Deployment of Docker Services on Private Cloud
Keywords:
Cloud, Docker, Container.Abstract
The proposed paper presents the topic “Deployment of Docker Services on Private Cloud”. It briefs how the system is implemented to provide Docker services to client, in order to reduce client’s overall system load and to make the client enjoy the application layer facilities easily. The paper tells how this system uses Docker Hub which works on the concept of Container as a Service, thus making the task of creating, deploying and running applications simpler and light weighted. Docker Server in this system acts as a bridge between Docker client and Docker Hub. Client requests server for applications, server fetches the images from Docker Hub via Docker Engine which is responsible for packing these images along with its dependencies and binaries into a Container. Client can access these applications using web browser (URL,Tags). Traditionally, server could access Docker through Command Line Interface (CLI); hence to make it simpler, we present this paper illustrating creation of User Interface (UI) for the server side. Thus this paper summarizes how Docker services are deployed on private cloud
Downloads
References
David Bernstein, “Containers and Cloud: From LXC to Docker to Kubernetes”,IEEE Cloud Computing , Year: 2014, Volume: 1, Issue: 3
Sachchidanand Singh, Nirmala Singh, Containers & Docker: Emerging Roles & Future ofCloud Technology , 2016 2nd International Conference on Applied and
Theoretical Computing and Communication Technology (iCATccT), Year:2016, 2016 IEEE [3] Babak Bashari Rad, Harrison John Bhatti
Mohammad Ahmadi, “An Introduction to Docker and Analysis of its Performance”, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
Harald Albers, Allen Sun, “Kitematic user guide ”,2014. [6] Dmitry Medvinsky,Luke Hutscal,Adrien Magnus”, Managing Containers with Docker Shipyard”, Russia,2015. [7] E. Bacis et al. , “DockerPolicyModules:Mandatory Access Control for Docker Container”, Proceeding of 2015 IEEE Conference Communications and Network Security (CNS),2015.