{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:18:11Z","timestamp":1775200691541,"version":"3.50.1"},"reference-count":138,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2945930","type":"journal-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T19:55:56Z","timestamp":1570478156000},"page":"152443-152472","source":"Crossref","is-referenced-by-count":121,"title":["Emerging Trends, Techniques and Open Issues of Containerization: A Review"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3322-2086","authenticated-orcid":false,"given":"Junzo","family":"Watada","sequence":"first","affiliation":[]},{"given":"Arunava","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Ruturaj","family":"Kadikar","sequence":"additional","affiliation":[]},{"given":"Hoang","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346917"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440668"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2015.7367280"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.26"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2015.7275379"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346869"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.78"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.113"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2016.7581267"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.4250933"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.163"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3008167.3008173"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2644658"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2014.7041896"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.75"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2011.51"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.74"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.54"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2799230"},{"key":"ref26","first-page":"247","article-title":"System performance evaluation of para virtualization, container virtualization, and full virtualization using Xen, OpenVZ, and XenServer","author":"babu","year":"2014","journal-title":"Proc 4th Int Conf Adv Comput Commun (ICACC)"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700394"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2015.49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988337"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","article-title":"Proposed NIST standard for role-based access control","volume":"4","author":"ferraiolo","year":"2001","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_47"},{"key":"ref58","first-page":"61","article-title":"OSv&#x2014;Optimizing the operating system for virtual machines","author":"kivity","year":"2014","journal-title":"Proc USENIX Annu Tech Conf USENIX ATC"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/2723872.2723894","article-title":"Principles and performance characteristics of algorithms for live VM migration","volume":"49","author":"sv\u00e4rd","year":"2015","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"ref56","first-page":"391","article-title":"Fast transparent migration for virtual machines","author":"nelson","year":"2005","journal-title":"Proc General Track USENIX Annual Technical Conf"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.51"},{"key":"ref54","article-title":"Analysis of Docker security","author":"bui","year":"2015","journal-title":"arXiv 1501 02967"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952698"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950328"},{"key":"ref40","article-title":"Autonomic orchestration of containers: Problem definition and research challenges","author":"casalicchio","year":"2016","journal-title":"Proc Valuetools"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"ref3","first-page":"1","article-title":"Virtualization and containerization of application infrastructure: A comparison","author":"scheepers","year":"2014","journal-title":"Proc 21st Twente Student Conf IT"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2755979.2755984"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.96"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029832"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2015.35"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741964"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2014.78"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/BDC.2015.39"},{"key":"ref45","first-page":"112","article-title":"Adaptive performance isolation middleware for multi-tenant SaaS","author":"walraven","year":"2015","journal-title":"Proc 8th Int Conf Utility Cloud Comput"},{"key":"ref48","first-page":"70","article-title":"Borg, omega, and kubernetes","author":"burns","year":"2016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-014-0017-x"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058085"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IWSG.2015.16"},{"key":"ref44","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"Proc of USENIX Annual Technical Conf (USENIX)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.17"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/504390.504408"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/1851276.1851282"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113363"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321445"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2015.7377291"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"ref129","article-title":"Denali: Lightweight virtual machines for distributed and networked applications","author":"whitaker","year":"2002"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.62"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"ref70","year":"2019"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844162"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0091"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2324876.2324877"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2005.59"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3024-4"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"ref134","author":"kopytov","year":"2004","journal-title":"Sysbench A system performance benchmark"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00031"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"ref132","author":"jain","year":"2018","journal-title":"Containers Dockers and Kubernetes"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2702586"},{"key":"ref136","first-page":"19","article-title":"A survey of memory bandwidth and machine balance in current high performance computers","author":"mccalpin","year":"1997","journal-title":"IEEE TCCA Newslett"},{"key":"ref135","article-title":"iPerf-the TCP, UDP and SCTP network bandwidth measurement tool","author":"gueant","year":"2017"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.21236\/ADA439315"},{"key":"ref137","first-page":"213","article-title":"Performance evaluation of HPC benchmarks on VMware&#x2019;s ESXi server","author":"ali","year":"2011","journal-title":"Proc Eur Conf Parallel Process"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2794881"},{"key":"ref62","first-page":"85","article-title":"Containers checkpointing and live migration","volume":"2","author":"mirkin","year":"2008","journal-title":"Proc Linux Symp"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.91"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.49"},{"key":"ref65","first-page":"101","article-title":"Multiple instances of the global linux namespaces","volume":"1","author":"biederman","year":"2006","journal-title":"Proc Linux Symp"},{"key":"ref66","article-title":"Resource management: Linux kernel namespaces and cgroups","volume":"186","author":"rosen","year":"2013","journal-title":"Haifux"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2541883.2541895"},{"key":"ref68","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4123"},{"key":"ref69","year":"2019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.51"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004237"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.131"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016218"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2017.13"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.3711653"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICETIETR.2018.8529141"},{"key":"ref106","first-page":"95","article-title":"Microservices: How to make your application scale","author":"dragoni","year":"2017","journal-title":"Proc Int Andrei Ershov Memorial Conf Perspect Syst Inform"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0521-z"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.11"},{"key":"ref91","article-title":"Edge-as-a-service: Towards distributed cloud architectures","author":"varghese","year":"2017","journal-title":"arXiv 1710 10090"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.64"},{"key":"ref90","first-page":"241","article-title":"Solaris zones: Operating system support for consolidating commercial workloads","volume":"4","author":"price","year":"2004","journal-title":"Proc LISA"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406266"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502954"},{"key":"ref111","first-page":"1","article-title":"Distributed cloud storage services with FLECS containers","author":"yoon","year":"2011","journal-title":"Open Cirrus Summit"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2015.35"},{"key":"ref110","article-title":"Masking logical unit numbers in a shared data storage system","author":"hall","year":"2004"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2834623"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2889709"},{"key":"ref96","article-title":"A scalable data science platform for healthcare and precision medicine research","author":"mcpadden","year":"2018","journal-title":"arXiv 1808 04849"},{"key":"ref97","first-page":"486","article-title":"DAHS: A distributed data-as-a-service framework for data analytics in healthcare","author":"boonma","year":"2018","journal-title":"Proc Int Conf P2P Parallel Grid Cloud Internet Comput"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DataCloud.2014.6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.66"},{"key":"ref12","first-page":"1","article-title":"Flexible network address mapping for container-based clouds","author":"kim","year":"2015","journal-title":"Proc 1st IEEE Conf Netw Softwarization (NetSoft)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.12.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273025"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.100"},{"key":"ref82","author":"hausenblas","year":"2018","journal-title":"Container Networking from Docker to Kubernetes"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2016.2516943"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502883"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.91"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref119","first-page":"559","article-title":"Jitsu: Just-in-time summoning of unikernels","author":"madhavapeddy","year":"2015","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.42"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet-RENAM.2014.6955310"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2833619"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.36"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.5.1068-1078"},{"key":"ref80","first-page":"1","article-title":"Networking in containers and container clusters","author":"marmol","year":"2015","journal-title":"Proceedings of netdev 0 1"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-018-9437-3"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3094405.3094412"},{"key":"ref89","first-page":"116","article-title":"Jails: Confining the omnipotent root","volume":"43","author":"kamp","year":"2000","journal-title":"Proc 2nd Int SANE Conf"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3140607.3050757"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.89"},{"key":"ref123","first-page":"1","article-title":"Unikernel monitors: Extending minimalism outside of the box","author":"williams","year":"2016","journal-title":"Proc of 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_5"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/506378.506413"},{"key":"ref87","author":"walsh","year":"2014","journal-title":"Bringing New Security Features to Docker"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.090512.00043"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08861307.pdf?arnumber=8861307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:39:44Z","timestamp":1628624384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8861307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":138,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2945930","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}