2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR) 2021
DOI: 10.1109/hpsr52026.2021.9481820
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure and Leak-Free Workflows Using Microservice Isolation

Abstract: Companies like Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with other companies, and can be modeled as workflows. This shift towards the cloud environment has led to more and more data leaks and breaches, resulting in huge losses of money for businesses like the movie industry, as well as a loss of user privacy for businesses dealing with user data like the pharmaceutical industry.In this paper, we show how those workflows can be enforced wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 17 publications
1
7
0
Order By: Relevance
“…This work is merges and extends two of our previous papers [4,5] published in the IEEE 22nd International Conference on High-Performance Switching and Routing (HPSR 2021) conference. The contributions of our paper are as follows:…”
Section: Approach and Contributionssupporting
confidence: 73%
See 1 more Smart Citation
“…This work is merges and extends two of our previous papers [4,5] published in the IEEE 22nd International Conference on High-Performance Switching and Routing (HPSR 2021) conference. The contributions of our paper are as follows:…”
Section: Approach and Contributionssupporting
confidence: 73%
“…To solve this issue, we aim to achieve a secure system enabling the exchange of data between non-trusted agents in the context of workflows. To this end, we combine two of our previous works [4,5] in this work. The first one describes an infrastructure to deploy a workflow securely in the cloud using microservices and how to verify the implemented policy is enforced, while the second details a way to verify the implementation of the policy corresponds to its specification.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to our research, they consider inter-service communication a critical security aspect. A more datacentric security approach is pursued by Miller et al [2], where the authors argue that leaking data can pose an enormous financial risk for companies and accordingly present a security architecture to prevent these data exposures while still enforcing the required business workflows. Shu et al [14] introduce a method to detect sensitive data exposure in microservice systems by preserving data privacy.…”
Section: Related Workmentioning
confidence: 99%
“…They are actively developed and utilize many best-practices implementations used among other systems. Several authors have also identified data leaks and breaches as a significant problem in microservice architectures (see, for instance, [2,6] or [14]). Therefore, our research provides a significant contribution to reducing the damage caused by these leaks.…”
Section: Threats To Validitymentioning
confidence: 99%
See 1 more Smart Citation