
[6] C. Pahl, ‘Containerization and the PaaS Cloud’,
IEEE Cloud Comput., vol. 2, no. 3, pp. 24–31, May
2015, doi: 10.1109/MCC.2015.51.
[7] J. Bhimani et al., ‘Understanding performance of
I/O intensive containerized applications for NVMe
SSDs’, in 2016 IEEE 35th International
Performance Computing and Communications
Conference (IPCCC), Las Vegas, NV, USA, Dec.
2016, pp. 1–8. doi: 10.1109/PCCC.2016.7820650.
[8] V. Andrikopoulos, T. Binz, F. Leymann, and S.
Strauch, ‘How to adapt applications for the Cloud
environment: Challenges and solutions in migrating
applications to the Cloud’, Computing, vol. 95, no.
6, pp. 493–535, Jun. 2013, doi: 10.1007/s00607-
012-0248-2.
[9] N. Kratzke and P.-C. Quint, ‘Understanding cloud-
native applications after 10 years of cloud
computing - A systematic mapping study’, J. Syst.
Softw., vol. 126, pp. 1–16, Apr. 2017, doi:
10.1016/j.jss.2017.01.001.
[10] C. Zheng, Q. Zhuang, and F. Guo, ‘A Multi-Tenant
Framework for Cloud Container Services’, in 2021
IEEE 41st International Conference on Distributed
Computing Systems (ICDCS), DC, USA, Jul. 2021,
pp. 359–369. doi:
10.1109/ICDCS51616.2021.00042.
[11] Google cloud, ‘Cluster multi-tenancy’, 2018.
https://cloud.google.com/kubernetes-
engine/docs/concepts/multitenancy-overview
[12] M. Almorsy, J. Grundy, and I. Müller, ‘An Analysis
of the Cloud Computing Security Problem’,
ArXiv160901107 Cs, Sep. 2016, Accessed: Jan. 24,
2022. [Online]. Available:
http://arxiv.org/abs/1609.01107
[13] H. Dey, R. Islam, and H. Arif, ‘An Integrated
Model To Make Cloud Authentication And Multi-
Tenancy More Secure’, in 2019 International
Conference on Robotics,Electrical and Signal
Processing Techniques (ICREST), Dhaka,
Bangladesh, Jan. 2019, pp. 502–506. doi:
10.1109/ICREST.2019.8644077.
[14] F. Masmoudi, M. Sellami, M. Loulou, and A. H.
Kacem, ‘From Event to Evidence: An Approach for
Multi-tenant Cloud Services’ Accountability’, in
2017 IEEE 31st International Conference on
Advanced Information Networking and Applications
(AINA), Taipei, Taiwan, Mar. 2017, pp. 1082–1089.
doi: 10.1109/AINA.2017.48.
[15] Research Student, University of Wolverhampton,
UK., O. Matthew, K. Buckley, and M. Garvey, ‘A
Framework for Multi-Tenant Database Adoption
based on the Influencing Factors’, Int. J. Inf.
Technol. Comput. Sci., vol. 8, no. 3, pp. 1–9, Mar.
2016, doi: 10.5815/ijitcs.2016.03.01.
[16] B. Medeiros, M. A. Simplicio, and E. R. Andrade,
‘Designing and Assessing Multi-tenant Isolation
Strategies for Cloud Networks’, in 2019 22nd
Conference on Innovation in Clouds, Internet and
Networks and Workshops (ICIN), Paris, France,
Feb. 2019, pp. 214–221. doi:
10.1109/ICIN.2019.8685898.
[17] X. Gao, Z. Gu, M. Kayaalp, D. Pendarakis, and H.
Wang, ‘ContainerLeaks: Emerging Security Threats
of Information Leakages in Container Clouds’, in
2017 47th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks
(DSN), Denver, CO, USA, Jun. 2017, pp. 237–248.
doi: 10.1109/DSN.2017.49.
[18] CNCF, ‘Cloud-native Definition v1.0’, 2019.
https://github.com/cncf/toc/blob/master/DEFINITI
ON.md (accessed Dec. 11, 2021).
[19] G. Toffetti, S. Brunner, M. Blöchlinger, J. Spillner,
and T. M. Bohnert, ‘Self-managing cloud-native
applications: Design, implementation, and
experience’, Future Gener. Comput. Syst., vol. 72,
pp. 165–179, Jul. 2017, doi:
10.1016/j.future.2016.09.002.
[20] J. Rahman and P. Lama, ‘Predicting the End-to-End
Tail Latency of Containerized Microservices in the
Cloud’, in 2019 IEEE International Conference on
Cloud Engineering (IC2E), Prague, Czech
Republic, Jun. 2019, pp. 200–210. doi:
10.1109/IC2E.2019.00034.
[21] K. Petersen, S. Vakkalanka, and L. Kuzniarz,
‘Guidelines for conducting systematic mapping
studies in software engineering: An update’, Inf.
Softw. Technol., vol. 64, pp. 1–18, Aug. 2015, doi:
10.1016/j.infsof.2015.03.007.
[22] A. A. Adewojo and J. M. Bass, ‘Evaluating the
Effect of Multi-Tenancy Patterns in Containerized
Cloud-Hosted Content Management System’, in
2018 26th Euromicro International Conference on
Parallel, Distributed and Network-based
Processing (PDP), Cambridge, Mar. 2018, pp. 278–
282. doi: 10.1109/PDP2018.2018.00047.
[23] S. Arnautov et al., ‘SCONE: Secure Linux
Containers with Intel SGX’, p. 17.
[24] M. Bélair, S. Laniepce, and J.-M. Menaud,
‘Leveraging Kernel Security Mechanisms to
Improve Container Security: a Survey’, in
Proceedings of the 14th International Conference
on Availability, Reliability and Security - ARES
’19, Canterbury, CA, United Kingdom, 2019, pp. 1–
6. doi: 10.1145/3339252.3340502.
[25] A. Beltre, P. Saha, and M. Govindaraju,
‘KubeSphere: An Approach to Multi-Tenant Fair
Scheduling for Kubernetes Clusters’, in 2019 IEEE
Cloud Summit, Washington, DC, USA, Aug. 2019,
pp. 14–20. doi:
10.1109/CloudSummit47114.2019.00009.
[26] M. Beranek, V. Kovar, and G. Feuerlicht,
‘Framework for Management of Multi-tenant Cloud
Environments’, in Cloud Computing – CLOUD
2018, vol. 10967, M. Luo and L.-J. Zhang, Eds.
Cham: Springer International Publishing, 2018, pp.
309–322. doi: 10.1007/978-3-319-94295-7_21.
[27] E. F. Boza, C. L. Abad, S. P. Narayanan, B.
Balasubramanian, and M. Jang, ‘A Case for
Performance-Aware Deployment of Containers’, in
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2023.22.4
Daniel Olabanji, Tineke Fitch, Olumuyiwa Matthew