Securing microservices and microservice architectures: A systematic mapping study

Computer Science Review - Tập 41 - Trang 100415 - 2021
Abdelhakim Hannousse1, Salima Yahiouche2
1Department of Computer Science, Université 8 Mai 1945 Guelma, BP 401, Guelma 24000, Algeria
2LRS Laboratory, Badji Mokhtar University, BP 12, Annaba 23000, Algeria

Tài liệu tham khảo

Yarygina, 2018, Overcoming security challenges in microservice architectures, 11 Baškarada, 2018, Architecting microservices: Practical opportunities and challenges, J. Comput. Inf. Syst., 1 Dragoni, 2017, 195 Alshuqayran, 2016, A systematic mapping study in microservice architecture, 44 Bogner, 2019, Microservices in industry: Insights into technologies, characteristics, and software quality, 187 Kitchenham, 2015 K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic mapping studies in software engineering, in: Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, EASE’08, Swindon, UK, 2008, pp. 68–77. Petersen, 2015, Guidelines for conducting systematic mapping studies in software engineering: An update, Inf. Softw. Technol., 64, 1, 10.1016/j.infsof.2015.03.007 A.P. Vale, G. Márquez, H. Astudillo, E.B. Fernandez, Security mechanisms used in microservices-based systems: A systematic mapping, in: XLV Latin American Computing Conference, 2019, pp. 1–10. Yu, 2019, A survey on security issues in services communication of microservices-enabled fog applications, Concurr. Comput.: Pract. Exper., 31, 10.1002/cpe.4436 de Aguiar Monteiro, 2018, A survey on microservice security–trends in architecture, privacy and standardization on cloud computing environments, Int. J. Adv. Secur., 11, 201 Nkomo, 2019, Software development activities for secure microservices, 573 Sultan, 2019, Container security: Issues, challenges, and the road ahead, IEEE Access, 7, 52976, 10.1109/ACCESS.2019.2911732 Bélair, 2019, Leveraging kernel security mechanisms to improve container security: A survey, 76:1 Felderer, 2018, Guidelines for systematic mapping studies in security engineering, 47 Kuhrmann, 2017, On the pragmatic design of literature studies in software engineering: an experience-based guideline, Empir. Softw. Eng., 22, 2852, 10.1007/s10664-016-9492-y Petticrew, 2006 Wohlin, 2014, Guidelines for snowballing in systematic literature studies and a replication in software engineering, 1 Wohlin, 2016, Second-generation systematic literature studies using snowballing, 1 M.S. Farooq, S. Riaz, A. Abid, T. Umer, Y.B. Zikria, Role of iot technology in agriculture: A systematic literature review, Electronics 9 (2). http://dx.doi.org/10.3390/electronics9020319. Fernandez, 2011, Usability evaluation methods for the web: A systematic mapping study, Inf. Softw. Technol., 53, 789, 10.1016/j.infsof.2011.02.007 OWASP, 2017 Strauss, 1998 Ahmadvand, 2018, Integrity protection against insiders in microservice-based infrastructures: From threats to a security framework, 573 Surantha, 2020, Secure kubernetes networking design based on zero trust model: A case study of financial service enterprise in indonesia, 348 Brenner, 2017, Secure cloud micro services using intel sgx, 177 Otterstad, 2017, Low-level exploitation mitigation by diverse microservices, 49 Yarygina, 2018, A game of microservices: Automated intrusion response, 169 Nehme, 2019, Fine-grained access control for microservices, 285 Bánáti, 2018, Authentication and authorization orchestrator for microservice-based software architectures, 1180 Nagothu, 2018, A microservice-enabled architecture for smart surveillance using blockchain technology, 1 Pahl, 2018, Graph-based iot microservice security, 1 Thanh, 2016, Embedding security and privacy into the development and operation of cloud applications and services, 31 Sun, 2015, Security-as-a-service for microservices-based cloud applications, 50 Buzachis, 2018, Basic principles of osmotic computing: Secure and dependable microelements (mels) orchestration leveraging blockchain facilities, 47 George, 2017, Claimsware: A claims-based middleware for securing iot services, 649 Ranjbar, 2017, Synaptic: Secure and persistent connectivity for containers, 262 Ahmadvand, 2016, Requirements reconciliation for scalable and secure microservice (de)composition, 68 Torkura, 2018, A cyber risk based moving target defense mechanism for microservice architectures, 932 Jin, 2019, Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud, IEEE Trans. Dependable Secure Comput., 1, 10.1109/TDSC.2019.2916666 Gerking, 2019, Component-based refinement and verification of information-flow security policies for cyber–physical microservice architectures, 61 Osman, 2019, Sandnet: Towards high quality of deception in container-based microservice architectures, 1 M. Pahl, F. Aubet, All eyes on you: Distributed multi-dimensional iot microservice anomaly detection, in: 2018 14th International Conference on Network and Service Management (CNSM), 2018, pp. 72–80. Ravichandiran, 2018, Anomaly detection using resource behaviour analysis for autoscaling systems, 192 Wen, 2019, Ga-par: Dependable microservice orchestration framework for geo-distributed clouds, IEEE Trans. Parallel Distrib. Syst., 1 Lu, 2017, A secure microservice framework for iot, 9 Pahl, 2018, Securing iot microservices with certificates, 1 Nehme, 2019, Securing microservices, IT Prof., 21, 42, 10.1109/MITP.2018.2876987 Fetzer, 2016, Building critical applications using microservices, IEEE Secur. Privacy, 14, 86, 10.1109/MSP.2016.129 Nguyen, 2019, Applying spring security framework and oauth2 to protect microservice architecture API, JSW, 14, 257, 10.17706/jsw.14.6.257-264 He, 2017, Authentication and authorization of end user in microservice architecture, J. Phys. Conf. Ser., 910, 10.1088/1742-6596/910/1/012060 O. Baker, Q. Nguyen, A novel approach to secure microservice architecture from owasp vulnerabilities, in: Proceedings of the 10th Annual CITRENZ Conference (2019), ITx New Zealand’s Conference of IT, Nelson, NZ, 2019, pp. 54–58. Salibindla, 2018, Microservices api security, Int. J. Eng. Res. Technol., 7, 277 Jander, 2019, Practical defense-in-depth solution for microservice systems, J. Ubiquit. Syst. Pervasive Netw., 11, 17, 10.5383/JUSPN.11.01.003 Torkura, 2018, Cavas: Neutralizing application and container security vulnerabilities in the cloud native era, 471 Chen, 2019, Informer: Irregular traffic detection for containerized microservices rpc in the real world, 389 Torkura, 2017, Integrating continuous security assessments in microservices and cloud native applications, 171 Akkermans, 2018, Polyglot cerberos: Resource security, interoperability and multi-tenancy for iot services on a multilingual platform, 59 Guija, 2018, Identity and access control for micro-services based 5g nfv platforms, 46:1 Li, 2019, Towards automated inter-service authorization for microservice applications, 3 Márquez, 2019, Identifying availability tactics to support security architectural design of microservice-based systems, 123 Ibrahim, 2019, Attack graph generation for microservice architecture, 1235 Stallenberg, 2019, Jcomix: A search-based tool to detect xml injection vulnerabilities in web applications, 1090 Krämer, 2019, Implementing secure applications in smart city clouds using microservices, Future Gener. Comput. Syst., 99, 308, 10.1016/j.future.2019.04.042 Jander, 2018, Defense-in-depth and role authentication for microservice systems, Procedia Comput. Sci., 130, 456, 10.1016/j.procs.2018.04.047 Abidi, 2019, A web service security governance approach based on dedicated micro-services, Procedia Comput. Sci., 159, 372, 10.1016/j.procs.2019.09.192 Elsayed, 2019, Offering security diagnosis as a service for cloud saas applications, J. Inf. Secur. Appl., 44, 32 Mavroudis, 2017, A touch of evil: High-assurance cryptographic hardware from untrusted components, 1583 Vale, 2019, An ontology for security patterns, 1 IBM, 2016 Kindervag, 2012 Zhuang, 2014, Towards a theory of moving target defense, 31 Merkel, 2014, Docker: lightweight linux containers for consistent development and deployment, Linux J., 2014, 2