2022
DOI: 10.1155/2022/7146716
|View full text |Cite
|
Sign up to set email alerts
|

A Microservice Resilience Deployment Mechanism Based on Diversity

Abstract: The microservice architecture has many advantages, such as technology heterogeneity, isolation, scalability, simple deployment, and convenient optimization. These advantages are important as we can use diversity and redundancy to improve the resilience of software system. It is necessary to study the method of improving the resilience of software system by diversity implementation and redundant deployment of software core components based on microservice framework. How to optimize the diversity deployment of m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…It covers authentication, e.g., using Mutual Transport Layer Security (mTLS) and authorization, secure communication between services, e.g., using encrypted channels, and other securityrelated topics like service discovery, communication within a Service Mesh, the Sidecar Pattern [18], network segmentation and firewalls, and intrusion detection. The use of orchestration and container technologies, such as Kubernetes [19] and Docker [20], can increase the complexity of managing microservices and extend the range of potential attacks to include third-party vulnerabilities and other related issues [13,21,22]. The implementation of dedicated patterns, such as the Token Pattern [11], the API Gateway Pattern, and the use of a Service Mesh, are particularly effective in enforcing security measures within microservices [1,2].…”
Section: ) Perspectives On Microservice Securitymentioning
confidence: 99%
“…It covers authentication, e.g., using Mutual Transport Layer Security (mTLS) and authorization, secure communication between services, e.g., using encrypted channels, and other securityrelated topics like service discovery, communication within a Service Mesh, the Sidecar Pattern [18], network segmentation and firewalls, and intrusion detection. The use of orchestration and container technologies, such as Kubernetes [19] and Docker [20], can increase the complexity of managing microservices and extend the range of potential attacks to include third-party vulnerabilities and other related issues [13,21,22]. The implementation of dedicated patterns, such as the Token Pattern [11], the API Gateway Pattern, and the use of a Service Mesh, are particularly effective in enforcing security measures within microservices [1,2].…”
Section: ) Perspectives On Microservice Securitymentioning
confidence: 99%