Unikernels Motivations, Benefits and Issues: A Multivocal Literature Review
Affiliation
Systems and Industrial Engineering, University of ArizonaIssue Date
2023-10-17
Metadata
Show full item recordPublisher
Association for Computing MachineryCitation
Nabil El Ioini, Ayoub El Majjodi, David Hästbacka, Tomas Cerny, and Davide Taibi. 2023. Unikernels Motivations, Benefits and Issues: A Multivocal Literature Review. In 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum (ESAAM 2023), October 17,Rights
© 2023 Copyright held by the owner/author(s). This work is licensed under a Creative Commons Attribution International 4.0 License.Collection Information
This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.Abstract
While working in the cloud, the trend is to secure all the resources in order for the applications and systems to operate as efficiently as possible. Huge amounts of resources are wasted on unnecessary utilities and resource-consuming processes, which can rather have a negative effect. Unikernels are the last trend in this direction. We aim to shed light on the motivations, benefits, and issues in unikernels. Our goal is to systematically analyze what made this technology so attractive, identifying the benefits they have attained and the issues encountered in embracing this new technology. We surveyed academic and grey literature by means of the Multivocal Literature Review process, analyzing 590 sources, of which 62 reported motivations, benefits, and issues. The main motivations for adopting unikernels are performance and security, which are also reflected in the benefits reported. In terms of issues, the maturity of the existing frameworks as well as the tool support, are the main challenges that need to be addressed. Given the great potential that unikernels can bring in terms of performance and security, further research is needed to investigate the pros and cons, how to use them, and in which contexts they are beneficial. © 2023 Owner/Author.Note
Open access articleISBN
979-840070835-0Version
Final Published Versionae974a485f413a2113503eed53cd6c53
10.1145/3624486.3624492
Scopus Count
Collections
Except where otherwise noted, this item's license is described as © 2023 Copyright held by the owner/author(s). This work is licensed under a Creative Commons Attribution International 4.0 License.