Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1036
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kalubowila, D. C | - |
dc.contributor.author | Athukorala, S. M | - |
dc.contributor.author | Tharaka, B. A. S | - |
dc.contributor.author | Samarasekara, H. W. Y. R | - |
dc.contributor.author | Samaratunge Arachchilage, U. S. S | - |
dc.contributor.author | Kasthurirathna, D | - |
dc.date.accessioned | 2022-02-08T10:49:56Z | - |
dc.date.available | 2022-02-08T10:49:56Z | - |
dc.date.issued | 2021-12-09 | - |
dc.identifier.citation | D. C. Kalubowila, S. M. Athukorala, B. A. S. Tharaka, H. W. Y. R. Samarasekara, U. S. S. Samaratunge Arachchilage and D. Kasthurirathna, "Optimization of Microservices Security," 2021 3rd International Conference on Advancements in Computing (ICAC), 2021, pp. 49-54, doi: 10.1109/ICAC54203.2021.9671131. | en_US |
dc.identifier.isbn | 978-1-6654-0862-2 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1036 | - |
dc.description.abstract | Microservices is a trending architecture, and due to its demanding features and behaviors, billions of business applications are developed based on it. Due to its remarkable ability to deploy and coordinate containerized microservices, Kubernetes deployments support the service mesh architectures, and that ensures secured inter-service communication. The Istio is the widely used service mesh tool at present. However, service-to-service communication happens in the present Istio architecture, and there is a probability of exchanging unauthorized and over-provisioned requests due to incorrect implementation. Currently, these requests are verified within the upstream microservice. Obtaining a response to an erroneous request may take considerable time latency. This research thereby aims to address a solution to reduce the latency of a response by implementing an external validation model. The proposed external validation model ensures that the required parameters are validated and actions are taken before requests reach the service level. External validation enables applications to save significant time and resources. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2021 3rd International Conference on Advancements in Computing (ICAC);Pages 49-54 | - |
dc.subject | Optimization | en_US |
dc.subject | Microservices Security | en_US |
dc.title | Optimization of Microservices Security | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC54203.2021.9671131 | en_US |
Appears in Collections: | Department of Computer systems Engineering-Scopes Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Optimization_of_Microservices_Security.pdf Until 2050-12-31 | 3.6 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.