dependable and Secure Computing 18(1) (2018) 174-191.
[21] X. Xie, T. Yuan, X. Zhou, X. Cheng, Research on trust model in container-based cloud
service, Computers, Materials and Continua 56(2) (2018) 273-283.
[22] A. Modak, S. D. Chaudhary, P. S. Paygude, S. R. Ldate, Techniques to secure data on
cloud: Docker swarm or kubernetes? in: 2018 Second International Conference on Inventive
Communication and Computational Technologies (ICICCT), IEEE, 2018, pp. 7-12.
[23] A. Mailewa, S. Mengel, L. Gittner, H. Khan, Mechanisms and techniques to enhance the
security of big data analytic framework with mongodb and Linux containers, Array 15 (2022)
100236.
[24] S. H. Han, H. K. Lee, S. T. Lee, S. J. Kim, W. J. Jang, Container image access control
architecture to protect applications, IEEE Access 8 (2020)162012-162021.
[25] T. Alyas, S. Ali, H. U. Khan, A. Samad, K. Alissa, M. A. Saleem, Container Performance
and Vulnerability Management for Container Security Using Docker Engine, Security and
Communication Networks (2022).
[26] L. Xing, X. Bai, T. Li, X. Wang, K. Chen, X. Liao, S.-M. Hu, X. Han, Unauthorized
crossapp resource access on mac os x and ios, arXiv preprint (2015) arXiv:1505.06836.</p>
      <p>URL: https://doi.org/10.48550/arXiv.1505.06836.
[27] R. Chandramouli, Z. Butcher, Building secure microservices-based applications using
service-mesh architecture, Special Publication (NIST SP), National Institute of Standards and
Technology, Gaithersburg, MD, 2020. URL: https://doi.org/10.6028/NIST.SP.800-204A.
[28] M. Moravcik, M. Kontsek, Overview of Docker container orchestration tools, in: 2020 18th
International Conference on Emerging eLearning Technologies and Applications (ICETA),
IEEE, 2020, pp. 475-480.
[29] A. R. Manu, J. K. Patel, S. Akhtar, V. K. Agrawal, K. B. S. Murthy, Docker container
security via heuristics-based multilateral security-conceptual and pragmatic study, in: 2016
International Conference on Circuit, Power and Computing Technologies (ICCPCT), IEEE,
2016, pp. 1-14.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E.</given-names>
            <surname>Casalicchio</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Iannucci,</surname>
          </string-name>
          <article-title>The state‐of‐the‐art in container technologies: Application, orchestration and security</article-title>
          ,
          <source>Concurrency and Computation: Practice and Experience</source>
          <volume>32</volume>
          (
          <issue>17</issue>
          ) (
          <year>2020</year>
          )
          <article-title>e5668</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Wang</surname>
          </string-name>
          , W. F. Cheng, H. C. Chen,
          <string-name>
            <given-names>H. L.</given-names>
            <surname>Chien</surname>
          </string-name>
          ,
          <article-title>Benefit of construct information security environment based on lightweight virtualization technology</article-title>
          , in: 2015
          <source>International Carnahan Conference on Security Technology (ICCST)</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>U.</given-names>
            <surname>Wieder</surname>
          </string-name>
          ,
          <article-title>Hashing, load balancing and multiple choice</article-title>
          ,
          <source>Foundations and Trends in Theoretical Computer Science</source>
          <volume>12</volume>
          (
          <issue>3-4</issue>
          ) (
          <year>2017</year>
          )
          <fpage>275</fpage>
          -
          <lpage>379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mahadevappa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Murugesan</surname>
          </string-name>
          ,
          <article-title>Study of container-based virtualisation and threats in fog computing</article-title>
          , in: Advances in Cyber Security: Second International Conference, ACeS
          <year>2020</year>
          , Penang, Malaysia, December 8-
          <issue>9</issue>
          ,
          <year>2020</year>
          ,
          <source>Revised Selected Papers 2</source>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>Singapore</given-names>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>535</fpage>
          -
          <lpage>549</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cziva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jouet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. J.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Pezaros</surname>
          </string-name>
          ,
          <article-title>Container-based network function virtualization for software-defined networks</article-title>
          ,
          <source>in: 2015 IEEE symposium on computers and communication (ISCC)</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>415</fpage>
          -
          <lpage>420</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Suo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <article-title>An analysis and empirical study of container networks</article-title>
          ,
          <source>in: IEEE INFOCOM 2018-IEEE Conference on Computer Communications</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>189</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Juneja</surname>
          </string-name>
          , G. Srivastava, G. Dhiman,
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Gadekallu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <article-title>Load balancing and service discovery using Docker Swarm for microservice based big data applications</article-title>
          ,
          <source>Journal of Cloud Computing</source>
          <volume>12</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Amaral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Polo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Carrera</surname>
          </string-name>
          , I. Mohomed,
          <string-name>
            <given-names>M.</given-names>
            <surname>Unuvar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Steinder</surname>
          </string-name>
          ,
          <article-title>Performance evaluation of microservices architectures using containers, in: 2015 ieee 14th international symposium on network computing and applications</article-title>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Qiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. R.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>When serverless computing meets edge computing: Architecture, challenges, and open issues</article-title>
          ,
          <source>IEEE Wireless Communications</source>
          <volume>28</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          )
          <fpage>126</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Watada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kadikar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Pham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>Emerging trends, techniques and open issues of containerization: A review</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>152443</fpage>
          -
          <lpage>152472</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Goudarzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Aryal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          ,
          <article-title>Container orchestration in edge and fog computing environments for real-time iot applications</article-title>
          ,
          <source>in: Computational Intelligence and Data Analytics: Proceedings of ICCIDA 2022</source>
          , Springer Nature Singapore, Singapore,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <article-title>Exploring new opportunities to defeat low-rate DDoS attack in container-based cloud environment</article-title>
          ,
          <source>IEEE Transactions on Parallel and Distributed Systems</source>
          <volume>31</volume>
          (
          <issue>3</issue>
          ) (
          <year>2019</year>
          )
          <fpage>695</fpage>
          -
          <lpage>706</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Bai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-M.</given-names>
            <surname>Hu</surname>
          </string-name>
          , X. Han,
          <article-title>Cracking app isolation on apple: Unauthorized cross-app resource access on MAC os~ x and ios</article-title>
          .
          <source>in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Manu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Akhtar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. K.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. B. S.</given-names>
            <surname>Murthy</surname>
          </string-name>
          ,
          <article-title>A study, analysis and deep dive on cloud PAAS security in terms of Docker container security, in: 2016 international conference on circuit, power and computing technologies (ICCPCT)</article-title>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>