Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Information and Communication Security Mechanisms For Microservices-based Systems

google+
Views: 139                 

Author :  Lenin Leines-Vite, Juan Carlos Pérez-Arriaga, Xavier Limón

Affiliation :  Universidad Veracruzana

Country :  Mexico

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  13, 6, November, 2021

Abstract :


Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.

Keyword :  Microservices, Software architecture, Secure communication, Information security.

Journal/ Proceedings Name :  International Journal of Network Security & Its Applications (IJNSA)

URL :  https://aircconline.com/abstract/ijnsa/v13n6/13621ijnsa07.html

User Name : lenin_llv
Posted 04-12-2021 on 18:20:49 AEDT



Related Research Work

  • Design And Implementation Of Hierarchical Visual Cryptography With Expansionless Shares
  • Hybridized Model For Data Security Based On Security Hash Analysis (sha 512) And Salting Techniques
  • The Effectiveness Of Applying Different Strategies On Recognition And Recall Textual Password
  • An Efficient Secure Cryptography Scheme For New Ml-based Rpl Routing Protocol In Mobile Iot Environment

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals