Abstract
Over the past few years, the paradigm shift towards cloud computing has transformed and revolutionized how organizations manage high- performance workloads. The microservices architecture, renowned for its modularity and scalability, is increasingly being adopted to run these workloads in cloud environments. However, this transition is not without its challenges, particularly in security. This research article delves into the methods for securely running high-performance workloads as microservices in cloud environments, presenting the advantages and the challenges involved. The study aims to develop a comprehensive framework that not only addresses these security concerns but also optimizes performance, a crucial aspect in today's digital landscape. This research is a testament to our commitment to thoroughness and precision, as it combines both qualitative and quantitative approaches. Qualitative data were meticulously gathered through interviews with 15 cloud security experts, providing invaluable insights into prevalent security practices and challenges. Quantitative data, on the other hand, were collected from performance benchmarks that rigorously compared traditional monolithic applications with microservices- based applications in a cloud setting. The study employs robust statistical analysis tools such as SPSS and Grafana to analyze the collected data, ensuring the validity and reliability of our findings. Key interview findings highlighted critical security measures necessary for microservices, including service authentication, data encryption, and vulnerability management. The performance benchmarks revealed that microservices- based applications significantly outperformed monolithic applications, with notable improvements in CPU utilization, memory usage, and response time. For instance, the microservices architecture demonstrated a 21% reduction in CPU utilization and a 12% decrease in memory usage compared to its monolithic counterpart. The proposed framework integrates robust security practices, ensuring secure authentication, encrypted data transmission, and regular updates to mitigate vulnerabilities. This framework enhances security and optimizes resource allocation, leading to improved performance metrics.
Publisher
International Journal of Innovative Science and Research Technology
Reference42 articles.
1. Burns, B., Grant, B., Oppenheimer, D., Brewer, E., & Wilkes, J. (2016). Borg, Omega, and Kubernetes. Communications of the ACM, 59(5), 50-57.
2. Fowler, M., & Lewis, J. (2014). Microservices: a definition of this new architectural term. martinfowler.com. Retrieved from https://martinfowler.com/articles/microservices.html
3. Jansen, W., & Grance, T. (2011). Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication 800-144.
4. Newman, S. (2015). Building Microservices: Designing Fine-Grained Systems. O'Reilly Media.
5. NIST. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献