Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

The world with future technologies (Post-COVID-19): open issues, challenges, and the road ahead

AVS Madhav, AK Tyagi - Intelligent Interactive Multimedia Systems for e …, 2022 - Springer
Over the past few months, we faced a serious pandemic throughout the world that shuts
down the entire country for several weeks at a time. Employees belonging to different …

Kubernetes as a standard container orchestrator-a bibliometric analysis

C Carrión - Journal of Grid Computing, 2022 - Springer
Container orchestration systems simplify the deployment and maintenance of container-
based applications, but developing efficient and well-defined orchestration systems is a …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study

A Chatterjee, A Prinz - Sensors, 2022 - mdpi.com
In this study, we implemented an integrated security solution with Spring Security and
Keycloak open-access platform (SSK) to secure data collection and exchange over …

Service mesh and ebpf-powered microservices: A survey and future directions

MRS Sedghpour, P Townend - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Modern software development practice has seen a profound shift in architectural design,
moving from monolithic approaches to distributed, microservice-based architectures. This …

Api security in large enterprises: Leveraging machine learning for anomaly detection

G Baye, F Hussain, A Oracevic… - 2021 international …, 2021 - ieeexplore.ieee.org
Large enterprises offer thousands of micro-services applications to support their daily
business activities by using Application Programming Interfaces (APIs). These applications …

Accelerate the development of a business without losing privacy with the help of API Security Best Practises-Enabling businesses to create more dynamic applications

VV Vegesna - International Journal of Management, Technology …, 2022 - papers.ssrn.com
APIs are a strategic necessity to give your business the agility, innovation and speed
needed to succeed in today's business environment. However, the financial incentive …

[HTML][HTML] S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud

C Han, T Kim, W Lee, Y Shin - Electronics, 2024 - mdpi.com
In cloud services, the zero-trust security paradigm has emerged as a key strategy to reduce
the large attack surface created by the complexity of cloud systems. Service mesh is a …

Towards secure and leak-free workflows using microservice isolation

L Miller, P Mérindol, A Gallais… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
Companies like Netflix increasingly use the cloud to deploy their business processes. Those
processes often involve partnerships with other companies, and can be modeled as …