| CPC G06F 9/45558 (2013.01) [G06F 21/602 (2013.01); H04L 9/0643 (2013.01); G06F 2009/45587 (2013.01)] | 11 Claims |

|
1. A computer-implemented method for protecting container image and runtime data from host access, the method comprising:
retrieving, by a processor, one or more container images from a container registry, wherein the one or more container images are based on a root file system comprised of one or more layers;
flattening, by the processor, each of the one or more container images of the root file system into a single layer;
generating, by the processor, a container base image for each flattened container image;
building, by the processor, a virtual machine overlay base image based, at least in part, on one or more of the generated container base images;
sharing, by the processor, the virtual machine overlay base image based, at least in part, on a dynamic sharing policy; and
encrypting, by the processor, each generated container base image.
|