Paper
27 September 2022 Docker container-based approach to multi-user file resource isolation
Xiangzhou Chen, Shen Lin, Bijun Zhang, Fengyan Jiang, Jinxiang Liu
Author Affiliations +
Proceedings Volume 12346, 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022); 1234606 (2022) https://doi.org/10.1117/12.2653503
Event: 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022), 2022, Kunming, China
Abstract
Facing the problem that the isolation execution time of multi-user file resource isolation method is too long in the application process, a multi-user file resource isolation method based on Docker container is designed. It identifies the characteristics of multi-user file resources, expands the storage space, divides the locking module using Docker container, clarifies the subject-object relationship in the host, introduces the concept of time sequence and sets the resource isolation mode. Experimental results: The mean isolation execution time of the multi-user file resource isolation method in the paper, compared with three other multi-user file resource isolation methods, is 62.183s, 82.983s, 82.660s and 83.393s respectively, indicating that the designed multi-user file resource isolation method is more effective when combined with the Docker container.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangzhou Chen, Shen Lin, Bijun Zhang, Fengyan Jiang, and Jinxiang Liu "Docker container-based approach to multi-user file resource isolation", Proc. SPIE 12346, 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022), 1234606 (27 September 2022); https://doi.org/10.1117/12.2653503
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Cardiovascular magnetic resonance imaging

Clouds

Mirrors

Analytical research

Data centers

Network security

Back to Top