Netinfo Security ›› 2023, Vol. 23 ›› Issue (12): 21-28.doi: 10.3969/j.issn.1671-1122.2023.12.003

Previous Articles     Next Articles

Endogenous Security Methods for Container Cloud Based on IPv6

LI Dong1, YU Junqing1,2(), WEN Ruibin2, XIE Yiding2   

  1. 1. Network and Computation Center, Huazhong University of Science and Technology, Wuhan 430074, China
    2. School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
  • Received:2023-10-11 Online:2023-12-10 Published:2023-12-13

Abstract:

Container is increasingly used in cloud computing resource management in data center because of its low resource consumption, high resource utilization, fast startup speed, and strong elasticity. Relevant studies have shown that current container cloud lack trustwworthy access mechanism. IPv6 with large address space and high safety can establish end-to-end transparent connection and achieve trustworthy access in container platform. To solve the trustworthy issue of container cloud platform, an improved method for authenticating the real source address of IPv6 was proposed. This method embeded real user identity information into the last 64 bits of the IPv6 address. Meanwhile, to account for the highly dynamic nature of container backups, user identifier was generated based on hash and salt-add algorithm, and the data index was also embedded in the IPv6 address, replacing the original encryption method with low efficiency because of key management and linear matching. By this way, the address generation process could be optimized, the time complexity of address resolution could be reduced, and the address allocation requirements of container cloud platform can be satisfied. Experimental results show that the optimized method could improve authenticating the real source address of IPv6 efficiency by approximately 35% in the address generation stage and reduce the time complexity from O(n) to O(1) in the address tracing stage. It can adapt to highly dynamic container environment and significantly enhance the endogeous security of container cloud platform.

Key words: network security, container cloud, endogenous security, source address validation, IPv6

CLC Number: