{"id":"https://openalex.org/W4312620628","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927748","title":"Design and Implementation of a Data-Auditing Mechanism for Container Migration","display_name":"Design and Implementation of a Data-Auditing Mechanism for Container Migration","publication_year":2022,"publication_date":"2022-09-12","ids":{"openalex":"https://openalex.org/W4312620628","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927748"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927748","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071440877","display_name":"Toshihiro Uchibayashi","orcid":"https://orcid.org/0000-0003-1042-2461"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Toshihiro Uchibayashi","raw_affiliation_strings":["Kyushu University,Research Institute for Information Technology,Fukuoka,Japan","Research Institute for Information Technology, Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University,Research Institute for Information Technology,Fukuoka,Japan","institution_ids":["https://openalex.org/I135598925"]},{"raw_affiliation_string":"Research Institute for Information Technology, Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021541754","display_name":"Bernady O. Apduhan","orcid":null},"institutions":[{"id":"https://openalex.org/I199028557","display_name":"Kyushu Sangyo University","ror":"https://ror.org/01wqrpc44","country_code":"JP","type":"education","lineage":["https://openalex.org/I199028557"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Bernady Apduhan","raw_affiliation_strings":["Kyushu Sangyo University,Faculty of Science and Engineering,Fukuoka,Japan","Faculty of Science and Engineering, Kyushu Sangyo University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu Sangyo University,Faculty of Science and Engineering,Fukuoka,Japan","institution_ids":["https://openalex.org/I199028557"]},{"raw_affiliation_string":"Faculty of Science and Engineering, Kyushu Sangyo University, Fukuoka, Japan","institution_ids":["https://openalex.org/I199028557"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062341508","display_name":"Takuo Suganuma","orcid":"https://orcid.org/0000-0002-5798-5125"},"institutions":[{"id":"https://openalex.org/I4210093896","display_name":"Tohoku University Hospital","ror":"https://ror.org/00kcd6x60","country_code":"JP","type":"healthcare","lineage":["https://openalex.org/I4210093896"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takuo Suganuma","raw_affiliation_strings":["Tohoku University,Cyberscience Center,Sendai,Japan","Cyberscience Center, Tohoku University, Sendai, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Cyberscience Center,Sendai,Japan","institution_ids":["https://openalex.org/I4210093896"]},{"raw_affiliation_string":"Cyberscience Center, Tohoku University, Sendai, Japan","institution_ids":["https://openalex.org/I4210093896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011945414","display_name":"Masahiro Hiji","orcid":"https://orcid.org/0000-0002-3202-6315"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiro Hiji","raw_affiliation_strings":["Tohoku University,Graduate School of Economics and Management,Sendai,Japan","Graduate School of Economics and Management, Tohoku University, Sendai, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Graduate School of Economics and Management,Sendai,Japan","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"Graduate School of Economics and Management, Tohoku University, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071440877"],"corresponding_institution_ids":["https://openalex.org/I135598925"],"apc_list":null,"apc_paid":null,"fwci":0.2165,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.36662977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.8879850506782532},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.8018043041229248},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711745023727417},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5709883570671082},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.549674391746521},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5491292476654053},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5216448903083801},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4799656867980957},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.46210727095603943},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.459053635597229},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4532807469367981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4436168968677521},{"id":"https://openalex.org/keywords/live-migration","display_name":"Live migration","score":0.42137718200683594},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3822490870952606},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2023945450782776},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13086417317390442},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12636348605155945},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10795730352401733},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.09917962551116943}],"concepts":[{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.8879850506782532},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.8018043041229248},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711745023727417},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5709883570671082},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.549674391746521},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5491292476654053},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5216448903083801},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4799656867980957},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.46210727095603943},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.459053635597229},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4532807469367981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4436168968677521},{"id":"https://openalex.org/C2778710394","wikidata":"https://www.wikidata.org/wiki/Q4179813","display_name":"Live migration","level":4,"score":0.42137718200683594},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3822490870952606},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2023945450782776},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13086417317390442},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12636348605155945},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10795730352401733},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.09917962551116943},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927748","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2094729371","https://openalex.org/W2105103777","https://openalex.org/W2729399112","https://openalex.org/W2982617675","https://openalex.org/W3089506761","https://openalex.org/W3162907652","https://openalex.org/W3184535468","https://openalex.org/W4213202592","https://openalex.org/W6674289511"],"related_works":["https://openalex.org/W1549982987","https://openalex.org/W1907588937","https://openalex.org/W2159337754","https://openalex.org/W2793500743","https://openalex.org/W2088620127","https://openalex.org/W3046505149","https://openalex.org/W1647981072","https://openalex.org/W1963799338","https://openalex.org/W3145497805","https://openalex.org/W2947629119"],"abstract_inverted_index":{"Virtualization":[0],"technology":[1,22],"has":[2,23,128],"become":[3],"indispensable":[4],"in":[5,31,48,59],"edge":[6],"computing":[7],"environments":[8],"where":[9],"applications":[10],"are":[11,46],"deployed":[12],"to":[13,102],"many":[14],"nodes.":[15],"In":[16,42],"the":[17,21,32,37,65,71,81,84,115,136,139],"past":[18],"few":[19],"years,":[20],"improved":[24],"dramatically,":[25],"and":[26,79,120],"is":[27,35,64,70,99],"not":[28],"only":[29],"used":[30,130],"field,":[33],"but":[34],"also":[36,106],"subject":[38],"of":[39,67,73,138],"much":[40],"research.":[41],"particular,":[43],"containers":[44],"which":[45,127],"lighter":[47],"weight":[49],"than":[50],"virtual":[51,132],"machines,":[52],"have":[53],"greatly":[54],"expanded":[55],"their":[56],"market":[57],"share":[58],"recent":[60],"years.":[61],"The":[62],"problem":[63],"migration":[66,98],"containers.":[68],"Migration":[69],"process":[72],"creating":[74],"a":[75,90,122],"container":[76,85],"checkpoint":[77],"image":[78,82],"moving":[80],"so":[83],"can":[86],"be":[87],"restored":[88],"at":[89],"different":[91],"location":[92],"while":[93],"maintaining":[94],"its":[95],"state.":[96],"While":[97],"very":[100],"easy":[101],"perform,":[103],"it":[104],"may":[105],"violate":[107],"company":[108],"regulations":[109],"and/or":[110],"national":[111],"laws,":[112],"depending":[113],"on":[114],"destination.":[116],"Therefore,":[117],"we":[118],"propose":[119],"implement":[121],"data-auditing":[123],"mechanism":[124],"for":[125,131],"containers,":[126],"been":[129],"machines.":[133],"We":[134],"evaluate":[135],"feasibility":[137],"proposed":[140],"mechanism.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
