Artificial Intelligence based Microservices Pod configuration Management Systems on AWS Kubernetes Service

Authors

  • Amarjeet Singh School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India
  • Alok Aggarwal School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India

Keywords:

Microservice, Cloud Migration, Containerization Distributed Systems, Microservice Security

Abstract

Microservice architectures (MSA) have become very beneficial for development paradigms to provide time to market for every business. Microservices have evolved as an architectural design pattern.  They resolve several old-fashioned development issues like availability, horizontal and vertical scaling, scalability, and ease the maintenance of online services. On the contrary, there are several security breaches have been identified. These breaches have eventually enforced software industry and businesses to reanalysis and redesign the security architecture, remove all security threats, and sustain the confidentiality of microservice-based systems.

Micro service containers or PODS one of the most used standards for software application development. a well containerized application includes  its libraries, and configuration bundled into one package and ready to be deployed anywhere on cloud platform.

By containerizing the application and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Therefore, applications developed using containers can be easily deployed in different computing environments. This is particularly important when an application is expected to be deployed in multiple, hybrid cloud environments.

However, some characteristics of containers make them hard to manage. For example, containers typically have a short lifespan and are dynamically deployed and scaled. To manage containers, Kubernetes, the de facto standard container orchestration tool, was developed to ease the complexity of running containers. It was originally created by Google but is now an open-source project with worldwide contributors. There are several essential features in Kubernetes for cloud-native applications:

We studied and researched several pieces of literature over the web and found a few of them addressing security breaches, and a pragmatic strategy to implement security mechanisms. The aim of this study is to provide a mindful strategy on the detection of all the possible threats on microservices and mitigated or prevented by a potential research gap in securing MSA Method. In this paper, we conducted a systematic real time practical approach to identify the secured and unsecured protocols for microservices deployed in cloud environment. Therefore, we extracted threats and details of proposed solutions reported in selected studies. Obtained results are used to redesign the cloud security.

The systematic results we have taken from 150 microservices and found 80% of them unsecured and unprotected. Additionally, we developed solutions which will automatically identify the security issues and automatically replace the ports with secured ones and apply the security tokens Conclusion. More research is needed for identifying the security issues in cloud and replace the unsecured firewalls with the secured one. We recommend that more research on DDOS attacks, Semantic security techniques and research on SSL layers and securing them through DevOps and CI/CD deployment

References

Hou Q., Ma Y., Chen J., and Xu Y., “An Empirical Study on Inter-Commit Times in SVN,” Int. Conf. on Software Eng. and Knowledge Eng.,” pp. 132–137, 2014.

O. Arafat, and D. Riehle, “The Commit Size Distribution of Open Source Software,” Proc. the 42nd Hawaii Int’l Conf. Syst. Sci. (HICSS’09), USA, pp. 1-8, 2009.

C. Kolassa, D. Riehle, and M. Salim, “A Model of the Commit Size Distribution of Open Source,” Proc. the 39th Int’l Conf. Current Trends in Theory and Practice of Comput. Sci. (SOFSEM’13), Czech Republic, pp. 52–66, 2013.

L. Hattori and M. Lanza, “On the nature of commits,” Proc. the 4th Int’l ERCIM Wksp. Softw. Evol. and Evolvability (EVOL’08), Italy, pp. 63–71, 2008.

P. Hofmann, and D. Riehle, “Estimating Commit Sizes Efficiently,” Proc. the 5th IFIP WG 2.13 Int’l Conf. Open Source Systems (OSS’09), Sweden, pp. 105–115, 2009.

Kolassa C., Riehle, D., and Salim M., “A Model of the Commit Size Distribution of Open Source,” Proceedings of the 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’13), Springer-Verlag, Heidelberg, Baden-Württemberg, p. 5266, Jan. 26-31, 2013.

Arafat O., and Riehle D., “The Commit Size Distribution of Open Source Software,” Proceedings of the 42nd Hawaii International Conference on Systems Science (HICSS’09),” IEEE Computer Society Press, New York, NY, pp. 1-8, Jan. 5-8, 2009.

R. Purushothaman, and D.E. Perry, “Toward Understanding the Rhetoric of Small Source Code Changes,” IEEE Transactions on Software Engineering, vol. 31, no. 6, pp. 511–526, 2005.

A. Singh, V. Singh, A. Aggarwal and S. Aggarwal, "Improving Business deliveries using Continuous Integration and Continuous Delivery using Jenkins and an Advanced Version control system for Microservices-based system," 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 2022, pp. 1-4, doi: 10.1109/IMPACT55510.2022.10029149.

A. Alali, H. Kagdi, and J. Maletic, “What’s a Typical Commit? A Characterization of Open Source Software Repositories,” Proc. the 16th IEEE Int’l Conf. Program Comprehension (ICPC’08), Netherlands, pp. 182-191, 2008.

A. Hindle, D. Germán, and R. Holt, “What do large commits tell us?: a taxonomical study of large commits,” Proc. the 5th Int’l Working Conf. Mining Softw. Repos. (MSR’08), Germany, pp. 99-108, 2008.

V. Singh, M. Alshehri, A. Aggarwal, O. Alfarraj, P. Sharma et al., "A holistic, proactive and novel approach for pre, during and post migration validation from subversion to git," Computers, Materials & Continua, vol. 66, no.3, pp. 2359–2371, 2021.

Vinay Singh, Alok Aggarwal, Narendra Kumar, A. K. Saini, “A Novel Approach for Pre-Validation, Auto Resiliency & Alert Notification for SVN To Git Migration Using Iot Devices,” PalArch’s Journal of Arch. of Egypt/Egyptology, vol. 17 no. 9, pp. 7131 – 7145, 2020.

Vinay Singh, Alok Aggarwal, Adarsh Kumar, and Shailendra Sanwal, “The Transition from Centralized (Subversion) VCS to Decentralized (Git) VCS: A Holistic Approach,” Journal of Electrical and Electronics Engineering, ISSN: 0974-1704, vol. 12, no. 1, pp. 7-15, 2019.

Ma Y., Wu Y., and Xu Y., “Dynamics of Open-Source Software Developer’s Commit Behavior: An Empirical Investigation of Subversion,” Proceedings of the 29th Annual ACM Symposium on Applied Computing (SAC’14), pp. 1171-1173, doi: 10.1145/2554850.2555079, 2014.

M. Luczak-R¨osch, G. Coskun, A. Paschke, M. Rothe, and R. Tolksdorf, “Svont-version control of owl ontologies on the concept level.” GI Jahrestagung (2), vol. 176, pp. 79–84, 2010.

E. Jim´enez-Ruiz, B. C. Grau, I. Horrocks, and R. B. Llavori, “Contentcvs: A cvs-based collaborative ontology engineering tool.” in SWAT4LS. Citeseer, 2009.

I. Zaikin and A. Tuzovsky, “Owl2vcs: Tools for distributed ontology development.” in OWLED. Citeseer, 2013.

Downloads

Published

19-01-2023

How to Cite

[1]
A. Singh and A. Aggarwal, “Artificial Intelligence based Microservices Pod configuration Management Systems on AWS Kubernetes Service”, J. of Art. Int. Research, vol. 3, no. 1, pp. 24–37, Jan. 2023.