Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 7 No 11 (2023): Volume 7, Issue 11, November 2023 | Pages: 315-320
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 10-11-2023
Container technology is one of the fastest growing technologies. However, when it comes to the security of containers, it appears that their vulnerability has increased in line with its popularity. Because when users pulled images from various repositories for various need there can be images that can be harmful images to entire container environment. So, we need to verify security of those images before store them into container environments. In this paper, I describe a mechanism that can validate security level of container image before it pulled into the container. In addition, we use hash validation as well as Format String Validation for further check the image validity.
Docker, Container Vulnerability, Hash Validation, Format Matching
V.U. Kumarasiri, Ms. Chethana Liyanapathirana, Dr. Lakmal Rupasinghe, “Prevent Registry Being Compromised by Pulling Insecure Container Images from Public Registries” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 11, pp 315-320, November 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.711043
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence