PROTECTION SYSTEM OF MICROSERVICE SYSTEMS
Keywords:
microservice systems, security systems, distributed systems, authentication, role modelAbstract
The article provides an overview of the security system for microservices. As methods used by this system, tools such as HTTPS, JWT, OAuth2, RM, TOTP were considered. The implementation is performed using the Java programming language
References
Matt C. Digital Transformation Strategies / C. Matt, T. Hess, A. Benlian. // Business & Information Systems Engineering. – 2015. – №57. – С. 339–343.
Newman S. Building Microservices / Sam Newman. – Sebastopol, CA: O’Reilly Media, Inc., 2015. – 472 с.
Evaluating the monolithic and the microservice architecturepattern to deployweb applications in the cloud [Електронний ресурс] / V.Mario, O. Garcés, H. Castro,S. Gil.–2015.–Режим доступу до ресурсу: https://www.researchgate.net/ publication/304317852_Evaluating_the_monolithic_and_the_microservice_architectur e_pattern_to_deploy_web_applications_in_the_cloud.
Wootton B. Microservices-Not A Free Lunch! [Електронний ресурс]/Benjamin Wootton.–2014.–Режим доступу до ресурсу: http://highscalability.com/blog/2014/4/8/microservices-not-a-free-lunch.html.
Y. Sun, S. Nanda and T. Jaeger,"Security-as-a-Service for MicroservicesBased Cloud Applications," 2015 IEEE 7th International Conference on CloudComputing Technology and Science (CloudCom), Vancouver, BC, 2015, pp. 50-57.
Mirko Novakovic. Introducing Dynamic Focus for Application Performance Management [Електронний ресурс] / Mirko Novakovic. – 2017. – Режим доступу до ресурсу: https://www.instana.com/blog/introducing-dynamicfocus-application-performance-management/.
E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3 / E. Rescorla. – Mozilla: IETF, 2018. – 160 с.
В. Л. Цирлов. Основы информационной безопасности автоматизированных систем / В.Л. Цирлов., 2008. – 119 с.
D. Hardt, Ed. The OAuth 2.0 Authorization Framework / D. Hardt, Ed.., 2012. – 76 с.
Sebastián E. Peyrott. The JWT Handbook / Sebastián E. Peyrott., 2017. – 85 с.
TOTP: Time-Based One-Time Password Algorithm / D. M'Raihi, S. Machani, M. Pei та ін.]., 2011. – 16 с. 12. HOTP: An HMAC-Based One-Time Password Algorithm / D. M'Raihi, M. Bellare, F. Hoornaert та ін., 2005. - 37 c.