Artificial Intelligence based Microservices Pod configuration Management Systems on AWS Kubernetes Service
Keywords:
Microservice, Cloud Migration, Containerization Distributed Systems, Microservice SecurityAbstract
Microservice architectures (MSA) have become very beneficial for development paradigms to provide time to market for every business. Microservices have evolved as an architectural design pattern. They resolve several old-fashioned development issues like availability, horizontal and vertical scaling, scalability, and ease the maintenance of online services. On the contrary, there are several security breaches have been identified. These breaches have eventually enforced software industry and businesses to reanalysis and redesign the security architecture, remove all security threats, and sustain the confidentiality of microservice-based systems.
Micro service containers or PODS one of the most used standards for software application development. a well containerized application includes its libraries, and configuration bundled into one package and ready to be deployed anywhere on cloud platform.
By containerizing the application and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Therefore, applications developed using containers can be easily deployed in different computing environments. This is particularly important when an application is expected to be deployed in multiple, hybrid cloud environments.
However, some characteristics of containers make them hard to manage. For example, containers typically have a short lifespan and are dynamically deployed and scaled. To manage containers, Kubernetes, the de facto standard container orchestration tool, was developed to ease the complexity of running containers. It was originally created by Google but is now an open-source project with worldwide contributors. There are several essential features in Kubernetes for cloud-native applications:
We studied and researched several pieces of literature over the web and found a few of them addressing security breaches, and a pragmatic strategy to implement security mechanisms. The aim of this study is to provide a mindful strategy on the detection of all the possible threats on microservices and mitigated or prevented by a potential research gap in securing MSA Method. In this paper, we conducted a systematic real time practical approach to identify the secured and unsecured protocols for microservices deployed in cloud environment. Therefore, we extracted threats and details of proposed solutions reported in selected studies. Obtained results are used to redesign the cloud security.
The systematic results we have taken from 150 microservices and found 80% of them unsecured and unprotected. Additionally, we developed solutions which will automatically identify the security issues and automatically replace the ports with secured ones and apply the security tokens Conclusion. More research is needed for identifying the security issues in cloud and replace the unsecured firewalls with the secured one. We recommend that more research on DDOS attacks, Semantic security techniques and research on SSL layers and securing them through DevOps and CI/CD deployment
References
Hou Q., Ma Y., Chen J., and Xu Y., “An Empirical Study on Inter-Commit Times in SVN,” Int. Conf. on Software Eng. and Knowledge Eng.,” pp. 132–137, 2014.
O. Arafat, and D. Riehle, “The Commit Size Distribution of Open Source Software,” Proc. the 42nd Hawaii Int’l Conf. Syst. Sci. (HICSS’09), USA, pp. 1-8, 2009.
C. Kolassa, D. Riehle, and M. Salim, “A Model of the Commit Size Distribution of Open Source,” Proc. the 39th Int’l Conf. Current Trends in Theory and Practice of Comput. Sci. (SOFSEM’13), Czech Republic, pp. 52–66, 2013.
L. Hattori and M. Lanza, “On the nature of commits,” Proc. the 4th Int’l ERCIM Wksp. Softw. Evol. and Evolvability (EVOL’08), Italy, pp. 63–71, 2008.
P. Hofmann, and D. Riehle, “Estimating Commit Sizes Efficiently,” Proc. the 5th IFIP WG 2.13 Int’l Conf. Open Source Systems (OSS’09), Sweden, pp. 105–115, 2009.
Kolassa C., Riehle, D., and Salim M., “A Model of the Commit Size Distribution of Open Source,” Proceedings of the 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’13), Springer-Verlag, Heidelberg, Baden-Württemberg, p. 5266, Jan. 26-31, 2013.
Arafat O., and Riehle D., “The Commit Size Distribution of Open Source Software,” Proceedings of the 42nd Hawaii International Conference on Systems Science (HICSS’09),” IEEE Computer Society Press, New York, NY, pp. 1-8, Jan. 5-8, 2009.
R. Purushothaman, and D.E. Perry, “Toward Understanding the Rhetoric of Small Source Code Changes,” IEEE Transactions on Software Engineering, vol. 31, no. 6, pp. 511–526, 2005.
A. Singh, V. Singh, A. Aggarwal and S. Aggarwal, "Improving Business deliveries using Continuous Integration and Continuous Delivery using Jenkins and an Advanced Version control system for Microservices-based system," 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 2022, pp. 1-4, doi: 10.1109/IMPACT55510.2022.10029149.
A. Alali, H. Kagdi, and J. Maletic, “What’s a Typical Commit? A Characterization of Open Source Software Repositories,” Proc. the 16th IEEE Int’l Conf. Program Comprehension (ICPC’08), Netherlands, pp. 182-191, 2008.
A. Hindle, D. Germán, and R. Holt, “What do large commits tell us?: a taxonomical study of large commits,” Proc. the 5th Int’l Working Conf. Mining Softw. Repos. (MSR’08), Germany, pp. 99-108, 2008.
V. Singh, M. Alshehri, A. Aggarwal, O. Alfarraj, P. Sharma et al., "A holistic, proactive and novel approach for pre, during and post migration validation from subversion to git," Computers, Materials & Continua, vol. 66, no.3, pp. 2359–2371, 2021.
Vinay Singh, Alok Aggarwal, Narendra Kumar, A. K. Saini, “A Novel Approach for Pre-Validation, Auto Resiliency & Alert Notification for SVN To Git Migration Using Iot Devices,” PalArch’s Journal of Arch. of Egypt/Egyptology, vol. 17 no. 9, pp. 7131 – 7145, 2020.
Vinay Singh, Alok Aggarwal, Adarsh Kumar, and Shailendra Sanwal, “The Transition from Centralized (Subversion) VCS to Decentralized (Git) VCS: A Holistic Approach,” Journal of Electrical and Electronics Engineering, ISSN: 0974-1704, vol. 12, no. 1, pp. 7-15, 2019.
Ma Y., Wu Y., and Xu Y., “Dynamics of Open-Source Software Developer’s Commit Behavior: An Empirical Investigation of Subversion,” Proceedings of the 29th Annual ACM Symposium on Applied Computing (SAC’14), pp. 1171-1173, doi: 10.1145/2554850.2555079, 2014.
M. Luczak-R¨osch, G. Coskun, A. Paschke, M. Rothe, and R. Tolksdorf, “Svont-version control of owl ontologies on the concept level.” GI Jahrestagung (2), vol. 176, pp. 79–84, 2010.
E. Jim´enez-Ruiz, B. C. Grau, I. Horrocks, and R. B. Llavori, “Contentcvs: A cvs-based collaborative ontology engineering tool.” in SWAT4LS. Citeseer, 2009.
I. Zaikin and A. Tuzovsky, “Owl2vcs: Tools for distributed ontology development.” in OWLED. Citeseer, 2013.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.