Skip to main content
PeerJ Computer Science logoLink to PeerJ Computer Science
. 2022 Jan 5;8:e779. doi: 10.7717/peerj-cs.779

Microservice security: a systematic literature review

Davide Berardi 1, Saverio Giallorenzo 1,2, Jacopo Mauro 3, Andrea Melis 1, Fabrizio Montesi 3, Marco Prandini 1,
Editor: Wenbing Zhao
PMCID: PMC8771803  PMID: 35111904

Abstract

Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.

Keywords: Threat model, Software development, Infrastructure-as-a-service, Service deployment, Service composition, Service discovery, Privacy, Authentication, Intrusion detection and prevention, Authentication and authorization

Introduction

Microservices is an emerging development paradigm, where software is built as a composition of multiple services (the “microservices”). Each microservice implements the business logic of a component of the application and is independently executable and deployable. Microservices interact with each other via message-passing APIs (Dragoni et al., 2017).

Over the last 6 years, microservices have become a popular topic and one of the go-to approaches for many cloud computing projects. According to Web of Science, more than 1,000 articles about microservices have been published since 2014. The year 2020 accounts for more than 400 of them, which points out that interest in the topic is still rising. Microservices are popular because they bring substantial advantages with respect to scalability in cloud environments and flexibility in the process of software development. By separating application components as independent services, software designers can specialise each component by using a dedicated technology and then integrate all such heterogeneous components via technology-agnostic APIs.

Alas, the advantages of microservices come at a cost: distributed systems are hard to manage, and increasing the number of services of an application gives malicious actors a larger attack surface (Dragoni et al., 2017). Several security concerns that are particularly relevant for microservices have been identified by Chandramouli (2019), and early research has already shown that the application of standard patterns for system reliability needs to take new parameters into consideration—like the locations at which the patterns are deployed (Montesi & Weber, 2018).

The importance of security in microservices creates the need for understanding and analysing the state of the art for securing this kind of architectures. It is particularly important to understand which problems are especially relevant for microservice systems, and how existing techniques can contribute to addressing them. However, there is still a lack of systematic investigations of studies at the intersection of security and microservice architectures.

Here, we aim to fill that gap by presenting a systematic review of the state of the art of microservice security. We followed a structured approach, which led us to select and gather 290 peer-reviewed publications. At the time of this writing, this constitutes the largest curated dataset on the topic. We first perform a quantitative analysis on the metadata of the publications, for example, publication outlets and keywords. This provides insight into the communities and key research concepts that currently characterise the field. We then map each publication to a vector of 20 different markers, corresponding to 20 research questions on microservices security that we formulated based on established security techniques and the field of microservices as a whole.

Our research questions focused on threat models, security approaches, infrastructure, and development approach. We perform correlation analysis to show that our questions are well-posed (independence), and also to confirm that some topics correlate positively (e.g., Intrusion Detection and Intrusion Prevention, and Agile Development and DevOps as well). Findings from our analysis include: issues with technology transfer from academia to industry on microservices security; lack of guidelines for adopting security by design in microservices; lack of appropriate threat models; lack of guidelines for addressing the attack surface given by technology heterogeneity; and security issues when migrating systems to microservices. Our data, findings, and discussions form a useful basis for orienting future developments of the field.

In summary, the main contributions of this work are:

  • the characterisation of Microservices Security as an early-stage, growing research field in need of systematisation and more mature contributions (“Publication Outlets”, “Types of Publications”);

  • the identification of the main research communities on the Microservice Security field and the clustering of authors (Research Communities);

  • a presentation of the trends of the main security attacks involving microservice architectures, both from the points of view of threat model (Threat Model) and mitigation (Security Approach (Mitigation));

  • a report on the current infrastructural security solutions for microservices (Infrastructure) as well as the interaction between the main microservices development approaches (such as DevOps and Agile) and security (Development);

  • a correlation analysis of the answers to our research questions in papers, which sheds light on relationships among the different aspects of microservice security (Correlation between Research Questions);

  • a summary of the main open challenges that emerged from our study, which form a call for action for the community of researchers and practitioners working in the field of microservice security (Discussion and Future Directions).

Structure of the article

We start by providing a summary of related work in “Related Work”. In “Review Method” and “Research Questions” we detail the method we followed to conduct the systematic literature review and the research questions, respectively. We present our results in “Review Results” and we conclude in “Discussion and Future Directions” with a discussion on the outstanding challenges.

Related Work

To the best of our knowledge, the published works that are closest to ours are those by Vale et al. (2019) and Almeida et al. (2017). Vale et al. (2019) present a systematic mapping that identifies the security mechanisms used in microservice-based systems. Contrary to our work, which provides a general overview on the state of the art of microservices security, the authors narrow their focus on cataloguing the security technologies and mechanisms adopted by developers of microservice-based systems—e.g., authentication and authorisation—leaving out other subjects related to security, like threat models and development methods. Similarly to Vale et al. (2019), Almeida et al. (2017) concentrate on surveying the technologies and standards for security, privacy, and communication used in the area of microservice architectures in the cloud.

Extending our view to articles that, at the time of this writing, are not available as peer-reviewed publications, we mention the work by Hannousse & Yahiouche (2020) and Ponce et al. (2021). Hannousse & Yahiouche (2020) present a systematic categorisation of threats on microservice architectures and propose a selection of possible mitigations. Ponce et al. (2021) look at how “security smells” affect microservice-based applications and how to mitigate the effects of such smells through refactoring. As for the proposals by Vale et al. (2019) and Almeida et al. (2017), the difference between our work and Hannousse & Yahiouche (2020) lies on generality: Hannousse and Yahiouche narrow their investigation down to the threats identified in the literature. Similarly, the work of Ponce et al. (2021) focuses on the programming of microservices.

In addition to the related work discussed above, there are quite a few neighbouring surveys with respect to our work that are interesting to discuss: while these studies are not dedicated to the topic of microservice security, they explicitly mention security as an important concern for microservices in different contexts—software engineering, Internet of Things, containerisation, etc. The purpose of reviewing neighbouring related work is twofold:

  1. It shows the multifaceted nature of microservice security, giving concrete evidence of the need for an investigation which is both wider and deeper, as we do in this work.

  2. It provides a general overview of the challenges and possible uncovered research topics related to security in microservices—which inspired some of the questions presented in “Review Method”.

Dragoni et al. (2017) present an overview of microservices, including a discussion of the origins of the paradigm, its state of the art, and future challenges. They identify a number of trust and security challenges posed by the paradigm. We mention a few examples. Service reuse, one of the key benefits pushed for in the microservice paradigm, requires adopting secure mechanisms for service authentication and authorisation. The increased granularity and heterogeneity of microservice architectures extends considerably the attack surface of these systems. The sophisticated DevOps infrastructure required to operate microservices effectively is a new attack vector.

Garriga (2017) conducted a preliminary analysis towards a taxonomy of microservices architectures. While not addressing in particular security concerns, Garriga reports that the security subject is not extensively addressed, highlighting how monitoring and microservice communication trust chains should receive particular attention.

Joseph & Chandrasekaran (2019) reviewed approaches proposed in the literature to deal with the various concerns of microservice-based systems. The authors mention the large attack area offered by microservices subject to insider/privilege-escalation attacks and network security issues.

Casale et al. (2016) surveyed the topics of European research projects in the area of software engineering. Regarding microservices security, they highlight four main challenges: increasing the usage of software validation and verification methods; improving the trust and interoperability of services through (self/federated)-certification of outputs based on standards; adopting a security-by-design approach on the whole software lifecycle; and helping developers with addressing discontinuities in the chain of compositionality between services and execution environments—e.g., due to data leakages derived from fragile container-host interactions.

Lichtenthäler et al. (2019) investigate and discuss the challenges of migrating monoliths to microservices. They observe that security should be part of the migration planning phase to begin with, and that developers need models and frameworks to help them elicit, track, and manage the (frequently implicit) assumptions and invariants induced by the migration of the legacy system. These observations are shared with Di Francesco, Malavolta & Lago (2017), who suggest that the microservice architectural style has a direct impact on the design of a system and that researchers are still investigating how to leverage its characteristics with respect to system quality and security. Di Francesco, Malavolta & Lago (2017) note that there exists uncertainty about the realisation of microservices, indicating the need for comprehensive references to help programmers in the multifaceted aspects of microservice development.

Noura, Atiquzzaman & Gaedke (2019) address the open challenges of interoperability in the Internet of Things (IoT), noting how microservices can constitute a solution for the programming of highly distributed IoT networks and provide two decades worth of research and industrial experience to tackle interoperability in heterogeneous systems. Regarding the general security of IoT systems, Noura, Atiquzzaman & Gaedke (2019) note the emergence of security issues (e.g., authentication and access control) when system design permits direct access to resource-constrained devices. Reviewing the many solutions and levels at which IoT interoperability can be tackled, Noura, Atiquzzaman & Gaedke (2019) note the challenge of both maintaining and guaranteeing the same level of security when mediating among different technologies.

Márquez & Astudillo (2019) examine microservice availability tactics to detect, prevent, mitigate, and recover from faults. They highlight how the tactics for the availability of microservices mainly focus on preventing faults, whereas detection, reaction, and recovery are scarcely addressed. Commenting on related challenges, Márquez & Astudillo (2019) report a deficit of solutions to support the restoration of normal functionalities after a microservice architecture suffered from some faults.

Ahmed et al. (2019) surveyed robust and flexible service management platforms for IoT systems. Like Noura, Atiquzzaman & Gaedke (2019), they identify microservice architectures as the most suitable architectural pattern to handle the heterogeneity of IoT systems and that the foremost challenge in the field is the robust integration of different technologies. Ahmed et al. (2019) also report how conventional security solutions and practices are not suitable to handle the expansion, mobility, resource constraints, and new security requirements of the considered systems.

Cerny & Donahoo (2016) investigate service integration from the perspective of separation of concerns and identify problems with conventional service integration design/technologies. They report that the lack of proper cross-cutting concerns in programming technologies make it difficult to capture and guarantee that invariants of a given microservice—specifically, on security—hold when paired with integration components.

Yang et al. (2014) survey how cloud computing systems can help scientific research. In their report, they notice how the (micro)service paradigm is useful to make resources available to collaborating researchers by providing a well-defined interface specifying the operations that can be performed on, or with, a given resource. However, they also report that privacy and trust issues are of particular concern to researchers, especially in fields that are processing sensitive data such as medical research. For this, appropriate provenance metadata is required, both to understand how and by whom the data was created and modified, as well as to understand where it has been potentially exposed to corruption. Similar comments are shared also by Plaza, Daz & Pérez (2018) in the context of healthcare cyber-physical systems. In particular, proper encryption is reported as a key component for (real-time) data acquisition.

Soldani, Tamburri & Van Den Heuvel (2018), reviewing the “pains and gains” of microservices in the grey literature, found how security generates pains at design-time. Like Yang et al. (2014), Soldani, Tamburri & Van Den Heuvel (2018) comment that microservice-based applications should support the consistent determination of the provenance and authenticity of data, noting the paradox of that being in contrast with the heavily-distributed nature of microservice systems. Another (meta) observation by Soldani, Tamburri & Van Den Heuvel (2018) is how there is a gap between the industrial understanding and state-of-practice on microservices and the state-of-the-art of academic research, one possible reason being that academics have limited access to industrial-scale microservice-based applications.

Di Francesco, Lago & Malavolta (2019) identify, classify, and evaluate the state of the art on architecting with microservices from the perspectives of publication trends, the focus of research, and potential for industrial adoption. On security, they report that it is attracting insufficient research. The works by Vural, Koyuncu & Guney (2017) and Alshuqayran, Ali & Evans (2016) follow similar modalities and results.

Bélair, Laniepce & Menaud (2019) surveyed security of containers, a technology frequently paired with microservices. They report how container security is still in an early phase and it faces unsolved challenges. The results presented by Bélair, Laniepce & Menaud (2019) match those by Sultan, Ahmad & Dimitriou (2019), who report the presence of a large number of challenges linked to containerisation because OS kernel sharing introduces security issues absent from virtualisation solutions. Sultan, Ahmad & Dimitriou (2019) also highlight the importance of enhancing vulnerability management, digital investigation, and container alternatives.

Puliafito et al. (2019) present a survey on the employment of fog computing to support IoT devices and (micro)services. In their study, they report how security is the largest cross-cutting technical concern within critical IoT systems, which necessitates a common baseline and interoperable standards to address security challenges within both hardware and software. In particular, Puliafito et al. (2019) advocate for solutions to provide a full-stack secure chain of trust from devices to fog/cloud components, which has been only preliminary explored (as remote attestation techniques). Trnka, Černý & Stickney (2018) and Puliafito et al. (2019) report also the importance of addressing the concerns of context-aware security (in IoT systems), especially for authentication and authorisation.

Also Yu et al. (2019) surveyed the literature on microservice-based fog applications to elicit the security risks threatening them. The main threats highlighted include: kernel-level leakage vulnerabilities linked to containerised deployment; man-in-the-middle/insider attacks on data-transmission interception; the need to verify when services become compromised/misbehave; and network-level vulnerabilities on data-routing alteration.

Table 1, shows the differences between these various works, in numerical and boolean terms. As clearly evincible, our work expands previous work by adding a conspicuous amount of analysed publications; using white literature at its roots and following the trend and methods of the main Systematic White Literature Reviews.

Table 1. Summary table and comparison with related works.

For each row/work in the table, we report: its reference; its publication year; its type (systematic literature review (SLR), survey, etc.); the number of publications it encompasses; whether it analyses white (peer reviewed) literature; whether it analyses grey (blog posts, etc.) literature; the sources it used to search its dataset.

Publication Year Type Num. White L. Grey L. Sources
This work 2021 SLR 290 ACM Digital Library
IEEE Xplorer
SpringerLink
Scopus
Science Direct
Wiley
Google Scholar
Vale et al. 2019 SLR 26 ACM Digital Library
IEEE Xplorer
SpringerLink
Science Direct
Wiley
Google Scholar
Almeida et al. 2017 Survey N.A. N.A.
Hannousse & Yahiouche 2020 SLR 46 ACM Digital Library
IEEE Xplorer
SpringerLink
Science Direct
Wiley
Soldani et al. 2018 SLR 51 Google
Bing
Duck Duck Go
Yahoo!
Webopedia

Review Method

In this section, we describe and motivate the steps we followed to perform our systematic review.

Following the guidelines by Snyder (2019), and as depicted in Fig. 1, we started by searching and retrieving the literature for relevant publications from several data sources by using the same keyword query. We then performed a manual revision process of the automatically selected publications to exclude publications out of the scope of this study and perform snowballing—i.e., recursively adding to the dataset relevant publications cited by the already selected publications. The resulting dataset consists of 290 publications. We analysed these publications to collect statistical and transparent answers to our research questions, which are detailed in “Research Questions”.1

Figure 1. Schema of the method followed to gather the dataset for this review.

Figure 1

Selection query and collection of publications

Security in microservices includes complex and heterogeneous topics, ranging from development to infrastructural concerns. In our choice of a selection query to gather an initial dataset, it was important to pick a sufficiently general query. For this reason, we adopted the query “Microservice AND Security” for our initial search, capturing all the publications containing both terms in any of their title, abstract, or body.2

Di Francesco, Lago & Malavolta (2019), Plaza, Daz & Pérez (2018), Soldani, Tamburri & Van Den Heuvel (2018) reported how publications on the topic of Microservice started in 2014. Taking into account this fact, we limited our research to contributions published since 2014. During the 7 years covered by our work, the body of knowledge on this topic has grown significantly. For this reason, we deemed it useful to consider white literature only: in terms of quantity, it represents a very meaningful sample of the research produced during the considered time frame, and in terms of quality, it allowed us to rely on peer review. Thanks to the more uniform organisation of white literature, we are also more confident in the level of consistency of our choice and application of the selection criteria. This is not to say that grey literature is not worth investigating. Blog posts, personal websites, technical reports, white papers, etc., are often the preferred venues for practitioners to share ideas. However, as also pointed out in Soldani (2019), “it is very difficult to uniquely measure the quality of grey literature when conducting a systematic, controllable, and replicable secondary study” and we are not aware of a standard method for the evaluation of grey literature. Analysing the grey literature was beyond the quality goal of this article and we leave it as future work.

Accordingly to this strategy, we collected publications from 6 different publishers, focusing on peer-reviewed publications. We did not, for example, use Google Scholar or arXiv, since they also list resources that are not peer-reviewed. We list the publishers, reporting the respective numbers of publications that matched our query:

This gave us an initial dataset of 1,704 publications in total. We collected publications published up to the 31st of December 2020, using the academic subscriptions provided by the affiliations of the authors—the University of Bologna and the University of Southern Denmark. To guarantee the same level of trustworthiness and authenticity, we retrieved the publications only from the official entries, avoiding external sources such as the authors’ personal websites.

Publications triage

The publications retrieved from the publishers were processed in three steps to check if they should be excluded according to distinct exclusion criteria. Graphically, in Fig. 1, these steps are labelled as 2nd, 3rd, and 4th Step(s).

In the 2nd Step, we looked at whether the keywords “Microservice” and “Security” were used. We excluded a publication if the keywords appeared only in the bibliography. Moreover, we excluded the publication if it was too short (less than two pages), publications not written in English, and duplicate publications already listed in another publisher source.

In the 3rd Step, we looked at the title, abstract, and conclusion of each publication. Publications that do not treat or discuss topics related to microservices and security were excluded. In this step, we also excluded publications in which the security topic was orthogonal or incidental. In this way, we excluded publications where “microservices and security” was one of the possible application scenarios, but not the main subject of the study. We also excluded cases in which the work tangentially mentioned the satisfaction of some security aspects, without detailing the design/development of the security technologies to accomplish them. For example, we excluded publications focusing on blockchain technologies where the authors incidentally mention authentication and integrity protection as inherent security properties of blockchain-based implementations.

In the 4th Step, we performed an analysis of the publications, answering to the research questions (RQ) detailed in Research Questions. No publications were excluded at this step.

At this point, the following publications remained in the dataset (268 in total):

  • ACM, 67 publications;

  • IEEE explore, 59 publications;

  • Springer, 46 publications;

  • Scopus, 28 publications;

  • Science Direct, 53 publications;

  • Wiley, 15 publications.

Snowballing

As the last (5th) step for the systematic literature review, we performed a backward snowballing process (Wohlin, 2014) with the objective of identifying additional relevant references for our study from the works cited by the already selected publications.

All references collected in this way underwent the triage by following the Steps 2, 3, and 4. Each referenced publication accepted for inclusion by these steps was then added to the dataset of selected publications. Snowballing was recursively performed on these newly-added publications until reaching a fixed point; i.e., until no new publications was added to the dataset.

The outcome of repeatedly applying the snowballing process led to the following results:

  • 40 references in the first round, from which we selected 9 publications;

  • 22 references in the second round, from which we selected 8 publications;

  • 5 references in the third round, from which we selected 5 publications;

  • 4 references in the fourth round, where we selected 0 publications.

The 4 cycles of snowballing yielded 22 additional publications that were included in the dataset to reach the final size of 290 publications.

Research Questions

In this section, we detail the research questions that guided our systematic review.

Usually, the research questions for systematic literature reviews are fairly broad and do not amount to more than six. In our case, we chose to adopt more questions (20) but dichotomous (i.e., with yes-or-no answers), to favour precision and objectiveness. To define the questions and seek guidance in categorising the relevant security issues for microservices, we took inspiration from the related work presented “Related Work”, as well as from the state of the art in standards and methods, namely the NIST Special Publication 800-204 “Security Strategies for Microservice-based Application Systems” (Chandramouli, 2019).

Our questions are collected in four macro groups (Gs), each covering a different concern.

  • G1: Threat Model. Questions on threat modelling and how threats are dealt with.

  • G2: Security Approach. Questions on the security approach, e.g., whether it is preventive, adaptive, proactive, or reactive.

  • G3: Infrastructure. Questions on the infrastructure that microservices run on.

  • G4: Development. Questions on the development process.

The questions in each group are reported in the remainder of this section.

First group: threat model

Mapping the usage of threat models is important to see gaps when a security violation must be handled, or if known models are outdated and need to be adjusted. The NIST report, for instance, hints at the importance of identifying the threats looming over a microservices architecture (Chandramouli, 2019). The usage of a formal threat model has proven to be extremely useful in the identification of attack types and their strategic countermeasures (Death, 2017).

Several threat models exist in the literature. The most famous one is STRIDE (Kohnfelder & Garg, 1999) named after the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of privilege security threats. Other threat models however exists, such as PASTA (UcedaVelez & Morana, 2015) or OWASP (OWASP Foundation, 2020).

In our review and with this first group of questions, we aimed to understand whether a publication followed a known model, strategy, or guideline. Alternatively, we wanted to know if new security models were proposed.

This group consists of the following questions.

  • Q1: Does the publication mention STRIDE, or at least consider all of its aspects?

  • Q2: Even without explicitly mentioning STRIDE, does the publication involve at least one of its aspects (Spoofing, Tampering, …)?

  • Q3: If STRIDE aspects or equivalent are considered, does the publication propose/discuss a concrete implementation/solution (either developed by the same author or one taken from the literature)?

  • Q4: Does the publication consider or follow another threat model rather than STRIDE without introducing a new one?

  • Q5: Does the publication mention policies, workflows, or guidelines to handle violations?

In particular, with question Q1 and Q3 we looked for the adoption of STRIDE, being the most popular threat model. In the remaining questions, we investigate if the publication defined some threat model—either from the literature or a newly one introduced in that publication—or at least discussed equivalent principles or guidelines without mentioning STRIDE.

Second group: security approach

Many related works cite the usage of preventive measures to secure microservices (Márquez & Astudillo, 2019; Vale et al., 2019; Garriga, 2017; Almeida et al., 2017; Ahmed et al., 2019; Soldani, Tamburri & Van Den Heuvel, 2018) while some indicate the need for further research in the other directions of proaction, reaction, and adaptation (Vale et al., 2019; Márquez & Astudillo, 2019). With this second block of questions, we wanted to go deeper into the security aspects, considering the specific security approaches, solutions, and also the role that microservices play.

This group consists of the following questions.

  • Q6: Does the publication mention Intrusion Detection System (IDS) functionalities?

  • Q7: Does the publication mention Intrusion Prevention Systems (IPS) functionalities?

  • Q8: Does the publication mention Threat Intelligence?

  • Q9: Does the publication mention Exfiltration Leaks?

  • Q10: Does the publication address Insider Threats?

  • Q11: Are microservices part of the solution?

  • Q12: Are privacy and GDPR considered?

Third group: infrastructure

The NIST report by Chandramouli (2019) dedicates a large part of its content to infrastructural security solutions for microservices. Similarly, the majority of the mentioned related work in “Related Work” presents or at least cites infrastructural solutions for security, acknowledging that the infrastructure of microservice systems is typically complex, encompassing concerns that span from service deployment and service-to-service coordination (discovery, composition, consistency) to the definition of security-specific mechanisms (authorisation, authentication).

In this group of questions, we aimed at finding information on the infrastructure configurations considered in the publication. This group consists of the following questions.

  • Q13: Does the publication specify how the proposed architecture is controlled or managed (e.g., in a centralised, decentralised, or hybrid way)?

  • Q14: Does the publication mention Infrastructure-as-a-Service?

  • Q15: Does the publication mention service discovery?

Fourth group: development

Microservices are often associated with software development practices like DevOps and Agile (Balalaie, Heydarnoori & Jamshidi, 2016; Vadapalli, 2018) which, in turn, are heavily influenced by the inclusion of security-oriented practices (Casale et al., 2016; Lichtenthäler et al., 2019; Cerny & Donahoo, 2016; Soldani, Tamburri & Van Den Heuvel, 2018).

In this last set of questions, we aimed at checking the extent to which these practices are used also in the setting of security, for example by verifying whether specific development processes and security standards are considered.

This group consists of the following questions.

  • Q16: Does the publication mention DevOps, Continuous Integration, Continuous Deployment, or Continuous Delivery?

  • Q17: Does the publication mention Agile, or how security experts are integrated from a development process point of view?

  • Q18: Does the publication mention Domain Driven Development?

  • Q19: Does the publication mention Model Driven Development?

  • Q20: Does the publication mention certifications, such as ISO27000 (https://www.iso.org/isoiec-27001-information-security.html), or technological standards such as X.509 (https://tools.ietf.org/html/rfc5280)?

Review Results

In this section, we present the outcome of the literature review. We start by presenting quantitative results from the metadata of the publications in our dataset. This is useful to map the trends over time and current shape of the field, in terms of number of contributions, type (proceedings, articles), communities, and keywords (and their relations). Then, we present qualitative results derived from the analysis of the types of contributions (theoretical, applicative, etc.) and of the relation between the selected dataset and our research questions (cf. “Research Questions”). The qualitative part is aimed at providing a detailed insight on existing research patterns, gaps, and uncovered areas of the field. We close the subsection with a correlation analysis of the questions, providing a quantitative look over the relationships between them. For reference, we also report our dataset in tabular form, each entry associated with the positive answers given to our research questions.

Insights

In the following subsections, we highlight in separate paragraphs (like this one) the main insights that emerge from our analysis. Each insight motivates an open challenge, which we write in bold as the heading of the insight. We will use these challenges in “Discussion and Future Directions” to structure our discussion about useful future directions for research on microservice security.

Metadata results

We start our quantitative analysis of the collected dataset by presenting in Fig. 2A the time distribution of the selected publications. As expected, security in microservice systems gained a lot of academic interest in the latest years. This is reflected by the sharp increase in the number of publications since 2014. In Fig. 2A, we report the number of collected publications per year.

Figure 2. Time and category distribution of publications.

Figure 2

As a reference to indicate the degree of growth of the field, we report in Fig. 2B the yearly ratio (in parts per million) between the collected publications and the overall number of publications in computer science.3

Publication outlets

From the plot in In Fig. 2C, we see that conferences and journal venues are the most commons outlets, while books/collections are underrepresented. This last fact indicates the early stage of the field, where established references are still lacking. However, conference proceedings are almost matched by journal articles, marking a maturing trend of results that are solid enough to constitute material for more structured contributions, as those found in peer-reviewed journals.

We now concentrate on the specific conferences and journals where the publications in our dataset have been published. In Figs. 3 and 4, we report this result in two versions: (i) in tabular form, on the left-hand side of Figs. 3 and 4, with the acronym, the full name, and the number of contributions in our dataset of the venues with the most contributions and (ii) on the right-hand side of Figs. 3 and 4, showing the data on the left as a pie chart.

Figure 3. Conferences with the largest number of publications in our dataset.

Figure 3

Figure 4. Journals with the largest number of publications in our dataset.

Figure 4

Regarding the distribution of publications over the different categories of venues, we note how the audience of journals and conferences vary. In fact, there is no predominance of security-oriented or even software engineering venues, which could have been the most likely targets. Instead, the analysed publications appear on publications addressing a broad range of topics, from networking to cloud computing, and on open journals such as IEEE Access and ACM Queue. Furthermore, there is no clear preferred venue that dominates the others, but contributors are rather scattered over many neighbouring venues.

We give a twofold interpretation to the phenomenon. On the one hand, this fact can indicate that microservice security is perceived as of cross-disciplinary interest, each contribution seeing it from the lens of its specific area (whether it be software engineering, networks, sensors, cloud computing, etc.). On the other hand, we notice the lack of specific venues dedicated to microservices, and least of all, dedicated to microservice security.

Insights

Fragmentation of outlets: there are no reference venues for the area of microservice security (neither journals nor conferences). This makes it difficult for researchers and practitioners to keep up with the state of the art, as well as to find dedicated conventions where they can discuss this topic with the rest of the community interested in the area.

Research communities

To add more insight on the communities of the field, we also perform a network analysis to identify and explore the clusters of the most prolific authors and their research collaborations. Specifically, we are interested in analysing the networks of collaboration of “core authors”, i.e., prolific authors that, by working with different people, act as a liaison among separated groups of authors.

To find the clusters of core authors in our dataset, we consider all the authors in the dataset and we aggregate them in clusters such that each member of a cluster has at least one contribution published with one of the members of the cluster. Since we are interested in “core authors”—i.e., authors with more than 2 works in the dataset—we remove all those clusters formed around just one work—i.e., where the maximum number of publications published by the most prolific author is one.

Our analysis extracted 16 clusters from our dataset. We report in Table 2 the result of our analysis, labelling each cluster from A to P. For each Cluster, we report the name of the author, the number of publications (# pub.) in our dataset and their affiliation.

Table 2. Cluster authors correspondence.

Cluster Author # Pub. Affiliation Cluster Author # Pub. Affiliation
A Fetzer Christof 3 TU Dresden G Makitalo Niko 1 University of Helsinki
A Brito Andrey 2 Universidadede Campina Grande H Jin Yike 1 Unknown affiliation
A Kopsell Stefan 2 TU Dresden H Yu Dongjin 1 Hangzhou Dianzi University
A Pietzuch Peter 2 Imperial College London H Zhang Yuqun 1 Southern University
A Pasin Marcelo 2 University de Neuchâtel H Zheng Xi 3 Xi’an Jiaotong University
A Felber Pascal 2 University of Neuchâtel H Zhang Chong 2 Chong Qing Hospital
A Fonseca Keiko 1 Universidade do Paraná H Liu Xiao 2 Tsinghua University
A Rosa Marcelo 1 University of Melbourne H Li Rui 2 Facebook
A Gomes Luiz 1 Arizona State University H Liu Huai 2 University of Washington
A Riella Rodrigo 1 Universidade do Paraná I Donahoo Michael J 2 Carnegie University
A da Silva MS Leite 1 Universidade Campina Grande I Cerny Tomas 6 Baylor University
A de Oliveira SV Fernando 1 Universidade de Campina Grande I Sedlisky Filip 1 University In Prague
Kelbert Florian 1 Elastic I Walker Andrew 2 Carnegie University
A Gregor Franz 1 TU Dresden I Svacina Jan 2 Baylor University
A Pires Rafael 1 University of Sao Paulo I Bushong Vincent 2 Baylor University
A Schiavoni Valerio 1 University of Neuchâtel I Bures Miroslav 2 University In Prague
A Mazzeo Giovanni 2 MDM-IMM-CNR lab I Tisnovsky Pavel 2 University In Prague
A Oliver John 1 UC Berkeley I Frajtak Karel 2 University in Prague
A Romano Luigi 1 Universita della Campania I Shin Dongwan 2 Korea Institute of Energy Research
A Brenner Stefan 1 TU Braunschweig I Huang Jun 2 Duke University
A Hundt Tobias 1 UCL Institute of Child Health J Yarygina Tetiana 4 University of Bergen
A Kapitza Rudiger 1 TU Braunschweig J Otterstad Christian 3 University of Oslo
B Artac 1 Necmettin Erbakan University J Lysne Olav 1 Simula Research Laboratory
B Casale Giuliano 2 Imperial College London J Hole Kjell J 1 Simula Research Laboratory
B Van Den Heuvel W-J 2 Tilburg University J Ytrehus 1 University of Tromso
B van Hoorn Andre 5 University of Stuttgart J Aarseth Raymond 1 University of Tromso
B Jakovits Pelle 1 University of Tartu J Tellnes Jorgen 1 University of Bergen
B Leymann Frank 1 University of Stuttgart J Bagge Anya Helene 1 University of Bergen
B Long Madeleine 1 University of Oslo K Cecconi Alessio 1 Vienna University
B Papanikolaou Vicky 1 National School of Public Health K Di Ciccio Claudio 1 Sapienza University of Rome
B Presenza Domenico 1 University of Rome K Dumas Marlon 1 University of Tartu
B Russo Alessandra 1 University of Catania K Garcia-Banuelos Luciano 1 Tecnologico de Monterrey
B Chesta Cristina 1 University of Chester K Lopez-Pintado Orlenys 1 University of Tartu
B Di Nitto Elisabetta 1 Politecnico di Milano K Lu Qinghua 3 Universtiy of delaware
B Gouvas Panagiotis 2 University of Athens K Mendling Jan 1 Humboldt-Universität zu Berlin
B Stankovski Vlado 2 University of Ljubljana K Tran An Binh 1 CSIRO
B Symeonidis Andreas 1 University of Thessaloniki K Weber Ingo 3 TU Berlin
B Zafeiropoulos Anastasios 2 University of Athens K Binh Tran An 2 CSIRO
B Soldani Jacopo 1 University of Pisa K O’Connor Hugo 2 CSIRO
B Avritzer Alberto 4 eSulabSolutions K Rimba Paul 2 CSIRO
B Ferme Vincenzo 3 Kiratech S.p.A. K Xu Xiwei 2 National Institute of Natural Hazards
B Janes Andrea 3 The James Hutton Institute K Staples Mark 2 CSIRO
B Russo Barbara 3 Free University of Bozen-Bolzano K Zhu Liming 3 CSIRO
B Schulz Henning 3 Novatec Consulting GmbH K Jeffery Ross 2 Mayo Clinic
B Menasche 3 University of Rio de Janeiro L Mirri Silvia 2 University of Bologna
B Rufino Vilc 3 UFRJ L Melis Andrea 4 University of Bologna
B Trubiani Catia 1 Gran Sasso Science Institute L Prandi Catia 2 University of Bologna
B Bran Alexander 1 University of Exeter L Prandini Marco 4 University of Bologna
C Rocha Carla 1 Rutgers University L Salomoni Paola 2 University of Bologna
C Leite Leonardo 3 University of São Paulo L Callegati Franco 3 University of Bologna
C Kon Fabio 3 University of São Paulo L Giallorenzo Saverio 2 University of Bologna
C Milojicic Dejan 1 Hewlett Packard Labs L Delnevo Giovanni 1 University of Bologna
C Meirelles Paulo 3 University of São Paulo L Monti Lorenzo 1 University of Bologna
C Pinto Gustavo 2 University of São Paulo M Panichella Annibale 4 Delft University of Technology
D Hou Kaiyu 3 Northwestern University M Jan Sadeeq 1 Technology Peshawar Pakistan
D Wu Xiaochun 3 Zhejiang University M Arcuri Andrea 1 Kristiania University College
D Leng Xue 3 Zhejiang University M Briand Lionel 1 University of Ottawa
D Li Xing 3 University of Chicago M Olsthoorn Mitchell 2 Delft University of Technology
D Yu YinBo 1 Wuhan University M van Deursen Arie 2 Delft University of Technology
D Wu Bo 3 Google Inc. N Zimmermann Olaf 5 HSR University of Rapperswil
D Chen Yan 3 Lunghwa University N Stocker Mirko 1 HSR University of Rapperswil
D Yu Yinbo 2 Wuhan University N Zdun Uwe 3 University of Vienna
E Nikouei Seyed Yahya 3 Binghamton University N Lubke Daniel 1 Leibniz Universität Hannover
E Xu Ronghua 2 Binghamton University N Pautasso Cesare 1 University of Lugano
E Chen Yu 3 University of Singapore N Kapferer Stefan 2 Witten/Herdecke University
E Blasch Erik 2 Air Force Research Lab N Wittern Erik 2 Witten/Herdecke University
E Aved Alexander 2 US Air Force Research Lab N Leitner Philipp 2 University of Gothenburg
E Nagothu Deeraj 1 Binghamton University O Michalas Antonis 1 Tampere University of Technology
E Faughnan Timothy R 1 Binghamton University O Paladi Nicolae 1 Research Institutes of Sweden
F Sukaridhoto Sritrusta 3 Politeknik Surabaya O Dang Hai-Van 3 University of Westminster
F Panduman YY Fridelin 1 Politeknik Surabaya O DesLauriers James 2 CNRS
F Tjahjono Anang 1 Politeknik Surabaya O Kiss Tamas 2 CNRS
F Falah Muhammad Fajrul 2 Politeknik Surabaya O Ariyattu Resmi C 2 Carleton University
F Al Rasyid MU Harun 2 Politeknik Surabaya O Ullah Amjad 2 Carleton University
F Wicaksono Hendro 2 Politeknik Surabaya O Bowden James 2 Carleton University
G Kilamo Terhi 1 Aalto University O Krefting Dagmar 2 HTW Berlin
G Lwakatare Lucy Ellen 1 University of Helsinki O Pierantoni Gabriele 2 University of Westminster
G Karvonen Teemu 1 University of Helsinki O Terstyanszky Gabor 2 University of Westminster
G Heikkila 1 University of Oulu P Basso Tania 1 Universidade Estadual de Campinas
G Itkonen Juha 1 Aalto University P Antunes Nuno 3 University of Coimbra
G Kuvaja Pasi 1 Aalto University P Vieira Marco 1 University of Coimbra
G Mikkonen Tommi 2 University of Helsinki P Santos Walter 1 Universidade Estadual de Montes Claros
G Oivo Markku 1 University of Oulu P Meira Wagner 1 Universidade Federal de Minas Gerais
G Lassenius Casper 1 Aalto University P Flora Jose 4 University of South Carolina
G Kalske Miika 1 University of Helsinki P Goncalves Paulo 2 Universidade de São Paulo

The measure gives some interesting insights. First, clusters F, G, J, and L are totally localised in one country or the same University/Institute, they are relatively small (compared to the others in the Table), and include some of the most prolific authors (J and L in particular). Four other clusters follow a different trend: C, H, P and I. They are big-size clusters (respectively 6,10,8 and 6), they count one core author (respectively with 3,3,4 and 3 publications) but they are rather homogeneous, the first mainly including authors from Brasil, Finland and the fourth one from Portugal. Clusters A, B, D, K, M, N and O are the most varied. Cluster A, is the largest (22 authors) and most heterogeneous one: it includes 6 core authors from 5 different countries (Brazil, Germany, Italy, Switzerland, and the UK) and 12 co-authors from 4 countries different from those of the core authors (Australia, France, Portugal and the US). Cluster B includes 6 core authors over 24 members, distributed over just 5 countries (Brazil, Germany, Italy, Greece and Switzerland). Cluster D includes 8 authors, of which 6 are core and come both from either China or US. Cluster K is another big cluster of 16 authors with include 3 core authors from US and Germany. Clusters M, N and O follow the same trend of cluster D. This means that these clusters are build around 2 core authors which represent the main affiliation provenance, respectively Holland, Germany and Switzerland, US and UK.

Overall, the communities of core authors in the dataset is distributed among three types of clusters:

  • “open” clusters (A, B, D, K) of co-authors linked by a few (if not one) core authors and diverse affiliations;

  • “semi-open” clusters (C, G, M, N and O) of localised collaborators with sporadic, external collaborations;

  • “closed”, localised clusters (F, L, P) that tend to be small but whose core authors tend to be the most prolific (L).

Given their larger reach, semi-open and open clusters have a better chance to gather an impactful community around the topic. Our call to the authors in the field (particularly the closed clusters that tend to be prolific but rather localised) is to establish international collaborations and coordinate to foster the advancement and growth of the field.

Concepts and keywords

We conclude our quantitative analysis by providing a graphical representation of the main keywords present in the abstract of the contributions in our dataset. To conduct our analysis, we used VOSviewer by Van Eck & Waltman (2010), a software that offers text mining functionalities for constructing and visualising co-occurrence networks of important terms extracted from a given corpus. Specifically, we ignored basic words and copyright statements, and performed a full-count of the words present in the text. We considered only words occurring more than 15 times, sizing them by their relevance in terms of occurrences. The resulting graph, however, is still too large and dispersive to convey useful information: for the sake of clarity we present here a visualisation including only the top 60% most-occurring words.

We report the visualisation of the analysis in Fig. 5.

Figure 5. Word-Net of the abstracts in our dataset.

Figure 5

VOSviewer automatically clustered the words in 4 areas using its modularity-based clustering algorithm, which is a variant of the cluster algorithm developed by Clauset, Newman & Moore, 2004 to detect communities (clusters) in a network that also considers modularity.

We can interpret the clusters as follows:

  • The blue area marks the main terms of this study, grouping words like microservice and system. The result does not surprise, since those words describe the design of the systematic selection we performed.

  • The green area marks technical terms as container or attack.

  • The red area identifies application terms, e.g., the targets or reasons of the research, if it is an industrial or research-focused article. We find for instance the word Internet-of-Things, as it is mainly cited with industry and research applications rather than along with terms like container and cloud.

  • The yellow area includes words that identify the subject of a study, whether it be some tool, data (of the system, of the users), users, and they privacy. The word tool here is peculiar, as it acts as a bridge between the other areas. Also this finding is somehow expected, as the field of microservice security is marked by a fairly practical orientation towards automatisation of processes and control.

Publication context analysis

In this section, we discuss trends and considerations derived from reading the selected publications and the research question detailed in “Research Questions”.

Types of publications

In Fig. 6 we report the distribution of the type of research contribution—whether theoretical, practical, mixed, or a review.

Figure 6. Type of publications.

Figure 6

More precisely, regarding the type of research contribution, we mapped every publication in our dataset to one of the following types:

  • Theoretical for publications that present an approach for a specific problem without any implementation artefact.

  • Applicative for publications that describe an implemented application possibly with its validation.

  • Theoretical and Applicative for publications that develop a theory and provide a practical tool, framework, program, or application.

  • Review for both literature reviews and social studies (e.g., on developers).

Reviews constitute the 15% of works, marking the fragmented shape of the field, which is in rapid expansion and in need for studies to map its research landscape. Besides surveys, the other contributions in the field are distributed among a 52% share that introduce new theoretical results, a 20% share that contribute by pairing new theoretical proposals with implementations, and the remaining 11% describing pure applications. The fact that the main publications in the field are of theoretical nature is surprising, given the prominently applied nature of microservices. Indeed, excluding surveys, we have that for every 5 publications slightly more than 3 (64% of them) are of purely theoretical. We attribute this figure to two phenomena. The first marks the current exploratory trend of the field, which is still engaged in proposing new ideas and in evaluating and maturing them into models amenable to implementation. The second phenomenon relates to the impact that microservices have at the processes/organisational level, with works that are intrinsically theoretical because their contribution can be hardly crystallised into automated implementations, e.g., for proposals of attack models or techniques for handling security within organisations and development teams notwithstanding the possible explanations above, it is worth noting the (quantitative) distance between contributions from academia and applications available to practitioners and the industry, which is an indicator of an untapped potential for joint synergies between the two communities.

After having characterised the type of publications in the field, we proceed by exploring the results from the answer of the research questions following the 4 macro-groups presented in “Research Questions”.

Insights

Technology transfer: the field of microservice security is still in the early phase of new idea proposals. There are just a few implementations of these ideas, which hinders industrial adoption.

Threat model

A total of 176 publications (ca. 65% of the dataset) give a positive answer to at least one question of this category. However, only 53 publications among those 120 (ca. 30% of the total dataset) mentioned the usage of at least one threat model to analyse or classify threats The reason for those publications to adopt a threat model vary, from publications that use the model to motivate their proposed solutions to reviews that use the model to structure their overview of the state of the art. Interestingly, in ca. 80% of those publications that mention the usage of at least one known threat model, the model is tailored to work on a specific application scenario. This is an indication of the lack of usage of a generic threat model for microservice security. We conjecture that this lack of usage of generic threat models is due to the fact that the majority of research done on microservice security comes from the software (engineering, languages) side of the field, rather than from the side of security, which advocates for a security-by-design approach.

A complementary explanation of that phenomenon is that there is no affirmed threat model for microservices, e.g., due to the difficulty of making the model specific enough for microservices yet avoiding the infamous problem of threat explosion, where the effort required to prioritise and consider all threats starts exceeding the benefits of proposing methods to manage them Wuyts et al. (2018). Threat explosion is a known problem of neighbouring areas to microservices, like cloud, edge, and fog computing (Di Francesco, Malavolta & Lago, 2017; Ibrahim, Bozhinoski & Pretschner, 2019; Guija & Siddiqui, 2018; Lou et al., 2020; Flora, 2020; Truong & Klein, 2020; Russinovich et al., 2021) where the authors resorted to defining smaller, customised threat models rather than adopting standard ones, due to the problem of requiring conspicuous adaptation efforts to tailor them to such complex and multifaceted architectures.

Regarding the possible attacks addressed in the publications, Fig. 7 categorises the publications based on the STRIDE threats, following up on question Q2 asking if the publication involves at least one of threats of the STRIDE classification. The most commonly tackled attacks are of the “spoofing” and “denial of service” kinds. This is an effect of the push for fine-granularity and independence of services advocated by microservices, where applications result from several small (in size), independent software components that communicate with each other. Such decentralised communication/coordination is one of the most important attack vectors for microservice applications, in particular, the possibility to disguise a communication from an unknown source as being from a known, trusted source, which matches the spoofing attack category. Such attacks, along with tampering and repudiation ones (which together represent more then half of the attack types found in our collection), entail the need for solutions to address attacks centred around exploits of data provenance.

Figure 7. Attack type identified following the STRIDE classification.

Figure 7

A similar consideration can be made for denial-of-service attacks, where the flexible scalability of microservices allows malicious intruders to, e.g., scale up peripheral microservices and hit more central and well-protected components with (distributed) overpowering attacks.

Insights

Adoption of security-by-design: security in microservices frequently comes as an afterthought, whereas it should be one of the main concerns for their engineering.

Data provenance: the quantity of spoofing, tampering, and repudiation attacks highlights the need to address the general problem of data provenance in microservices.

Dedicated attack trees and threat models: while there are attacks that specifically pertain to microservices, such as those that leverage the scalability of microservice architectures to cause denial of service, there are no dedicated threat models to help developers become aware of those particular threats.

Security approach (Mitigation)

In terms of solutions to security issues proposed by the publications (questions Q6–Q10), the most common approach (45 publications) is to address specific problems, such as authentication or exfiltration, rather than suggesting a general approach. Publications dealing with architectural aspects rarely address the overall picture (only 25, roughly 8%, publications focuses on IDS, IPS, Exfiltration Leaks and Threat Intelligence). Again, they focus on local threats like intra-communications or authentication (question Q11). These observations suggest that there is a lack of security approaches that address applications across the full stack.

As far as privacy and GDPR are involved (question Q12), surprisingly, only 9 publications consider privacy protection relevant or worthy of analysis. In particular, only one publication Badii et al. (2019) considers the GDPR as a guideline to follow in order to protect the privacy of users. Example of this kind of guideline application are shown in Voigt & Von dem Bussche (2017). Considering that many of the solutions included in the dataset are Cloud-based solutions, it is surprising to note that only one publication claims to be GDPR compliant.

Insights

Global view/control: the distributed nature of microservices introduces the need for technologies that provide global yet decentralised observability and control, i.e., tools that aid in the enforcement of security policies over a whole architecture without single points of failure.

React & recover techniques: while we found solutions to prevent and detect attacks, there are only a few proposals about how microservice systems could react to and recover from them.

Comprehensive technological references: microservices use diverse sets of technology stacks, each characterised by peculiar exploits. To secure microservice architectures effectively, implementors need dedicated technological references to avoid known threats.

Infrastructure

We start the discussion by first focusing on the type of microservice infrastructure used by the various contributions. Specifically, we have 205 publication in our dataset that answer positively to question Q13. The breakdown of the answers is:

  • 39% (80) describe a centralised approach;

  • 24% (49) use a decentralised approach;

  • 17% (35) resort to a hybrid approach;

  • 20% (41) do not specify which approach they use.

The most widely adopted turns out to be the centralised one. We conjecture two explanations behind this observation. First, the centralised approach has the merit of simplifying the definition, deployment, monitoring, and evolution of policies holding over all the components in a given architecture—traded off with scalability issues and single-point-of-failure concerns. Second, we note that, among the approaches that appeared early in the literature, many focused on converting monolithic applications into microservice applications. Clearly, having a centralised controller that manages the orchestration of microservices helps this process and is closer in spirit to the monolithic workflow. However, the advent of federated, multi-cloud solutions (that prevent the identification/deployment of a centralised authority over the whole peer network) as well as new distributed-consensus technologies (e.g., blockchains), has led to a decentralisation of control, making new decentralised or hybrid solutions emerge (in our dataset) starting from 2018. As an example, in 2015 and 2016, we find publications such as Callegati et al. (2016) and Lysne et al. (2016) which presented centralised approaches to enable security in microservice platforms, while starting from 2018 hybrid and decentralised solutions appear like Pahl & Donini (2018) for certificate-based authentication or Andersen et al. (2018), Andersen et al. (2017) where authors propose a decentralise high-fidelity city-scale emulation to verify the scalability of the authorisation tier.

We notice that the advent of new distributed-consensus technologies also affected the orchestration approach of microservice solutions. For example, works such as Xu et al. (2019) propose a decentralised, blockchain-based data-access control for microservices. Recent contributions also tackled the problem of authentication and authorisation in decentralised settings, e.g., Bánáti et al. (2018) develops a workflow-oriented authorisation framework to enforce authorisation policies in a decentralised manner, Taha, Talhi & Ould-Slimanec, 2019 presents a new algorithm that distributes tasks on clusters of vehicular ad-hoc networks, Zhiyi, Shahidehpour & Xuan, 2018 proposes a secure decentralised energy management framework, and Tourani et al. (2019) describes a decentralised data-centric SECurity-as-a-Service (SECaaS) framework for elastic deployment and provisioning of security services. Another interesting work has been done in Falah et al. (2020) where authors brought the concept of a digital twin to show how a microservice infrastructure approach can speed up the process of deploying complex infrastructure components.

Infrastructure as a Service (IaaS), which is the focus of question Q14, is also a recurrent topic in our dataset, with 66 publications yielding a positive answer. IaaS include solutions that provide and manage low-level infrastructural components, like computing resources, data storage, network components, etc. We notice that IaaS is mentioned mainly as the modality used to deploy the solution but is not studied as a security subject/mechanism per se. Works such as Sultan, Ahmad & Dimitriou, 2019 emerge as exceptions; their authors analysed the security benefits obtained using a container-based infrastructure exposed as a service.

Question Q15 investigates Service Discovery, i.e., the automatic detection of services and their functionalities available in a given architecture/network. A total of 16 publications mention Service Discovery in the context of security. Mainly, they propose architectures that support reactive mechanisms for the detection of security issues. Of those, only 2 mention service registration procedures that include data for performing the preventive analysis of the composition, with the goal of statically finding and fixing possible vulnerabilities and misconfigurations: Callegati et al. (2018) and Kamble & Sinha (2016).

Insights

Global view/control: while there is not a definitive approach to microservice security control (whether it be centralised, decentralised, or hybrid), there is a recognised need for applying security control policies in a consistent way across all microservices belonging in the same architecture.

Development

DevOps and Agile are recurring topics in our dataset. Based on the answer to question Q16, 76 publications used the DevOps approach, while, answering to Q17, 57 used Agile methods—of those 99 publications which represent the 40% of all publications in our dataset, 10 mention both approaches. There is a common consensus in these publications that Agile/DevOps is important in security because microservices seem to be the perfect match for this type of software development model (Vehent, 2018; Hsu, 2018). In particular, microservices align with the tenet of both approaches: to assign dedicated, independent teams to the development of small and independent components within the architecture Continuous Integration (CI) process. However, the majority of the selected publications provide no in-depth security analysis of any of the two development approaches, but rather indicate the inclusion of generic security measures in the steps of the development method. Only three works, namely Mansfield-Devine (2018), Anisetti et al. (2019) and Kumar & Goyal (2020), propose concrete and specific variants of the DevOps methodology that tackle security issues—in particular Mansfield-Devine (2018) explicitly cites the guidelines of DevSecOps Hsu (2018).

Migration is one of the main challenges faced in this context; migrating applications introduces important security concerns (Lwakatare et al., 2019) that are difficult to track, due to the lack of appropriate devices (both organisational and linguistic) to elicit them from the source codebase and make sure they hold in the migrated one. Another major challenge is the coordination between development teams in the context of privacy-handling issues (Gupta, Venkatachalapathy & Jeberla, 2019). Also, security becomes a challenging aspect since the (small, independent) teams need to know many aspects of security (Leite et al., 2019) and those DevOps criteria for testing, building, and deployment automation are often neither properly followed in industrial environments (Bogner et al., 2019), nor for automated scans (Chondamrongkul, Sun & Warren, 2020).

When considering domain- and model-driven approaches (questions Q18 and Q19), 16 publications consider domain-driven approaches and 26 consider model-driven ones, such as Kapferer & Zimmermann (2020), Avritzer et al. (2020). These topics are therefore not as widespread as DevOps. Moreover, all citations in these cases are just brief references of the development approach, and lack a discussion on how one of the two approaches can be used in a security context on microservices.

The last question in this category, Q20, concerns security standards, i.e., curated sets of technologies, policies, concepts, safeguards, guidelines, assessments, procedures, training programmes that should be adopted to reduce security risks and mitigate attacks. The answers we gathered for this question surprised us. Indeed, security standards are a staple element of industries and organisations that want to impose and guarantee a certain level of security on their members and collaborators (often also for certification purposes – Stewart, Chapple & Gibson, 2012, Lie, Sánchez-Gordón & Colomo-Palacios, 2020). Despite their widespread use in practice, only 7 publications mention security standards.

In particular, Souppaya, Morello & Scarfone (2017) mentions the usage of X.509 to verify a secure method for key exchange between microservice. In Brenner et al. (2017) the authors show a solution for securing microservices through the SGX Intel Standard. The authors of Vassilakis, Panaousis & Mouratidis (2016) analyse the concept of Small-Cell-as-a-Service, i.e., a technological paradigm for the development of Virtualised Mobile Edge Computing Environments, using several mobile standards for 5G and SDN networks (e.g., MobileFlow Pentikousis, Wang & Hu, 2013 and VNFs Agarwal et al. (2019)). Finally, Yarygina (2018) performs a deep analysis on securing microservices, citing and analysing several know standards for both microservice management and security purposes.

Insights

Migration to microservices: there are no established techniques to help developers migrate legacy systems to microservice architectures, and in particular to identify the possible security threats that come from such a migration.

DevSecOps: Agile and DevOps practices are widely used when developing microservices, yet only a few publications address how security is addressed and combined in these practices.

Additional considerations

By analysing our dataset, we were surprised to find many citations to blockchain technologies (as reported above) as well as the lack of more and more mainstream technologies like service mesh and serverless.

Regarding blockchain technologies, we found 31 publications mentioning or explicitly using blockchains. The decentralisation and independence of microservices constitute a good pairing for the usage of blockchain technologies. Figure 8 presents also the trend of publications using blockchain in the dataset. There is an increasing interest in blockchain applications for microservice architecture. Examples of that pairing include works such as Nagothu et al. (2018) and Xu et al. (2019), where the trust-chain of the blockchain is combined with a decentralised microservice architecture to create strong smart contract systems, or Lu et al. (2021), where authors proposed a model-driven engineering approach for blockchain applications with microservice.

Figure 8. Blockchain trend.

Figure 8

New approaches for microservices design and usage such as service mesh Li et al. (2019a), i.e., a dedicated infrastructure layer for facilitating service-to-service communications between microservices is just mentioned by 3 works: Pahl & Donini (2018), where the authors indicate a service mesh architecture for authenticating services—securely adding information to their executables and validating the correct execution of distributed entities with such certificate-based approach—and Suneja, Kanso & Isci (2019), which mentions the service-mesh sidecar pattern used to control security. Another interesting work regarding service mesh is Hahn, Davidson & Bardas (2020) where authors analysed under several scenarios issues and challenges in Service Meshes.

Similarly, serverless Hendrickson et al. (2016) is mentioned only in 4 publications. We did not expect to find (50%) more citations of serverless than those regarding service mesh. Serverless is a cloud computing execution model in which the cloud provider dynamically manages the allocation/scaling of machine resources depending on inbound requests. Indeed, while the service mesh is a technology from the (micro)service-oriented context, serverless is a more neighbouring concept to that of stateless microservice deployment.

In this context, the most relevant publication is Casale et al. (2019), which presents the results of a European research project to develop a model-driven DevOps framework for creating and managing applications based on serverless computing. Its main result consists in designing applications as fine-grained and independent microservices that can efficiently and optimally exploit the serverless paradigm. The serverless term, despite starting to get momentum, is still loosely related to microservices.

Given their increasing importance and impact in the industry and their close relation with microservices, we argue that both service mesh and serverless will attract the general attention of the research community in the near future, as well as that of security research.

Insights

Comprehensive technological references: the progressive adoption of new technologies in the world of microservices (such as blockchains, service meshes, and serverless) calls for dedicated investigations and reports on their impact on the security of these systems.

Correlation between research questions

The amount of data collected in our dataset is large enough to represent a statistically-relevant sample. In this section, we leverage this to study correlations between our research questions, by way of the answers that the publications in our dataset give to each of them. Correlations can be used to understand which of the different aspects of microservice security are most commonly in a positive correlation (paired) in the dataset, and which ones are negatively correlated (mutually exclusive).

We report in Table 3 the correlation matrix—excluding research question Q1, since no publication answered it. While the obtained matrix is symmetric and we could report just one half, in Table 3 we report the full matrix for convenience, to provide a more immediate view of how each question correlates with all of the other ones.

Table 3. Correlation matrix among research questions (the values are percentages).
Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 Q11 Q12 Q13 Q14 Q15 Q16 Q17 Q18 Q19 Q20
Q2 27.11 32.80 8.10 13.75 3.19 −7.74 12.36 0.41 24.68 −4.12 −22.74 −8.06 6.27 −3.88 −6.71 8.45 0.19 0.41
Q3 27.11 28.59 7.37 18.93 29.11 7.49 8.68 12.81 16.69 8.54 0.75 5.51 15.10 −6.93 −10.82 3.57 2.26 12.81
Q4 32.80 28.59 12.18 6.30 5.05 10.50 6.05 8.45 17.28 9.01 −10.39 −7.34 −0.42 1.05 1.34 6.88 −6.90 8.45
Q5 8.10 7.37 12.18 6.15 8.26 12.31 5.58 13.51 −12.44 5.04 −2.41 5.31 9.24 −10.48 −7.12 −13.61 −9.07 8.06
Q6 13.75 18.93 6.30 6.15 77.49 22.89 14.23 14.86 3.83 5.58 0.88 17.76 14.23 −0.42 2.99 6.90 4.96 −5.83
Q7 3.19 29.11 5.05 8.26 77.49 20.77 12.55 17.68 1.97 0.88 0.78 15.67 12.55 4.41 −1.48 10.17 7.44 −5.14
Q8 −7.74 7.49 10.50 12.31 22.89 20.77 10.03 14.15 −5.27 20.31 20.12 31.15 13.76 8.28 9.01 4.83 −4.89 −8.03
Q9 12.36 8.68 6.05 5.58 14.23 12.55 10.03 25.72 3.19 13.09 −0.84 15.70 14.01 −0.66 3.25 8.28 14.01 −3.80
Q10 0.41 12.81 8.45 13.51 14.86 17.68 14.15 25.72 8.88 10.14 0.37 7.54 6.04 5.95 3.53 2.93 6.04 12.17
Q11 24.68 16.69 17.28 −12.44 3.83 1.97 −5.27 3.19 8.88 0.36 5.13 −17.71 0.15 12.62 9.16 9.02 6.24 8.88
Q12 −4.12 8.54 9.01 5.04 5.58 0.88 20.31 13.09 10.14 0.36 −1.44 9.26 4.38 −1.62 6.16 1.34 −4.32 −2.81
Q13 −22.74 0.75 −10.39 −2.41 0.88 0.78 20.12 −0.84 0.37 5.13 −1.44 26.24 9.08 11.22 13.12 7.16 5.77 5.29
Q14 −8.06 5.51 −7.34 5.31 17.76 15.67 31.15 15.70 7.54 −17.71 9.26 26.24 22.90 10.67 12.47 11.75 8.50 −3.18
Q15 6.27 15.10 −0.42 9.24 14.23 12.55 13.76 14.01 6.04 0.15 4.38 9.08 22.90 13.07 10.85 18.85 14.01 −3.80
Q16 −3.88 −6.93 1.05 −10.48 −0.42 4.41 8.28 −0.66 5.95 12.62 −1.62 11.22 10.67 13.07 57.34 25.21 19.94 0.85
Q17 −6.71 −10.82 1.34 −7.12 2.99 −1.48 9.01 3.25 3.53 9.16 6.16 13.12 12.47 10.85 57.34 33.08 10.85 −2.13
Q18 8.45 3.57 6.88 −13.61 6.90 10.17 4.83 8.28 2.93 9.02 1.34 7.16 11.75 18.85 25.21 33.08 40.00 −4.94
Q19 0.19 2.26 −6.90 −9.07 4.96 7.44 −4.89 14.01 6.04 6.24 −4.32 5.77 8.50 14.01 19.94 10.85 40.00 −3.80
Q20 0.41 12.81 8.45 8.06 −5.83 −5.14 −8.03 −3.80 12.17 8.88 −2.81 5.29 −3.18 −3.80 0.85 −2.13 −4.94 −3.80

We conditionally colour the cells of the Table, first, attributing colour intensity according to correlation absolute value—maximal intensity for 100% and degrading towards 0%—, second, setting a transition threshold above 30% (absolute value) from green to orange, to help to spot relevant correlations. Looking at the Table, we notice the predominance of light-coloured cells. This result can be interpreted as an indication that the research questions used in this work are mostly orthogonal, and thus suited to cover the reviewed subject with almost no wasteful overlap.

No anti-correlation was found, i.e., negative correlations over the 30% threshold in absolute value. In the following, we comment on all positive correlations above 30%.

No anti-correlation was found, i.e., negative correlations over the 30% threshold in absolute value. In the following, we comment on all positive correlations above 30%.

Q2–Q4 (32.80%) The questions relate the use of STRIDE threat model with one of its identified specific threats. This seems to be an obvious correlation since we are looking for a specific STRIDE path, or at least one of his threats.

Q7–Q6 (77.49%) The questions ask if the publication mentions IPS or IDS functionalities respectively. The strong correlation indicates how IPS and IDS are strictly related. Indeed, in practice, IDS may exist without IPS, but not the opposite, because prevention mechanisms are typically built as a reaction to a detected attack;

Q8–Q14 (31.15%) The questions relate Threat Intelligence functionalities with Infrastructure as a Service deployment, which can define a campaign strategy for a Threat Intelligence analysis.

Q17–Q16 (57.34%) The questions relate the Agile development methodology with DevOps and Continuous Integration. As also emphasised in other studies like Lwakatare et al. (2019), this correlation can be easily explained by the fact that DevOps is sometimes considered an Agile method or its evolution. Processes adopting DevOps, therefore, adopt also Agile;

Q19–Q18 (40.00%) The questions relate Domain-Driven Development and Model-Driven Development. We conjecture that this correlation is present because mentions of Domain-Driven Development often mentions Model-Driven Development as an alternative approach and vice versa;

Q18–Q17 (33.08%) The questions relate Domain-Driven Development and Agile methodologies, indicating a correlation, mainly because often Agile methodologies employ Domain-Driven Development.

Threats to validity

Our study is subject to limitations that can be categorised into construct validity, external validity, internal validity, and reliability following the guidelines of Runeson et al. (2012).

Construct validity “reflects to what extent the operational measures that are studied really represent what the researcher has in mind and what is investigated according to the research questions”. To mitigate a potential misinterpretation and making sure that the constructs discussed in the research questions are not interpreted differently by the researchers, we adopted various triangulation rounds using online meetings and we designed a set of binary research questions to foster objectivity in answering them.

Another potential risk regards whether we were exhaustive during data collection, i.e., whether we may have missed any significant publication in our review. This risk cannot be completely mitigated but to minimise this risk we deliberately chose to have simple and broad keywords giving more initial hits that later were further filtered out. Moreover, we conducted a snowballing process to extend our initial dataset looking for potentially relevant publications that our query did not select.

External validity regards the applicability of a set of results in a more general context and is not a concern for this study since we focus on the intersection of the fields of microservices and security without any attempt of generalising the findings to a broader context. We do not claim that either our qualitative or our quantitative findings should also hold for other large fields.

Internal validity is of concern when causal relations are examined when there is a risk that the investigated factor is also affected by a third factor. This thread is not a concern for this study because we presented only correlations between different factors but did not examine causal relations.

Reliability concerns to what extent the data collection and analysis depend on the actual researchers. This risk has been partially mitigated by selecting as many objective criteria as possible for the filtering and by requiring at least a two-people consensus in case of more subjective decisions. In particular, the retrieval of the publications was performed by using search engines. The first filtering of the results (Step 2, cf. “Review Method”) was conducted by running a script that uses objective criteria such as counting the number of keywords present and the length of the publication. These automatically computed results were double-checked by at least one author to prevent problems due to the parsing of PDFs and to make sure that the language of the publication was English. The second filtering (Step 3, cf. “Review Method”) performed by reading the title, abstract, and (if needed) the body of the publication, was performed in parallel by two authors. Decision conflicts were solved by discussion involving at least two authors until a consensus was reached. For the publication analysis (Step 4, cf. “Review Method”), due to the binary nature and formulation of the questions, the 20 research questions were answered by the author assigned to the publication. To detect possible observer bias and errors, we selected a random subset of 15 papers and had a different author answer to the research questions. The calculation of the kappa index of agreement as proposed in Cohen (1960) over the two result sets yielded a value of κ = 0.99998, giving us statistical confidence over the perceived precision of questions and objectiveness of answers.

The reliability of the study is strengthened by being open and explicit about the process of data collection and analysis. For transparency, reproducibility, and reuse, we report the data used in this study at https://doi.org/10.5281/zenodo.4774894, which includes both the final dataset with the answers to all the research questions and also the set of rejected publications along with the reason for exclusion.

We also report in the Appendix each entry of our dataset and its answers to our research questions.

Discussion and Future Directions

In this article, we presented a systematic review of the literature regarding microservice security. To conduct our research, we followed a structured approach that allowed us to gather 290 peer-reviewed publications, which, at the time of writing, constitutes the largest curated dataset on the topic.

To study our dataset, we conducted first an investigation on the metadata of the publications, which gave us some insight to map what are the publication outlets, the communities, and the key research concepts that characterise the field. Then, we performed an analysis, associating each element in our dataset to a vector of 20 different markers—presented in the form of 20 research questions.

Since our markers belong in four micro-groups (of threat-model, security, infrastructure, and development approaches), we used that partition to provide an overview of the literature through the lenses of each cluster. As a byproduct of our analysis on the content of each publication, we found concepts and topics that we did not include in our questions but that recur in multiple publications, e.g., the usage of blockchain or service-mesh technologies. To provide a more comprehensive picture of the field, we described and contextualised also these additional elements. Since our dataset forms a statistically relevant vector field, we also performed a correlation study over the components of the vectors and reported the strongest correlations (e.g., between intrusion-detection (IDS) and intrusion-prevention (IPS) systems in microservice deployments) along with possible explanations of the identified phenomena.

In the following, we draw a summary of the main open challenges that emerged from our study, which forms a call for action for the community of researchers and practitioners working in the field of microservice security and its neighbouring areas.

Data provenance: the distributed nature of microservices calls for the certification of their outputs, which other federated services receive as input and need to trust. However, there is a lack of best practices and/or standards for such a task.

Technology transfer: there exists a sensible amount of research on microservices security, but transferring those results—e.g., viable methods and tools for validation and verification—to the industry is difficult and applications are almost non-existent.

Security-by-design adoption: while many advocate for adopting security-by-design at all stages of a microservice lifecycle (from design to monitoring), there are no established references nor guidelines on how these principles can be reliably adopted in practice.

Dedicated attack trees and threat models: threats in microservice systems can come from multiple sources, from the interaction of the layers of a chosen technology stack to how microservices interact with each other—e.g., in an exclusive network, on a federated basis, on the Web, etc. Practitioners lack dedicated attack trees and threat models to help them consider and tackle the multifaceted attack surface of microservice architectures.

Comprehensive technological references: microservice development entails the use of (heterogeneous) technology stacks, whose combinations and interactions give way to exploits at different levels. These include data leakage due to host-container interactions, threats to encryption reliability due to interacting heterogeneous standards and data-format conversions, as well as surreptitious attacks through software libraries hijacking. Besides the lack of dedicated threat models, there is also a need for concrete references to secure specific technology stacks.

Migration to microservices: several works provide structures and methods to migrate legacy systems to microservices architectures. However, there are no established techniques to elicit the assumptions and invariants (e.g., on shared-memory communication, runtime environment, concurrent/interleaved database accesses, etc.) of the legacy system that the developers of the microservices must deal with—least of all considering how those factors impact the security aspects of the migrated architecture. An additional step in this direction would benefit from following principled security-by-design disciplines.

Global view/control: the distributed nature of microservices makes it difficult to check the correct implementation of architecture-wide security policies, especially when each microservice has a dedicated security configuration. The issue is further exacerbated by the DevOps practice of having different teams deal separately with all aspects of the microservices they develop, including the implementations of their security policies. This fact highlights the need for tools that provide global overviews and guarantees on the security policies, protocols, and invariants of microservice systems.

React & recover techniques: while the literature on preventive and detective measures against attacks abound, little has been done on how microservices should react to attacks and, as a consequence, recover their normal behaviour.

DevSecOps: Agile and DevOps practices are widely used when developing microservices, yet there is no established reference on how these approaches should integrate security in all their aspects (from team culture, management and communication to develop technologies and techniques) and into the lifecycle of microservices.

Fragmentation of outlets: researchers (and practitioners) working on microservices security do not have reference venues (neither journals nor conferences). This has at least two negative consequences. First, it makes it more difficult to gather the relevant work that constitutes the current state-of-the-art of their field—a need to which this study provides a partial solution, in the form of a snapshot of the current field landscape. Second, reference venues work also as gathering and exchange points for researchers to discuss current problems and new ideas, form interest groups, and concretise new contributions and projects to advance the knowledge in the field. Here, our call for action is at the community level, advocating for the establishment of a few reference, high-quality venues able to focus, inform, and orient the agenda of the field.

Regarding the future steps of the line of work of this contribution, we notice that here we focused our investigation on peer-reviewed publications. However, in the general field of microservices (and their security, by extension) the grey literature—which includes non-peer-reviewed reports, working papers, government documents (e.g., those by NIST), white papers—constitutes a relevant body of knowledge that deserves separate studies. As future work, we intend to pursue an activity similar to what we presented in this work, but purposed to investigate the grey literature.

Appendix

Dataset and Research Questions in tabular form

We partition the dataset into four tables, each representing the categorisation described in “Types of Publications”— (i) Theoretical, (ii) Applicative, and (iii) Theoretical and Applicative publications and iv) Survey. For each table we have 5 columns. The first 4 columns from the left (after the column containing the reference (“Ref.”) to the publication from the publications dataset) and grouped under the column group “Group” report the 4 Research Questions Groups as defined in “Research Questions”. The value shown indicates the amount of questions of each group the publications answered. The last column labeled “Q.Num.” presents the number of questions having a positive answer.

Ref. Group Q. Num.
G1 G2 G3 G4
Survey Publications
Sultan, Ahmad & Dimitriou (2019) 3 2 2 1 2,4,5,8,11,13,14,16
Cerny & Donahoo (2016) 0 0 1 0 13
Westerlund & Kratzke (2018) 0 1 1 1 11,15,16
Bandeira et al. (2019) 0 0 2 0 13,14
Ahmed et al. (2019) 0 1 1 0 8,13
Di Salle, Gallo & Pompilio (2016) 0 0 1 1 13,16
Bélair, Laniepce & Menaud (2019) 0 0 2 0 13,14
Márquez & Astudillo (2019) 2 0 2 0 2,4,13,14
Puliafito et al. (2019) 1 0 0 0 2
Manu et al. (2016) 0 2 1 1 8,11,13,17
Lysne et al. (2016) 2 0 1 0 3,4,13
Panduman, Sukaridhoto & Tjahjono (2019) 1 0 0 0 2
Casale et al. (2016) 0 0 1 1 13,16
Soldani, Tamburri & Van Den Heuvel (2018) 1 1 2 3 4,8,13,14,16–18
Almeida et al. (2017) 1 0 1 0 2,13
Yousefpour et al. (2019) 0 1 1 0 11,13
Trnka, Černý & Stickney (2018) 0 0 1 0 13
Adedugbe et al. (2019) 1 1 2 0 3,8,13,14
Lichtenthäler et al. (2019) 0 1 1 0 11,13
Mohsin & Janjua (2018) 0 1 1 1 11,13,17
Noura, Atiquzzaman & Gaedke (2019) 0 0 1 0 13
Rao et al. (2018) 0 1 1 0 11,13
Yang et al. (2014) 1 1 1 0 3,11,13
Yu et al. (2019) 1 1 2 1 2,8,13,14,16
Casalicchio & Iannucci (2020) 2 1 1 0 2,5,11,13
Plaza, Daz & Pérez (2018) 0 0 0 1 17
Di Francesco, Malavolta & Lago (2017) 2 0 0 2 4,5,16,17
Islam, Manivannan & Zeadally (2016) 3 1 0 0 2,4,5,8
Vale et al. (2019) 2 2 0 0 2,5,9,11
Bélair, Laniepce & Menaud (2019) 0 0 2 0 13,14
Márquez & Astudillo (2019) 2 0 2 0 2,4,13,14
Puliafito et al. (2019) 1 0 0 0 2
Manu et al. (2016) 0 2 1 1 8,11,13,17
Lysne et al. (2016) 2 0 1 0 3,4,13
Panduman, Sukaridhoto & Tjahjono (2019) 1 0 0 0 2
Casale et al. (2016) 0 0 1 1 13,16
Soldani, Tamburri & Van Den Heuvel (2018) 1 1 2 3 4,8,13,14,16,17,18
Almeida et al. (2017) 1 0 1 0 2,13
Yousefpour et al. (2019) 0 1 1 0 11,13
Sultan, Ahmad & Dimitriou (2019) 3 2 2 1 2,4,5,8,11,13,14,16
Ahmed et al. (2019) 0 1 1 0 8,13
Trnka, Černý & Stickney (2018) 0 0 1 0 13
Cerny & Donahoo (2016) 0 0 1 0 13
Ahmadvand et al. (2018) 2 7 3 3 2,3,6–18
Adedugbe et al. (2019) 1 1 2 0 3,8,13,14
Lichtenthäler et al. (2019) 0 1 1 0 11,13
Mohsin & Janjua (2018) 0 1 1 1 11,13,17
Niazi, Mishra & Gill (2018) 0 0 0 0
Noura, Atiquzzaman & Gaedke (2019) 0 0 1 0 13
Rao et al. (2018) 0 1 1 0 11,13
Yang et al. (2014) 1 1 1 0 3,11,13
Yu et al. (2019) 1 1 2 1 2,8,13,14,16
Casalicchio & Iannucci (2020) 2 1 1 0 2,5,11,13
Plaza, Daz & Pérez (2018) 0 0 0 1 17
Di Francesco, Malavolta & Lago (2017) 2 0 0 2 4,5,16,17
Westerlund & Kratzke (2018) 0 1 1 1 11,15,16
Islam, Manivannan & Zeadally (2016) 3 1 0 0 2,4,5,8
Vale et al. (2019) 2 2 0 0 2,5,9,11
Lie, Sánchez-Gordón & Colomo-Palacios (2020) 2 1 0 3 3,4,11,16,17,20
Ali, Caprolu & Pietro (2020) 4 0 0 0 2,3,4,5
de Sousa et al. (2020) 2 1 1 2 2,3,11,13,16,19
Adam & Alam (2020) 2 0 0 0 2,5
Delicato et al. (2020) 3 0 0 0 2,4,5
Mohamed, Challenger & Kardas (2020) 2 0 0 1 2,4,18
Waseem, Liang & Shahin (2020) 2 1 2 4 2,4,11,13,14,16–19
Mishra & Otaiwi (2020) 1 1 1 2 2,11,13,16,17
Niknejad et al. (2020) 1 1 0 0 2,11
Moura & Hutchison (2020) 2 0 0 0 2,4
de Araujo Zanella, da Silva & Albini (2020) 4 2 0 0 2,3,4,5,6,7
Mohamed, Challenger & Kardas (2020) 2 0 0 1 2,4,18
Razzaq (2020) 2 1 3 4 2,3,11,13–19
Wu et al. (2019) 1 2 0 0 2,6,11

Supplemental Information

Supplemental Information 1. LaTeX macros for pie chart by using PGF/Tikz package.
DOI: 10.7717/peerj-cs.779/supp-1
Supplemental Information 2. Makefile to automate the LaTeX build process.
DOI: 10.7717/peerj-cs.779/supp-2

Funding Statement

Fabrizio Montesi was supported by Villum Fonden, grant no. 29518, and by Independent Research Fund Denmark, grant no. 0135-00219. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

Footnotes

1

The list of the publications and their bibliography information is publicly available at https://doi.org/10.5281/zenodo.4774894.

2

We performed experiments with potentially more inclusive queries, such as “Microservice AND (Security OR Authorisation)”, as well. The tried queries, however, did not extend the search in any useful way since the term “Security” proved to be general enough to cover specialised aspects like authentication, authorisation, and (safe) communication.

Additional Information and Declarations

Competing Interests

The authors declare that they have no competing interests.

Author Contributions

Davide Berardi performed the experiments, performed the computation work, prepared figures and/or tables, and approved the final draft.

Saverio Giallorenzo conceived and designed the experiments, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.

Jacopo Mauro conceived and designed the experiments, authored or reviewed drafts of the paper, and approved the final draft.

Andrea Melis conceived and designed the experiments, performed the experiments, analyzed the data, performed the computation work, prepared figures and/or tables, and approved the final draft.

Fabrizio Montesi conceived and designed the experiments, authored or reviewed drafts of the paper, and approved the final draft.

Marco Prandini conceived and designed the experiments, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

The data is available on Zenodo: Davide Berardi, Saverio Giallorenzo, Jacopo Mauro, Andrea Melis, Fabrizio Montesi, & Marco Prandini. (2021). Microservice Security: A Systematic Literature Review, dataset (1.0) [Data set]. Zenodo. https://doi.org/10.5281/zenodo.5513580.

References

  • Abidi et al. (2019).Abidi S, Essafi M, Guegan CG, Fakhri M, Witti H, Ghezala HHB. A web service security governance approach based on dedicated micro-services. Procedia Computer Science. 2019;159(3):372–386. doi: 10.1016/j.procs.2019.09.192. [DOI] [Google Scholar]
  • Adam & Alam (2020).Adam A, Alam MM. The fog cloud of things: a survey on concepts, architecture, standards, tools, and applications. Iternet of Thing. 2020;9:100177. doi: 10.1016/j.iot.2020.100177. [DOI] [Google Scholar]
  • Adedugbe et al. (2019).Adedugbe O, Benkhelifa E, Campion R, Al-Obeidat F, Hani AB, Uchitha J. Leveraging cloud computing for the semantic web: review and trends. Soft Computing. 2019;24:5999–6014. doi: 10.1007/s00500-019-04559-2. [DOI] [Google Scholar]
  • Agarwal et al. (2019).Agarwal S, Malandrino F, Chiasserini CF, De S. VNF placement and resource allocation for the support of vertical services in 5g networks. IEEE/ACM Transactions on Networking. 2019;27(1):433–446. doi: 10.1109/TNET.2018.2890631. [DOI] [Google Scholar]
  • Ahmadvand & Ibrahim (2016).Ahmadvand M, Ibrahim A. Requirements reconciliation for scalable and secure microservice (de) composition. 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW); Piscataway: IEEE; 2016. pp. 68–73. [Google Scholar]
  • Ahmadvand et al. (2018).Ahmadvand M, Pretschner A, Ball K, Eyring D. Integrity protection against insiders in microservice-based infrastructures: from threats to a security framework. Federation of International Conferences on Software Technologies: Applications and Foundations; Berlin: Springer; 2018. pp. 573–588. [Google Scholar]
  • Ahmed et al. (2019).Ahmed AIA, Gani A, Ab Hamid SH, Abdelmaboud A, Syed HJ, Mohamed RAAH, Ali I. Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access. 2019;7:155472–155488. doi: 10.1109/ACCESS.2019.2948027. [DOI] [Google Scholar]
  • Akkermans et al. (2018).Akkermans S, Crispo B, Joosen W, Hughes D. Polyglot cerberos: resource security, interoperability and multi-tenancy for IoT services on a multilingual platform. Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services; 2018. pp. 59–68. [Google Scholar]
  • Alaluna et al. (2020).Alaluna M, Ferrolho L, Figueira JR, Neves N, Ramos FM. Secure multi-cloud virtual network embedding. Computer Communications. 2020;155(5):252–265. doi: 10.1016/j.comcom.2020.03.023. [DOI] [Google Scholar]
  • Ali, Caprolu & Pietro (2020).Ali IM, Caprolu M, Pietro RD. Foundations, properties, and security applications of puzzles: a survey. ACM Computing Surveys (CSUR) 2020;53(4):1–38. doi: 10.1145/3396374. [DOI] [Google Scholar]
  • Almeida et al. (2017).Almeida WHC, de Aguiar Monteiro L, Hazin RR, de Lima AC, Ferraz FS. Survey on microservice architecture-security, privacy and standardization on cloud computing environment. ICSEA 2017: The Twelfth International Conference on Software Engineering Advances; 2017. pp. 199–205. [Google Scholar]
  • Alshuqayran, Ali & Evans (2016).Alshuqayran N, Ali N, Evans R. A systematic mapping study in microservice architecture. 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA); Piscataway: IEEE; 2016. pp. 44–51. [Google Scholar]
  • Alulema et al. (2020).Alulema D, Criado J, Iribarne L, Fernández-Garca AJ, Ayala R. A model-driven engineering approach for the service integration of iot systems. Cluster Computing. 2020;23(3):1937–1954. doi: 10.1007/s10586-020-03150-x. [DOI] [Google Scholar]
  • Amir-Mohammadian & Kari (2020).Amir-Mohammadian S, Kari C. Correct audit logging in concurrent systems. Electronic Notes in Theoretical Computer Science. 2020;351:115–141. doi: 10.1016/j.entcs.2020.08.007. [DOI] [Google Scholar]
  • Andersen et al. (2017).Andersen MP, Kolb J, Chen K, Culler DE, Katz RH. Old democratizing authority in the built environment. In: Whitehouse K, Dutta P, Noh HY, editors. Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, BuildSys 2017. Delft: ACM; 2017. pp. 23:1–23:10. [Google Scholar]
  • Andersen et al. (2018).Andersen MP, Kolb J, Chen K, Fierro G, Culler DE, Katz R. Democratizing authority in the built environment. ACM Transactions on Sensor Networks (TOSN) 2018;14(3–4):1–26. doi: 10.1145/3199665. [DOI] [Google Scholar]
  • Anisetti et al. (2019).Anisetti M, Ardagna CA, Gaudenzi F, Damiani E. A continuous certification methodology for devops. Proceedings of the 11th International Conference on Management of Digital EcoSystems; 2019. pp. 205–212. [Google Scholar]
  • Avritzer et al. (2020).Avritzer A, Ferme V, Janes A, Russo B, van Hoorn A, Schulz H, Menasché D, Rufino V. Scalability assessment of microservice architecture deployment configurations: a domain-based approach leveraging operational profiles and load tests. Journal of Systems and Software. 2020;165(9):110564. doi: 10.1016/j.jss.2020.110564. [DOI] [Google Scholar]
  • Baarzi et al. (2020).Baarzi AF, Kesidis G, Fleck D, Stavrou A. Microservices made attack-resilient using unsupervised service fissioning. Proceedings of the 13th European Workshop on Systems Security; 2020. pp. 31–36. [Google Scholar]
  • Baboi, Iftene & Gfu (2019).Baboi M, Iftene A, Gfu D. Dynamic microservices to create scalable and fault tolerance architecture. Procedia Computer Science. 2019;159(3–4):1035–1044. doi: 10.1016/j.procs.2019.09.271. [DOI] [Google Scholar]
  • Badii et al. (2019).Badii C, Bellini P, Difino A, Nesi P, Pantaleo G, Paolucci M. Microservices suite for smart city applications. Sensors. 2019;19(21):4798. doi: 10.3390/s19214798. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • Baker & Nguyen (2019).Baker O, Nguyen Q. A novel approach to secure microservice architecture from owasp vulnerabilities. CITRENZ Conference 2019.2019. [Google Scholar]
  • Balalaie, Heydarnoori & Jamshidi (2016).Balalaie A, Heydarnoori A, Jamshidi P. Microservices architecture enables devops: migration to a cloud-native architecture. IEEE Software. 2016;33(3):42–52. doi: 10.1109/MS.2016.64. [DOI] [Google Scholar]
  • Bánáti et al. (2018).Bánáti A, Kail E, Karóczkai K, Kozlovszky M. Authentication and authorization orchestrator for microservice-based software architectures. 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO); Piscataway: IEEE; 2018. pp. 1180–1184. [Google Scholar]
  • Bandeira et al. (2019).Bandeira A, Medeiros CA, Paixao M, Maia PH. We need to talk about microservices: an analysis from the discussions on stackoverflow. 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR); Piscataway: IEEE; 2019. pp. 255–259. [Google Scholar]
  • Basso et al. (2017).Basso T, Moraes R, Antunes N, Vieira M, Santos W, Meira W. Privaaas: privacy approach for a distributed cloud-based data analytics platforms. 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID); Piscataway: IEEE; 2017. pp. 1108–1116. [Google Scholar]
  • Beekman & Porter (2017).Beekman JG, Porter DE. Challenges for scaling applications across enclaves. Proceedings of the 2nd Workshop on System Software for Trusted Execution; 2017. pp. 1–2. [Google Scholar]
  • Beheshti et al. (2019).Beheshti A, Benatallah B, Tabebordbar A, Motahari-Nezhad HR, Barukh MC, Nouri R. Datasynapse: a social data curation foundry. Distributed and Parallel Databases. 2019;37(3):351–384. doi: 10.1007/s10619-018-7245-1. [DOI] [Google Scholar]
  • Bélair, Laniepce & Menaud (2019).Bélair M, Laniepce S, Menaud J-M. Leveraging kernel security mechanisms to improve container security: a survey. Proceedings of the 14th International Conference on Availability, Reliability and Security; 2019. pp. 1–6. [Google Scholar]
  • Bertolino et al. (2020).Bertolino A, Angelis GD, Guerriero A, Miranda B, Pietrantuono R, Russo S. Devopret: continuous reliability testing in devops. Journal of Software: Evolution and Process. 2020:e2298. doi: 10.1002/smr.2298. [DOI] [Google Scholar]
  • Bhattacharya (2019).Bhattacharya R. Smart proxying for microservices. Proceedings of the 20th International Middleware Conference Doctoral Symposium; 2019. pp. 31–33. [Google Scholar]
  • Bobel, Gerostathopoulos & Bures (2020).Bobel M, Gerostathopoulos I, Bures T. A toolbox for realtime timeseries anomaly detection. 2020 IEEE International Conference on Software Architecture Companion (ICSA-C); Piscataway: IEEE; 2020. pp. 278–281. [Google Scholar]
  • Bogatinovski et al. (2020).Bogatinovski J, Nedelkoski S, Cardoso J, Kao O. Self-supervised anomaly detection from distributed traces. 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC); Piscataway: IEEE; 2020. pp. 342–347. [Google Scholar]
  • Bogner et al. (2019).Bogner J, Fritzsch J, Wagner S, Zimmermann A. Microservices in industry: insights into technologies, characteristics, and software quality. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C); Piscataway: IEEE; 2019. pp. 187–195. [Google Scholar]
  • Bozan, Lyytinen & Rose (2020).Bozan K, Lyytinen K, Rose GM. How to transition incrementally to microservice architecture. Communications of the ACM. 2020;64(1):79–85. doi: 10.1145/3378064. [DOI] [Google Scholar]
  • Brambilla, Umuhoza & Acerbis (2017).Brambilla M, Umuhoza E, Acerbis R. Model-driven development of user interfaces for IoT systems via domain-specific components and patterns. Journal of Internet Services and Applications. 2017;8(1):14. doi: 10.1186/s13174-017-0064-1. [DOI] [Google Scholar]
  • Brenner et al. (2017).Brenner S, Hundt T, Mazzeo G, Kapitza R. Secure cloud micro services using Intel SGX. IFIP International Conference on Distributed Applications and Interoperable Systems; Berlin: Springer; 2017. pp. 177–191. [Google Scholar]
  • Brito et al. (2019).Brito A, Fetzer C, Köpsell S, Pietzuch P, Pasin M, Felber P, Fonseca K, Rosa M, Gomes L, Riella R, Prado C, Rust LF, Lucani DE, Sipos M, Nagy L, Fehér M. Secure end-to-end processing of smart metering data. Journal of Cloud Computing. 2019;8(1):1–13. doi: 10.1186/s13677-019-0141-z. [DOI] [Google Scholar]
  • Bromberg & Gitzinger (2020).Bromberg Y-D, Gitzinger L. Droidautoml: a microservice architecture to automate the evaluation of android machine learning detection systems. IFIP International Conference on Distributed Applications and Interoperable Systems; Berlin: Springer; 2020. pp. 148–165. [Google Scholar]
  • Brondolin & Santambrogio (2020).Brondolin R, Santambrogio MD. A black-box monitoring approach to measure microservices runtime performance. ACM Transactions on Architecture and Code Optimization (TACO) 2020;17(4):1–26. doi: 10.1145/3418899. [DOI] [Google Scholar]
  • Brucker et al. (2017).Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M. Modelling, validating, and ranking of secure service compositions. Software: Practice and Experience. 2017;47(12):1923–1943. doi: 10.1002/spe.2513. [DOI] [Google Scholar]
  • Bumblauskas et al. (2020).Bumblauskas D, Mann A, Dugan B, Rittmer J. A blockchain use case in food distribution: do you know where your food has been? International Journal of Information Management. 2020;52(9):102008. doi: 10.1016/j.ijinfomgt.2019.09.004. [DOI] [Google Scholar]
  • Buzachis & Villari (2018).Buzachis A, Villari M. Basic principles of osmotic computing: secure and dependable microelements (mels) orchestration leveraging blockchain facilities. 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion); Piscataway: IEEE; 2018. pp. 47–52. [Google Scholar]
  • Callegati et al. (2016).Callegati F, Giallorenzo S, Melis A, Prandini M. Data security issues in maas-enabling platforms. 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI); Piscataway: IEEE; 2016. pp. 1–5. [Google Scholar]
  • Callegati et al. (2018).Callegati F, Giallorenzo S, Melis A, Prandini M. Cloud-of-things meets mobility-as-a-service: an insider threat perspective. Computers & Security. 2018;74(7):277–295. doi: 10.1016/j.cose.2017.10.006. [DOI] [Google Scholar]
  • Camilli et al. (2017).Camilli M, Bellettini C, Capra L, Monga M. A formal framework for specifying and verifying microservices based process flows. International Conference on Software Engineering and Formal Methods; Berlin: Springer; 2017. pp. 187–202. [Google Scholar]
  • Casale et al. (2019).Casale G, Artač M, van den Heuvel W-J, Van Hoorn A, Jakovits P, Leymann F, Long M, Papanikolaou V, Presenza D, Russo A, Srirama SN, Tamburri DA, Wurster M, Zhu L. Radon: rational decomposition and orchestration for serverless computing. SICS Software-Intensive Cyber-Physical Systems. 2019;35:77–87. doi: 10.1007/s00450-019-00413-w. [DOI] [Google Scholar]
  • Casale et al. (2016).Casale G, Chesta C, Deussen P, Di Nitto E, Gouvas P, Koussouris S, Stankovski V, Symeonidis A, Vlassiou V, Zafeiropoulos A, Zhao Z. Current and future challenges of software engineering for services and applications. Procedia Computer Science. 2016;97:34–42. doi: 10.1016/j.procs.2016.08.278. [DOI] [Google Scholar]
  • Casalicchio & Iannucci (2020).Casalicchio E, Iannucci S. The state-of-the-art in container technologies: application, orchestration and security. Concurrency and Computation: Practice and Experience. 2020;32(17):e5668. doi: 10.1002/cpe.5668. [DOI] [Google Scholar]
  • Cerny & Donahoo (2016).Cerny T, Donahoo MJ. Survey on concern separation in service integration. International Conference on Current Trends in Theory and Practice of Informatics; Springer; 2016. pp. 518–531. [Google Scholar]
  • Cerny, Sedlisky & Donahoo (2018).Cerny T, Sedlisky F, Donahoo MJ. On isolation-driven automated module decomposition. Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems; 2018. pp. 302–307. [Google Scholar]
  • Cerny et al. (2020).Cerny T, Svacina J, Das D, Bushong V, Bures M, Tisnovsky P, Frajtak K, Shin D, Huang J. On code analysis opportunities and challenges for enterprise systems and microservices. IEEE Access. 2020;8:159449–159470. doi: 10.1109/ACCESS.2020.3019985. [DOI] [Google Scholar]
  • Chandramouli (2019).Chandramouli R. Microservices-based application systems. NIST Special Publication. 2019;800:204. doi: 10.6028/NIST.SP.800-204. [DOI] [Google Scholar]
  • Chen (2019).Chen C-A. 2019 IEEE Cybersecurity Development (SecDev) Piscataway: IEEE; 2019. With great abstraction comes great responsibility: Sealing the microservices attack surface; p. 144. [Google Scholar]
  • Chen, Chen & Yu (2020).Chen H, Chen P, Yu G. A framework of virtual war room and matrix sketch-based streaming anomaly detection for microservice systems. IEEE Access. 2020;8:43413–43426. doi: 10.1109/ACCESS.2020.2977464. [DOI] [Google Scholar]
  • Chen, Huang & Chen (2019).Chen J, Huang H, Chen H. Informer: irregular traffic detection for containerized microservices rpc in the real world. Proceedings of the 4th ACM/IEEE Symposium on Edge Computing; New York: ACM; 2019. pp. 389–394. [Google Scholar]
  • Cheruvu et al. (2020).Cheruvu S, Kumar A, Smith N, Wheeler DM. Demystifying internet of things security: successful iot device/edge and platform security deployment. Berkeley: Springer Nature; 2020. [Google Scholar]
  • Chidambaram et al. (2019).Chidambaram N, Raj P, Thenmozhi K, Rajagopalan S, Amirtharajan R. A cloud compatible dna coded security solution for multimedia file sharing & storage. Multimedia Tools and Applications. 2019;78(23):33837–33863. doi: 10.1007/s11042-019-08166-z. [DOI] [Google Scholar]
  • Chondamrongkul, Sun & Warren (2020).Chondamrongkul N, Sun J, Warren I. Automated security analysis for microservice architecture. 2020 IEEE International Conference on Software Architecture Companion (ICSA-C); Piscataway: IEEE; 2020. pp. 79–82. [Google Scholar]
  • Ciavotta et al. (2017).Ciavotta M, Alge M, Menato S, Rovere D, Pedrazzoli P. A microservice-based middleware for the digital factory. Procedia Manufacturing. 2017;11:931–938. doi: 10.1016/j.promfg.2017.07.197. [DOI] [Google Scholar]
  • Clancy, McGwier & Chen (2019).Clancy TC, McGwier RW, Chen L. Post-quantum cryptography and 5g security: tutorial. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks; 2019. p. 285. [Google Scholar]
  • Clauset, Newman & Moore (2004).Clauset A, Newman ME, Moore C. Finding community structure in very large networks. Physical Review E. 2004;70(6):066111. doi: 10.1103/PhysRevE.70.066111. [DOI] [PubMed] [Google Scholar]
  • Cleveland et al. (2020).Cleveland SB, Jamthe A, Padhy S, Stubbs J, Packard M, Looney J, Terry S, Cardone R, Dahan M, Jacobs GA. Tapis api development with python: best practices in scientific rest api implementation: experience implementing a distributed stream api. Practice and Experience in Advanced Research Computing; 2020. pp. 181–187. [Google Scholar]
  • Cohen (1960).Cohen J. A coefficient of agreement for nominal scales. Educational and Psychological Measurement. 1960;20(1):37–46. doi: 10.1177/001316446002000104. [DOI] [Google Scholar]
  • Copei, Wickert & Zündorf (2020).Copei S, Wickert M, Zündorf A. Certification as a service. In: Paasivaara M, Kruchten P, editors. Agile Processes in Software Engineering and Extreme Programming – Workshops. Cham: Springer International Publishing; 2020. pp. 203–210. [Google Scholar]
  • Costa, Pires & Delicato (2020).Costa B, Pires PF, Delicato FC. Towards the adoption of omg standards in the development of soa-based iot systems. Journal of Systems and Software. 2020;169(1):110720. doi: 10.1016/j.jss.2020.110720. [DOI] [Google Scholar]
  • da Silva, de Oliveira Silva & Brito (2019).da Silva MSL, de Oliveira Silva FF, Brito A. Squad: a secure, simple storage service for SGX-based microservices. 2019 9th Latin-American Symposium on Dependable Computing (LADC); Piscataway: IEEE; 2019. pp. 1–9. [Google Scholar]
  • Damis et al. (2020).Damis HA, Shehada D, Fachkha C, Gawanmeh A, Al-Karaki JN. A microservices architecture for ads-b data security using blockchain. 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS); Piscataway: IEEE; 2020. pp. 1–4. [Google Scholar]
  • Dash et al. (2020).Dash PB, Nayak J, Naik B, Oram E, Islam SH. Model based iot security framework using multiclass adaptive boosting with smote. Security and Privacy. 2020;3(5):e112. doi: 10.1002/spy2.112. [DOI] [Google Scholar]
  • Díaz-Sánchez et al. (2019).Díaz-Sánchez D, Marín-Lopez A, Almenárez Mendoza F, Arias Cabarcos P. DNS/DANE collision-based distributed and dynamic authentication for microservices in IoT. Sensors. 2019;19(15):3292. doi: 10.3390/s19153292. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • de Araujo Zanella, da Silva & Albini (2020).de Araujo Zanella AR, da Silva E, Albini LCP. Security challenges to smart agriculture: current state, key issues, and future directions. Array. 2020;8(August):100048. doi: 10.1016/j.array.2020.100048. [DOI] [Google Scholar]
  • De Donno et al. (2019).De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M. Cyber-storms come from clouds: security of cloud computing in the iot era. Future Internet. 2019;11(6):127. doi: 10.3390/fi11060127. [DOI] [Google Scholar]
  • de Oliveira Rosa et al. (2020).de Oliveira Rosa T, Daniel JFL, Guerra EM, Goldman A. A method for architectural trade-off analysis based on patterns: evaluating microservices structural attributes. Proceedings of the European Conference on Pattern Languages of Programs 2020; 2020. pp. 1–8. [Google Scholar]
  • de Sousa et al. (2020).de Sousa PS, Nogueira NP, dos Santos RC, Maia PHM, de Souza JT. Building a prototype based on microservices and blockchain technologies for notary’s office: an academic experience report. 2020 IEEE International Conference on Software Architecture Companion (ICSA-C); Piscataway: IEEE; 2020. pp. 122–129. [Google Scholar]
  • de Toledo, Martini & Sjøberg (2020).de Toledo SS, Martini A, Sjøberg DI. Improving agility by managing shared libraries in microservices. International Conference on Agile Software Development; Berlin: Springer; 2020. pp. 195–202. [Google Scholar]
  • Death (2017).Death D. Information security handbook: develop a threat model and incident response strategy to build a strong information security framework. Birmingham: Packt Publishing Ltd; 2017. [Google Scholar]
  • Delicato et al. (2020).Delicato FC, Al-Anbuky A, Kevin I, Wang K. Smart cyber-physical systems: toward pervasive intelligence systems. 2020. https://www.sciencedirect.com/science/article/abs/pii/S0167739X19316619 https://www.sciencedirect.com/science/article/abs/pii/S0167739X19316619
  • Demoulin et al. (2018).Demoulin HM, Vaidya T, Pedisich I, DiMaiolo B, Qian J, Shah C, Zhang Y, Chen A, Haeberlen A, Loo BT, Phan LTX, Sherr M, Shields C, Zhou W. Dedos: defusing dos with dispersion oriented software. Proceedings of the 34th Annual Computer Security Applications Conference; 2018. pp. 712–722. [Google Scholar]
  • DesLauriers et al. (2020).DesLauriers J, Kiss T, Ariyattu RC, Dang H-V, Ullah A, Bowden J, Krefting D, Pierantoni G, Terstyanszky G. Cloud apps to-go: cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience. 2020;33(19):e6093. doi: 10.1002/cpe.6093. [DOI] [Google Scholar]
  • Dewanta (2020).Dewanta F. Secure microservices deployment for fog computing services in a remote office. 2020 3rd International Conference on Information and Communications Technology (ICOIACT); Piscataway: IEEE; 2020. pp. 425–430. [Google Scholar]
  • Di Ciccio et al. (2019).Di Ciccio C, Cecconi A, Dumas M, Garca-Bañuelos L, López-Pintado O, Lu Q, Mendling J, Ponomarev A, Tran AB, Weber I. Blockchain support for collaborative business processes. Informatik Spektrum. 2019;42(3):182–190. doi: 10.1007/s00287-019-01178-x. [DOI] [Google Scholar]
  • Di Francesco, Lago & Malavolta (2019).Di Francesco P, Lago P, Malavolta I. Architecting with microservices: a systematic mapping study. Journal of Systems and Software. 2019;150(1):77–97. doi: 10.1016/j.jss.2019.01.001. [DOI] [Google Scholar]
  • Di Francesco, Malavolta & Lago (2017).Di Francesco P, Malavolta I, Lago P. Research on architecting microservices: trends, focus, and potential for industrial adoption. 2017 IEEE International Conference on Software Architecture (ICSA); Piscataway: IEEE; 2017. pp. 21–30. [Google Scholar]
  • Di Salle, Gallo & Pompilio (2016).Di Salle A, Gallo F, Pompilio C. Composition of advanced (μ) services for the next generation of the internet of things. Federation of International Conferences on Software Technologies: Applications and Foundations; Berlin: Springer; 2016. pp. 436–444. [Google Scholar]
  • Di Sanzo, Avresky & Pellegrini (2021).Di Sanzo P, Avresky DR, Pellegrini A. Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies. Software: Practice and Experience. 2021;51(1):46–71. doi: 10.1002/spe.2908. [DOI] [Google Scholar]
  • Diekmann et al. (2018).Diekmann C, Naab J, Korsten A, Carle G. Agile network access control in the container age. IEEE Transactions on Network and Service Management. 2018;16(1):41–55. doi: 10.1109/TNSM.2018.2889009. [DOI] [Google Scholar]
  • Dilshan et al. (2020).Dilshan D, Piumika S, Rupasinghe C, Perera I, Siriwardena P. Mschain: blockchain based decentralized certificate transparency for microservices. 2020 Moratuwa Engineering Research Conference (MERCon); Piscataway: IEEE; 2020. pp. 1–6. [Google Scholar]
  • Dragoni et al. (2017).Dragoni N, Giallorenzo S, Lafuente AL, Mazzara M, Montesi F, Mustafin R, Safina L. Microservices: yesterday, today, and tomorrow. Cham: Springer International Publishing; 2017. pp. 195–216. [Google Scholar]
  • Du et al. (2020).Du D, Yu T, Xia Y, Zang B, Yan G, Qin C, Wu Q, Chen H. Catalyzer: sub-millisecond startup for serverless computing with initialization-less booting. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems; 2020. pp. 467–481. [Google Scholar]
  • Du, Xie & He (2018).Du Q, Xie T, He Y. Anomaly detection and diagnosis for container-based microservices with performance monitoring. International Conference on Algorithms and Architectures for Parallel Processing; Berlin: Springer; 2018. pp. 560–572. [Google Scholar]
  • Elsayed & Zulkernine (2019).Elsayed M, Zulkernine M. Offering security diagnosis as a service for cloud saas applications. Journal of Information Security and Applications. 2019;44(5):32–48. doi: 10.1016/j.jisa.2018.11.006. [DOI] [Google Scholar]
  • Esparrachiari, Reilly & Rentz (2018).Esparrachiari S, Reilly T, Rentz A. Tracking and controlling microservice dependencies. Queue. 2018;16(4):44–65. doi: 10.1145/3277539.3277541. [DOI] [Google Scholar]
  • Esposito et al. (2017).Esposito C, Castiglione A, Tudorica C-A, Pop F. Security and privacy for cloud-based data management in the health network service chain: a microservice approach. IEEE Communications Magazine. 2017;55(9):102–108. doi: 10.1109/MCOM.2017.1700089. [DOI] [Google Scholar]
  • Fahmideh & Zowghi (2020).Fahmideh M, Zowghi D. An exploration of iot platform development. Information Systems. 2020;87(10):101409. doi: 10.1016/j.is.2019.06.005. [DOI] [Google Scholar]
  • Falah et al. (2020).Falah MF, Sukaridhoto S, Al Rasyid MUH, Wicaksono H. Design of virtual engineering and digital twin platform as implementation of cyber-physical systems. Procedia Manufacturing. 2020;52(5):331–336. doi: 10.1016/j.promfg.2020.11.055. [DOI] [Google Scholar]
  • Fetzer et al. (2017).Fetzer C, Mazzeo G, Oliver J, Romano L, Verburg M. Integrating reactive cloud applications in sereca. Proceedings of the 12th International Conference on Availability, Reliability and Security; 2017. pp. 1–8. [Google Scholar]
  • Flora (2020).Flora J. Improving the security of microservice systems by detecting and tolerating intrusions. 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW); Piscataway: IEEE; 2020. pp. 131–134. [Google Scholar]
  • Flora, Gonçalves & Antunes (2020).Flora J, Gonçalves P, Antunes N. Using attack injection to evaluate intrusion detection effectiveness in container-based systems. 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC); Piscataway: IEEE; 2020. pp. 60–69. [Google Scholar]
  • Forti, Ferrari & Brogi (2020).Forti S, Ferrari G-L, Brogi A. Secure cloud-edge deployments, with trust. Future Generation Computer Systems. 2020;102(9):775–788. doi: 10.1016/j.future.2019.08.020. [DOI] [Google Scholar]
  • Garg & Garg (2019).Garg S, Garg S. Automated cloud infrastructure, continuous integration and continuous delivery using docker with robust container security. 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR); Piscataway: IEEE; 2019. pp. 467–470. [Google Scholar]
  • Garriga (2017).Garriga M. Towards a taxonomy of microservices architectures. International Conference on Software Engineering and Formal Methods; Berlin: Springer; 2017. pp. 203–218. [Google Scholar]
  • George & Mahmoud (2017).George VM, Mahmoud QH. 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Vol. 1. Piscataway: IEEE; 2017. Claimsware: a claims-based middleware for securing iot services; pp. 649–654. [Google Scholar]
  • Gerking & Schubert (2019).Gerking C, Schubert D. Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures. 2019 IEEE International Conference on Software Architecture (ICSA); Piscataway: IEEE; 2019. pp. 61–70. [Google Scholar]
  • Ghayyur et al. (2018).Ghayyur SAK, Razzaq A, Ullah S, Ahmed S. Matrix clustering based migration of system application to microservices architecture. International Journal of Advanced Computer Science and Applications. 2018;9(1):284–296. doi: 10.14569/IJACSA.2018.090139. [DOI] [Google Scholar]
  • Ghuge et al. (2020).Ghuge SS, Kumar N, Savitha S, Suraj V. Multilayer technique to secure data transfer in private cloud for saas applications. 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA); Piscataway: IEEE; 2020. pp. 646–651. [Google Scholar]
  • Giaimo, Andrade & Berger (2020).Giaimo F, Andrade H, Berger C. Continuous experimentation and the cyber-physical systems challenge: an overview of the literature and the industrial perspective. Journal of Systems and Software. 2020;170(2):110781. doi: 10.1016/j.jss.2020.110781. [DOI] [Google Scholar]
  • Gorige et al. (2020).Gorige D, Al-Masri E, Kanzhelev S, Fattah H. Privacy-risk detection in microservices composition using distributed tracing. 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE); Piscataway: IEEE; 2020. pp. 250–253. [Google Scholar]
  • Guija & Siddiqui (2018).Guija D, Siddiqui MS. Identity and access control for micro-services based 5g nfv platforms. Proceedings of the 13th International Conference on Availability, Reliability and Security; 2018. pp. 1–10. [Google Scholar]
  • Gupta, Venkatachalapathy & Jeberla (2019).Gupta RK, Venkatachalapathy M, Jeberla FK. Challenges in adopting continuous delivery and devops in a globally distributed product team: a case study of a healthcare organization. 2019 ACM/IEEE 14th International Conference on Global Software Engineering (ICGSE); Piscataway: IEEE; 2019. pp. 30–34. [Google Scholar]
  • Hahn, Davidson & Bardas (2020).Hahn DA, Davidson D, Bardas AG. Mismesh: Security issues and challenges in service meshes. International Conference on Security and Privacy in Communication Systems; Berlin: Springer; 2020. pp. 140–151. [Google Scholar]
  • Hajek et al. (2020).Hajek J, Rashid M, Sevil M, Cinar A, Alvarez Fernandez PA, Jain D. The necessity of interdisciplinary software development for building viable research platforms: case study in automated drug delivery in diabetes. Proceedings of the 21st Annual Conference on Information Technology Education; 2020. pp. 390–396. [Google Scholar]
  • Han et al. (2019).Han J, Kim S, Kim T, Han D. Toward scaling hardware security module for emerging cloud services. Proceedings of the 4th Workshop on System Software for Trusted Execution; 2019. pp. 1–6. [Google Scholar]
  • Hang, Ullah & Kim (2020).Hang L, Ullah I, Kim D-H. A secure fish farm platform based on blockchain for agriculture data integrity. Computers and Electronics in Agriculture. 2020;170(1–3):105251. doi: 10.1016/j.compag.2020.105251. [DOI] [Google Scholar]
  • Hannousse & Yahiouche (2020).Hannousse A, Yahiouche S. Securing microservices and microservice architectures: a systematic mapping study. 2020. https://www.sciencedirect.com/science/article/abs/pii/S1574013721000551 https://www.sciencedirect.com/science/article/abs/pii/S1574013721000551
  • Haque, Iwaya & Babar (2020).Haque MU, Iwaya LH, Babar MA. Challenges in docker development: a large-scale study using stack overflow. Proceedings of the 14th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM); 2020. pp. 1–11. [Google Scholar]
  • Hasan & Starly (2020).Hasan M, Starly B. Decentralized cloud manufacturing-as-a-service (cmaas) platform architecture with configurable digital assets. Journal of Manufacturing Systems. 2020;56(2):157–174. doi: 10.1016/j.jmsy.2020.05.017. [DOI] [Google Scholar]
  • He & Yang (2017).He X, Yang X. Authentication and authorization of end user in microservice architecture. Journal of Physics: Conference Series. 2017;910:012060. doi: 10.1088/1742-6596/910/1/012060. [DOI] [Google Scholar]
  • Hendrickson et al. (2016).Hendrickson S, Sturdevant S, Harter T, Venkataramani V, Arpaci-Dusseau AC, Arpaci-Dusseau RH. Serverless computation with openlambda. 8th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 16).2016. [Google Scholar]
  • Hole (2016).Hole JK. Anti-fragile ICT systems. Berlin: Springer-Verlag GmbH; 2016. [Google Scholar]
  • Hsu (2018).Hsu TH-C. Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps. Birmingham: Packt Publishing Ltd; 2018. [Google Scholar]
  • Ibrahim, Bozhinoski & Pretschner (2019).Ibrahim A, Bozhinoski S, Pretschner A. Attack graph generation for microservice architecture. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing; 2019. pp. 1235–1242. [Google Scholar]
  • Iraqi & El Bakkali (2020).Iraqi O, El Bakkali H. Immunizer: a scalable loosely-coupled self-protecting software framework using adaptive microagents and parallelized microservices. 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE); Piscataway: IEEE; 2020. pp. 24–27. [Google Scholar]
  • Islam, Manivannan & Zeadally (2016).Islam T, Manivannan D, Zeadally S. A classification and characterization of security threats in cloud computing. International Journal of Next-Generation Computing. 2016;7(1):307. doi: 10.47164/ijngc.v7i1.307. [DOI] [Google Scholar]
  • Jan et al. (2019).Jan S, Panichella A, Arcuri A, Briand L. Search-based multi-vulnerability testing of xml injections in web applications. Empirical Software Engineering. 2019;24(6):3696–3729. doi: 10.1007/s10664-019-09707-8. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • Jander, Braubach & Pokahr (2018).Jander K, Braubach L, Pokahr A. Defense-in-depth and role authentication for microservice systems. Procedia Computer Science. 2018;130(2):456–463. doi: 10.1016/j.procs.2018.04.047. [DOI] [Google Scholar]
  • Jander, Braubach & Pokahr (2019).Jander K, Braubach L, Pokahr A. Practical defense-in-depth solution for microservice systems. Journal of Ubiquitous Systems & Pervasive Networks. 2019;11(1):17–25. doi: 10.5383/JUSPN.11.01.003. [DOI] [Google Scholar]
  • Janjua et al. (2020).Janjua K, Shah MA, Almogren A, Khattak HA, Maple C, Din IU. Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies. Electronics. 2020;9(7):1172. doi: 10.3390/electronics9071172. [DOI] [Google Scholar]
  • Javed et al. (2020).Javed A, Robert J, Heljanko K, Främling K. Iotef: a federated edge-cloud architecture for fault-tolerant iot applications. Journal of Grid Computing. 2020;18(1):1–24. doi: 10.1007/s10723-019-09498-8. [DOI] [Google Scholar]
  • Jaworski, Karwowski & Rusek (2019).Jaworski J, Karwowski W, Rusek M. Microservice-based cloud application ported to unikernels: performance comparison of different technologies. International Conference on Information Systems Architecture and Technology; Berlin: Springer; 2019. pp. 255–264. [Google Scholar]
  • Jin et al. (2019).Jin H, Li Z, Zou D, Yuan B. Dseom: a framework for dynamic security evaluation and optimization of mtd in container-based cloud. IEEE Transactions on Dependable and Secure Computing. 2019;18(3):1125–1136. doi: 10.1109/TDSC.2019.2916666. [DOI] [Google Scholar]
  • Jin et al. (2020).Jin M, Lv A, Zhu Y, Wen Z, Zhong Y, Zhao Z, Wu J, Li H, He H, Chen F. An anomaly detection algorithm for microservice architecture based on robust principal component analysis. IEEE Access. 2020;8:226397–226408. doi: 10.1109/ACCESS.2020.3044610. [DOI] [Google Scholar]
  • Jita & Pieterse (2018).Jita H, Pieterse V. A framework to apply the internet of things for medical care in a home environment. Proceedings of the 2018 International Conference on Cloud Computing and Internet of Things; 2018. pp. 45–54. [Google Scholar]
  • Joseph & Chandrasekaran (2019).Joseph CT, Chandrasekaran K. Straddling the crevasse: a review of microservice software architecture foundations and recent advancements. Software: Practice and Experience. 2019;49(10):1448–1484. doi: 10.1002/spe.2729. [DOI] [Google Scholar]
  • Kallergis et al. (2020).Kallergis D, Garofalaki Z, Katsikogiannis G, Douligeris C. Capodaz: a containerised authorisation and policy-driven architecture using microservices. Ad Hoc Networks. 2020;104(Pt. 3):102153. doi: 10.1016/j.adhoc.2020.102153. [DOI] [Google Scholar]
  • Kalske, Mäkitalo & Mikkonen (2017).Kalske M, Mäkitalo N, Mikkonen T. Challenges when moving from monolith to microservice architecture. International Conference on Web Engineering; Berlin: Springer; 2017. pp. 32–47. [Google Scholar]
  • Kamble & Sinha (2016).Kamble KG, Sinha A. 2016. https://www.patentguru.com/US2016381076A1 https://www.patentguru.com/US2016381076A1 US Patent App. 15/191,420.
  • Kang, Shin & Kim (2019).Kang M, Shin J-S, Kim J. Protected coordination of service mesh for container-based 3-tier service traffic. 2019 International Conference on Information Networking (ICOIN); Piscataway: IEEE; 2019. pp. 427–429. [Google Scholar]
  • Kang et al. (2018).Kang R, Zhou Z, Liu J, Zhou Z, Xu S. Distributed monitoring system for microservices-based iot middleware system. International Conference on Cloud Computing and Security; Berlin: Springer; 2018. pp. 467–477. [Google Scholar]
  • Kapferer & Zimmermann (2020).Kapferer S, Zimmermann O. Domain-driven service design. Symposium and Summer School on Service-Oriented Computing; Berlin: Springer; 2020. pp. 189–208. [Google Scholar]
  • Kathiravelu, Van Roy & Veiga (2019).Kathiravelu P, Van Roy P, Veiga L. SD-CPS: software-defined cyber-physical systems. taming the challenges of CPS with workflows at the edge. Cluster Computing. 2019;22(3):661–677. doi: 10.1007/s10586-018-2874-8. [DOI] [Google Scholar]
  • Ke, Wu & Yang (2020).Ke H, Wu H, Yang D. Towards evolving security requirements of industrial internet: a layered security architecture solution based on data transfer techniques. Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies; 2020. pp. 504–511. [Google Scholar]
  • Kelbert et al. (2017).Kelbert F, Gregor F, Pires R, Köpsell S, Pasin M, Havet A, Schiavoni V, Felber P, Fetzer C, Pietzuch P. Securecloud: secure big data processing in untrusted clouds. Design, Automation & Test in Europe Conference & Exhibition (DATE); Piscataway: IEEE; 2017. pp. 282–285. [Google Scholar]
  • Khan & Shameem (2020).Khan AA, Shameem M. Multicriteria decision-making taxonomy for devops challenging factors using analytical hierarchy process. Journal of Software: Evolution and Process. 2020;32(10):e2263. doi: 10.1002/smr.2263. [DOI] [Google Scholar]
  • Kochovski et al. (2019).Kochovski P, Gec S, Stankovski V, Bajec M, Drobintsev PD. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems. 2019;101(4):747–759. doi: 10.1016/j.future.2019.07.030. [DOI] [Google Scholar]
  • Kohnfelder & Garg (1999).Kohnfelder L, Garg P. The threats to our products. Redmond: Microsoft Interface, Microsoft Corporation; 1999. [Google Scholar]
  • Krämer, Frese & Kuijper (2019).Krämer M, Frese S, Kuijper A. Implementing secure applications in smart city clouds using microservices. Future Generation Computer Systems. 2019;99(1):308–320. doi: 10.1016/j.future.2019.04.042. [DOI] [Google Scholar]
  • Krishnan, Duttagupta & Achuthan (2019).Krishnan P, Duttagupta S, Achuthan K. SDN/NFV security framework for fog-to-things computing infrastructure. Software: Practice and Experience. 2019;50(5):757–800. doi: 10.1002/spe.2761. [DOI] [Google Scholar]
  • Kumar & Goyal (2020).Kumar R, Goyal R. Modeling continuous security: a conceptual model for automated devsecops using open-source software over cloud (adoc) Computers & Security. 2020;97(1):101967. doi: 10.1016/j.cose.2020.101967. [DOI] [Google Scholar]
  • Kwon et al. (2020).Kwon S, Son S-J, Choi Y, Lee J-H. Protocol fuzzing to find security vulnerabilities of rabbitMQ. Concurrency and Computation: Practice and Experience. 2020;33(23):e6012. doi: 10.1002/cpe.6012. [DOI] [Google Scholar]
  • Lakhan & Li (2020).Lakhan A, Li X. Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks. Computing. 2020;102(1):105–139. doi: 10.1007/s00607-019-00733-4. [DOI] [Google Scholar]
  • Łaskawiec, Choraś & Kozik (2019).Łaskawiec S, Choraś M, Kozik R. New solutions for exposing clustered applications deployed in the cloud. Cluster Computing. 2019;22(3):829–838. doi: 10.1007/s10586-018-2850-3. [DOI] [Google Scholar]
  • Leite et al. (2017).Leite AF, Alves V, Rodrigues GN, Tadonki C, Eisenbeis C, de Melo ACMA. Dohko: an autonomic system for provision, configuration, and management of inter-cloud environments based on a software product line engineering method. Cluster Computing. 2017;20(3):1951–1976. doi: 10.1007/s10586-017-0897-1. [DOI] [Google Scholar]
  • Leite et al. (2020).Leite L, Kon F, Pinto G, Meirelles P. Platform teams: an organizational structure for continuous delivery. Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops; 2020. pp. 505–511. [Google Scholar]
  • Leite et al. (2019).Leite L, Rocha C, Kon F, Milojicic D, Meirelles P. A survey of devops concepts and challenges. ACM Computing Surveys (CSUR) 2019;52(6):1–35. doi: 10.1145/3359981. [DOI] [Google Scholar]
  • Lenarduzzi et al. (2020).Lenarduzzi V, Lomio F, Saarimäki N, Taibi D. Does migrating a monolithic system to microservices decrease the technical debt? Journal of Systems and Software. 2020;169(1):110710. doi: 10.1016/j.jss.2020.110710. [DOI] [Google Scholar]
  • Li et al. (2018).Li H, Hu H, Gu G, Ahn G-J, Zhang F. VNIDS: towards elastic security with safe and efficient virtualization of network intrusion detection systems. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; 2018. pp. 17–34. [Google Scholar]
  • Li et al. (2020).Li S, Xu Q, Hou P, Chen X, Wang Y, Zhang H, Rong G. Exploring the challenges of developing and operating consortium blockchains: a case study. Proceedings of the Evaluation and Assessment in Software Engineering; New York: ACM; 2020. pp. 398–404. [Google Scholar]
  • Li et al. (2019a).Li W, Lemieux Y, Gao J, Zhao Z, Han Y. Service mesh: challenges, state of the art, and future research opportunities. 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE); Piscataway: IEEE; 2019a. pp. 122–1225. [Google Scholar]
  • Li et al. (2019b).Li Z, Jin H, Zou D, Yuan B. Exploring new opportunities to defeat low-rate ddos attack in container-based cloud environment. IEEE Transactions on Parallel and Distributed Systems. 2019b;31(3):695–706. doi: 10.1109/TPDS.2019.2942591. [DOI] [Google Scholar]
  • Liang & Zhao (2020).Liang X, Zhao Q. On the design of a blockchain-based student quality assessment system. 2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS); Piscataway: IEEE; 2020. pp. 1–7. [Google Scholar]
  • Lichtenthäler et al. (2019).Lichtenthäler R, Prechtl M, Schwille C, Schwartz T, Cezanne P, Wirtz G. Requirements for a model-driven cloud-native migration of monolithic web-based applications. SICS Software-Intensive Cyber-Physical Systems. 2019;35:1–12. doi: 10.1007/s00450-019-00414-9. [DOI] [Google Scholar]
  • Lie, Sánchez-Gordón & Colomo-Palacios (2020).Lie MF, Sánchez-Gordón M, Colomo-Palacios R. Devops in an iso 13485 regulated environment: a multivocal literature review. Proceedings of the 14th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM); New York: ACM; 2020. pp. 1–11. [Google Scholar]
  • Liu et al. (2020).Liu P, Xu H, Ouyang Q, Jiao R, Chen Z, Zhang S, Yang J, Mo L, Zeng J, Xue W, Pei D. Unsupervised detection of microservice trace anomalies through service-level deep Bayesian networks. 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE); Piscataway: IEEE; 2020. pp. 48–58. [Google Scholar]
  • Lou et al. (2020).Lou P, Lu G, Jiang X, Xiao Z, Hu J, Yan J. Cyber intrusion detection through association rule mining on multi-source logs. Applied Intelligence. 2020;51:1–15. doi: 10.1007/s10489-020-02007-5. [DOI] [Google Scholar]
  • Lu et al. (2017).Lu D, Huang D, Walenstein A, Medhi D. A secure microservice framework for IoT. 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE); Piscataway: IEEE; 2017. pp. 9–18. [Google Scholar]
  • Lu et al. (2021).Lu Q, Binh Tran A, Weber I, O’Connor H, Rimba P, Xu X, Staples M, Zhu L, Jeffery R. Integrated model-driven engineering of blockchain applications for business processes and asset management. Software: Practice and Experience. 2021;51(5):1059–1079. doi: 10.1002/spe.2931. [DOI] [Google Scholar]
  • Luntovskyy & Shubyn (2020).Luntovskyy A, Shubyn B. Highly-distributed systems based on micro-services and their construction paradigms. 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET); Piscataway: IEEE; 2020. pp. 7–14. [Google Scholar]
  • Luo, Ren & Zhang (2018).Luo X, Ren F, Zhang T. High performance userspace networking for containerized microservices. International Conference on Service-Oriented Computing; Berlin: Springer; 2018. pp. 57–72. [Google Scholar]
  • Lwakatare et al. (2019).Lwakatare LE, Kilamo T, Karvonen T, Sauvola T, Heikkilä V, Itkonen J, Kuvaja P, Mikkonen T, Oivo M, Lassenius C. Devops in practice: a multiple case study of five companies. Information and Software Technology. 2019;114(8):217–230. doi: 10.1016/j.infsof.2019.06.010. [DOI] [Google Scholar]
  • Lysne et al. (2016).Lysne O, Hole KJ, Otterstad C, Ytrehus Ø, Aarseth R, Tellnes J. Vendor malware: detection limits and mitigation. Computer. 2016;49(8):62–69. doi: 10.1109/MC.2016.227. [DOI] [Google Scholar]
  • Ma et al. (2020).Ma M, Xu J, Wang Y, Chen P, Zhang Z, Wang P. Automap: diagnose your microservice-based web applications automatically. Proceedings of The Web Conference 2020; 2020. pp. 246–258. [Google Scholar]
  • Maati & Saidouni (2020).Maati B, Saidouni DE. Ciotas protocol: cloudiot available services protocol through autonomic computing against distributed denial of services attacks. Journal of Ambient Intelligence and Humanized Computing. 2020;72(1–2):1–30. doi: 10.1007/s12652-020-02556-0. [DOI] [Google Scholar]
  • Mann (2020).Mann ZA. Secure software placement and configuration. Future Generation Computer Systems. 2020;110(8):243–253. doi: 10.1016/j.future.2020.03.064. [DOI] [Google Scholar]
  • Mansfield-Devine (2018).Mansfield-Devine S. Devops: finding room for security. Network Security. 2018;2018(7):15–20. doi: 10.1016/S1353-4858(18)30070-9. [DOI] [Google Scholar]
  • Manu et al. (2016).Manu A, Patel JK, Akhtar S, Agrawal V, Murthy KBS. Docker container security via heuristics-based multilateral security-conceptual and pragmatic study. 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT); Piscataway: IEEE; 2016. pp. 1–14. [Google Scholar]
  • Marchal, Cholez & Festor (2018).Marchal X, Cholez T, Festor O. μ NDN: an orchestrated microservice architecture for named data networking. Proceedings of the 5th ACM Conference on Information-Centric Networking; New York: ACM; 2018. pp. 12–23. [Google Scholar]
  • Márquez & Astudillo (2019).Márquez G, Astudillo H. Identifying availability tactics to support security architectural design of microservice-based systems. Proceedings of the 13th European Conference on Software Architecture; 2019. pp. 123–129. [Google Scholar]
  • Melis et al. (2018).Melis A, Mirri S, Prandi C, Prandini M, Salomoni P, Callegati F. Integrating personalized and accessible itineraries in maas ecosystems through microservices. Mobile Networks and Applications. 2018;23(1):167–176. doi: 10.1007/s11036-017-0831-z. [DOI] [Google Scholar]
  • Mishra & Otaiwi (2020).Mishra A, Otaiwi Z. Devops and software quality: a systematic mapping. Computer Science Review. 2020;38(3):100308. doi: 10.1016/j.cosrev.2020.100308. [DOI] [Google Scholar]
  • Mohamed, Challenger & Kardas (2020).Mohamed MA, Challenger M, Kardas G. Applications of model-driven engineering in cyber-physical systems: a systematic mapping study. Journal of Computer Languages. 2020;59(3):100972. doi: 10.1016/j.cola.2020.100972. [DOI] [Google Scholar]
  • Mohammed & Mohammed (2020).Mohammed TA, Mohammed AB. Security architectures for sensitive data in cloud computing. Proceedings of the 6th International Conference on Engineering & MIS 2020; 2020. pp. 1–6. [Google Scholar]
  • Mohsin & Janjua (2018).Mohsin A, Janjua NK. A review and future directions of SOA-based software architecture modeling approaches for system of systems. Service Oriented Computing and Applications. 2018;12(3–4):183–200. doi: 10.1007/s11761-018-0245-1. [DOI] [Google Scholar]
  • Montesi & Weber (2018).Montesi F, Weber J. From the decorator pattern to circuit breakers in microservices. In: Haddad HM, Wainwright RL, Chbeir R, editors. Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: ACM; 2018. pp. 1733–1735. [Google Scholar]
  • Moreira et al. (2020).Moreira JB, Mamede H, Pereira V, Sousa B. Next generation of microservices for the 5g service-based architecture. International Journal of Network Management. 2020;30(6):e2132. doi: 10.1002/nem.2132. [DOI] [Google Scholar]
  • Morris (2017).Morris JB. 10 rules for an unhackable data vault. Ubiquity. 2017;2017(May):1–10. doi: 10.1145/3081882. [DOI] [Google Scholar]
  • Moura & Hutchison (2020).Moura J, Hutchison D. Fog computing systems: state of the art, research issues and future trends, with a focus on resilience. Journal of Network and Computer Applications. 2020;169(1):102784. doi: 10.1016/j.jnca.2020.102784. [DOI] [Google Scholar]
  • Nagendra et al. (2019).Nagendra V, Yegneswaran V, Porras P, Das SR. Coordinated dataflow protection for ultra-high bandwidth science networks. Proceedings of the 35th Annual Computer Security Applications Conference; 2019. pp. 568–583. [Google Scholar]
  • Nagothu et al. (2018).Nagothu D, Xu R, Nikouei SY, Chen Y. A microservice-enabled architecture for smart surveillance using blockchain technology. 2018 IEEE International Smart Cities Conference (ISC2); Piscataway: IEEE; 2018. pp. 1–4. [Google Scholar]
  • Nehme et al. (2018).Nehme A, Jesus V, Mahbub K, Abdallah A. Fine-grained access control for microservices. International Symposium on Foundations and Practice of Security; Berlin: Springer; 2018. pp. 285–300. [Google Scholar]
  • Nehme et al. (2019).Nehme A, Jesus V, Mahbub K, Abdallah A. Securing microservices. IT Professional. 2019;21(1):42–49. doi: 10.1109/MITP.2018.2876987. [DOI] [Google Scholar]
  • Nguyen & Baker (2019).Nguyen Q, Baker O. Applying spring security framework and oauth2 to protect microservice architecture API. Journal of Software. 2019;14(6):257–264. doi: 10.17706/jsw.14.6.257-264. [DOI] [Google Scholar]
  • Niazi, Mishra & Gill (2018).Niazi M, Mishra A, Gill AQ. What do software practitioners really think about software process improvement project success? An exploratory study. Arabian Journal for Science and Engineering. 2018;43(12):7719–7735. doi: 10.1007/s13369-018-3140-3. [DOI] [Google Scholar]
  • Niknejad et al. (2020).Niknejad N, Ismail W, Ghani I, Nazari B, Bahari M, Hussin ARBC. Understanding service-oriented architecture (SOA): a systematic literature review and directions for further investigation. Information Systems. 2020;91(3):101491. doi: 10.1016/j.is.2020.101491. [DOI] [Google Scholar]
  • Nikolakis et al. (2020).Nikolakis N, Marguglio A, Veneziano G, Greco P, Panicucci S, Cerquitelli T, Macii E, Andolina S, Alexopoulos K. A microservice architecture for predictive analytics in manufacturing. Procedia Manufacturing. 2020;51:1091–1097. doi: 10.1016/j.promfg.2020.10.153. [DOI] [Google Scholar]
  • Nikoloudakis et al. (2019).Nikoloudakis Y, Pallis E, Mastorakis G, Mavromoustakis CX, Skianis C, Markakis EK. Vulnerability assessment as a service for fog-centric ICT ecosystems: a healthcare use case. Peer-to-Peer Networking and Applications. 2019;12(5):1216–1224. doi: 10.1007/s12083-019-0716-y. [DOI] [Google Scholar]
  • Nikouei et al. (2019).Nikouei SY, Chen Y, Aved A, Blasch E, Faughnan TR. I-safe: instant suspicious activity identification at the edge using fuzzy decision making. Proceedings of the 4th ACM/IEEE Symposium on Edge Computing; New York: ACM; 2019. pp. 101–112. [Google Scholar]
  • Nkomo & Coetzee (2019).Nkomo P, Coetzee M. Development activities, tools and techniques of secure microservices compositions. International Conference on Information Security Practice and Experience; Berlin: Springer; 2019. pp. 423–433. [Google Scholar]
  • Noura, Atiquzzaman & Gaedke (2019).Noura M, Atiquzzaman M, Gaedke M. Interoperability in internet of things: taxonomies and open challenges. Mobile Networks and Applications. 2019;24(3):796–809. doi: 10.1007/s11036-018-1089-9. [DOI] [Google Scholar]
  • Olsthoorn, van Deursen & Panichella (2020).Olsthoorn M, van Deursen A, Panichella A. Generating highly-structured input data by combining search-based testing and grammar-based fuzzing. 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE); Piscataway: IEEE; 2020. pp. 1224–1228. [Google Scholar]
  • Oppermann et al. (2018).Oppermann A, Toro FG, Thiel F, Seifert J-P. Secure cloud computing: Reference architecture for measuring instrument under legal control. Security and Privacy. 2018;1(3):e18. doi: 10.1002/spy2.18. [DOI] [Google Scholar]
  • Osman et al. (2019).Osman A, Bruckner P, Salah H, Fitzek FH, Strufe T, Fischer M. Sandnet: towards high quality of deception in container-based microservice architectures. ICC 2019-2019 IEEE International Conference on Communications (ICC); Piscataway: IEEE; 2019. pp. 1–7. [Google Scholar]
  • Osman, Hanisch & Strufe (2019).Osman A, Hanisch S, Strufe T. Seconetbench: a modular framework for secure container networking benchmarks. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); Piscataway: IEEE; 2019. pp. 21–28. [Google Scholar]
  • Otterstad & Yarygina (2017).Otterstad C, Yarygina T. Low-level exploitation mitigation by diverse microservices. European Conference on Service-Oriented and Cloud Computing; Berlin: Springer; 2017. pp. 49–56. [Google Scholar]
  • OWASP Foundation (2020).OWASP Foundation Open web application security project (OWASP) application threat modeling. 2020. https://owasp.org/www-community/Application_Threat_Modeling https://owasp.org/www-community/Application_Threat_Modeling
  • Pahl & Aubet (2018).Pahl M-O, Aubet F-X. All eyes on you: distributed multi-dimensional iot microservice anomaly detection. 2018 14th International Conference on Network and Service Management (CNSM); Piscataway: IEEE; 2018. pp. 72–80. [Google Scholar]
  • Pahl & Donini (2018).Pahl M-O, Donini L. Securing IoT microservices with certificates. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium; Piscataway: IEEE; 2018. pp. 1–5. [Google Scholar]
  • Pahl, Aubet & Liebald (2018).Pahl M-O, Aubet F-X, Liebald S. Graph-based iot microservice security. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium; Piscataway: IEEE; 2018. pp. 1–3. [Google Scholar]
  • Paladi, Michalas & Dang (2018).Paladi N, Michalas A, Dang H-V. Towards secure cloud orchestration for multi-cloud deployments. Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms; 2018. pp. 1–6. [Google Scholar]
  • Panduman, Sukaridhoto & Tjahjono (2019).Panduman YYF, Sukaridhoto S, Tjahjono A. A survey of IoT platform comparison for building cyber-physical system architecture. 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI); Piscataway: IEEE; 2019. pp. 238–243. [Google Scholar]
  • Park & Jeon (2020).Park E, Jeon K. Secure volume hot-plugging for containers (industry track). Proceedings of the 1st International Middleware Conference Industrial Track; 2020. pp. 38–44. [Google Scholar]
  • Paschke (2016).Paschke A. Provalets: component-based mobile agents as microservices for rule-based data access, processing and analytics. Business & Information Systems Engineering. 2016;58(5):329–340. doi: 10.1007/s12599-016-0447-z. [DOI] [Google Scholar]
  • Pentikousis, Wang & Hu (2013).Pentikousis K, Wang Y, Hu W. Mobileflow: toward software-defined mobile networks. IEEE Communications Magazine. 2013;51(7):44–53. doi: 10.1109/MCOM.2013.6553677. [DOI] [Google Scholar]
  • Perrone & Romano (2017).Perrone G, Romano SP. The docker security playground: a hands-on approach to the study of network security. 2017 Principles, Systems and Applications of IP Telecommunications (IPTComm); Piscataway: IEEE; 2017. pp. 1–8. [Google Scholar]
  • Petrovska, Memeti & Imeri (2019).Petrovska J, Memeti A, Imeri F. Soa approach-identity and access management for the risk management platform. 2019 8th Mediterranean Conference on Embedded Computing (MECO); Piscataway: IEEE; 2019. pp. 1–4. [Google Scholar]
  • Plaza, Daz & Pérez (2018).Plaza AM, Daz J, Pérez J. Software architectures for health care cyber-physical systems: a systematic literature review. Journal of Software: Evolution and Process. 2018;30(7):e1930. doi: 10.1002/smr.1930. [DOI] [Google Scholar]
  • Ponce et al. (2021).Ponce F, Soldani J, Astudillo H, Brogi A. Smells and refactorings for microservices security: a multivocal literature review. ArXiv. 2021. https://arxiv.org/abs/2104.13303 https://arxiv.org/abs/2104.13303
  • Prandi et al. (2019).Prandi C, Melis A, Prandini M, Delnevo G, Monti L, Mirri S, Salomoni P. Gamifying cultural experiences across the urban environment. Multimedia Tools and Applications. 2019;78(3):3341–3364. doi: 10.1007/s11042-018-6513-4. [DOI] [Google Scholar]
  • Preuveneers & Joosen (2017).Preuveneers D, Joosen W. Access control with delegated authorization policy evaluation for data-driven microservice workflows. Future Internet. 2017;9(4):58. doi: 10.3390/fi9040058. [DOI] [Google Scholar]
  • Preuveneers & Joosen (2019).Preuveneers D, Joosen W. Towards multi-party policy-based access control in federations of cloud and edge microservices. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); Piscataway: IEEE; 2019. pp. 29–38. [Google Scholar]
  • Puliafito et al. (2019).Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O. Fog computing for the internet of things: a survey. ACM Transactions on Internet Technology. 2019;19(2):1–41. doi: 10.1145/3301443. [DOI] [Google Scholar]
  • Pustchi, Krishnan & Sandhu (2015).Pustchi N, Krishnan R, Sandhu R. Authorization federation in iaas multi cloud. Proceedings of the 3rd International Workshop on Security in Cloud Computing; 2015. pp. 63–71. [Google Scholar]
  • Ranawaka et al. (2020).Ranawaka I, Marru S, Graham J, Bisht A, Basney J, Fleury T, Gaynor J, Wannipurage D, Christie M, Mahmoud A, Afgan E, Pierce M. Custos: security middleware for science gateways. Practice and Experience in Advanced Research Computing; 2020. pp. 278–284. [Google Scholar]
  • Ranjbar et al. (2017).Ranjbar A, Komu M, Salmela P, Aura T. Synaptic: secure and persistent connectivity for containers. 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID); Piscataway: IEEE; 2017. pp. 262–267. [Google Scholar]
  • Rao et al. (2018).Rao TR, Mitra P, Bhatt R, Goswami A. The big data system, components, tools, and technologies: a survey. Knowledge and Information Systems. 2018;60(3):1–81. doi: 10.1007/s10115-018-1248-0. [DOI] [Google Scholar]
  • Ravichandran, Taylor & Waterhouse (2016).Ravichandran A, Taylor K, Waterhouse P. DevOps for digital leaders. New York: Apress; 2016. [Google Scholar]
  • Razian, Fathian & Buyya (2020).Razian M, Fathian M, Buyya R. Arc: anomaly-aware robust cloud-integrated iot service composition based on uncertainty in advertised quality of service values. Journal of Systems and Software. 2020;164(3):110557. doi: 10.1016/j.jss.2020.110557. [DOI] [Google Scholar]
  • Razzaq (2020).Razzaq A. A systematic review on software architectures for iot systems and future direction to the adoption of microservices architecture. SN Computer Science. 2020;1(6):1–30. doi: 10.1007/s42979-020-00359-w. [DOI] [Google Scholar]
  • Redelinghuys, Basson & Kruger (2019).Redelinghuys A, Basson A, Kruger K. A six-layer architecture for the digital twin: a manufacturing case study implementation. Journal of Intelligent Manufacturing. 2019;31:1–20. doi: 10.1007/s10845-019-01516-6. [DOI] [Google Scholar]
  • Reed (2020).Reed JP. Beyond the ‘fix-it’ treadmill. Communications of the ACM. 2020;63(5):58–63. doi: 10.1145/3380322. [DOI] [Google Scholar]
  • Reyna et al. (2018).Reyna A, Martn C, Chen J, Soler E, Daz M. On blockchain and its integration with iot. challenges and opportunities. Future Generation Computer Systems. 2018;88(3):173–190. doi: 10.1016/j.future.2018.05.046. [DOI] [Google Scholar]
  • Roca et al. (2020).Roca S, Sancho J, Garca J, Alesanco Á. Microservice chatbot architecture for chronic patient support. Journal of Biomedical Informatics. 2020;102(1):103305. doi: 10.1016/j.jbi.2019.103305. [DOI] [PubMed] [Google Scholar]
  • Ruan et al. (2019).Ruan H, Chen B, Peng X, Zhao W. Deeplink: recovering issue-commit links based on deep learning. Journal of Systems and Software. 2019;158(10):110406. doi: 10.1016/j.jss.2019.110406. [DOI] [Google Scholar]
  • Russinovich et al. (2021).Russinovich M, Costa M, Fournet C, Chisnall D, Delignat-Lavaud A, Clebsch S, Vaswani K, Bhatia V. Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use. Queue. 2021;19(1):49–76. doi: 10.1145/3454122.3456125. [DOI] [Google Scholar]
  • Runeson et al. (2012).Runeson P, Höst M, Rainer A, Regnell B. Case Study Research in Software Engineering-Guidelines and Examples. Hoboken: Wiley; 2012. [Google Scholar]
  • Safaryan et al. (2020).Safaryan O, Pinevich E, Roshchina E, Cherckesova L, Kolennikova N. Information system development for restricting access to software tool built on microservice architecture. E3S Web of Conferences; EDP Sciences; 2020. p. 224. [Google Scholar]
  • Salibindla (2018).Salibindla J. Microservices API security. International Journal of Engineering Research & Technology. 2018;7(1):277–281. doi: 10.1088/1742-6596/1175/1/012101. [DOI] [Google Scholar]
  • Salomoni et al. (2018).Salomoni D, Campos I, Gaido L, de Lucas JM, Solagna P, Gomes J, Matyska L, Fuhrman P, Hardt M, Donvito G, Dutka L, Plociennik M, Barbera R, Blanquer I, Ceccanti A, Cetinic E, David M, Duma C, López-García A, Moltó G, Orviz P, Sustr Z, Viljoen M, Aguilar F, Alves L, Antonacci M, Antonelli LA, Bagnasco S, Bonvin AMJJ, Bruno R, Chen Y, Costa A, Davidovic D, Ertl B, Fargetta M, Fiore S, Gallozzi S, Kurkcuoglu Z, Lloret L, Martins J, Nuzzo A, Nassisi P, Palazzo C, Pina J, Sciacca E, Spiga D, Tangaro M, Urbaniak M, Vallero S, Wegh B, Zaccolo V, Zambelli F, Zok T. Indigo-datacloud: a platform to facilitate seamless access to e-infrastructures. Journal of Grid Computing. 2018;16(3):381–408. doi: 10.1007/s10723-018-9453-3. [DOI] [Google Scholar]
  • Schlossnagle (2017).Schlossnagle T. Monitoring in a devops world. Queue. 2017;15(6):35–45. doi: 10.1145/3178368.3178371. [DOI] [Google Scholar]
  • Schlossnagle (2018).Schlossnagle T. Monitoring in a devops world. Communications of the ACM. 2018;61(3):58–61. doi: 10.1145/3168505. [DOI] [Google Scholar]
  • Shahin et al. (2019).Shahin M, Zahedi M, Babar MA, Zhu L. An empirical study of architecting for continuous delivery and deployment. Empirical Software Engineering. 2019;24(3):1061–1108. doi: 10.1007/s10664-018-9651-4. [DOI] [Google Scholar]
  • Sharma, Lawrenz & Rausch (2020).Sharma P, Lawrenz S, Rausch A. Towards trustworthy and independent data marketplaces. Proceedings of the 2020 The 2nd International Conference on Blockchain Technology; 2020. pp. 39–45. [Google Scholar]
  • ShuLin & JiePing (2020).ShuLin Y, JiePing H. Research on unified authentication and authorization in microservice architecture. 2020 IEEE 20th International Conference on Communication Technology (ICCT); Piscataway: IEEE; 2020. pp. 1169–1173. [Google Scholar]
  • Sialm & Knittl (2016).Sialm G, Knittl S. Bring your own identity-case study from the swiss government. Annual Privacy Forum; Berlin: Springer; 2016. pp. 38–47. [Google Scholar]
  • Sim, Barus & Jaya (2019).Sim AXA, Barus OP, Jaya F. Lessons learned in applying reactive system in microservices. Journal of Physics: Conference Series. 2019;1175:012101. doi: 10.1088/1742-6596/1175/1/012101. [DOI] [Google Scholar]
  • Snyder (2019).Snyder H. Literature review as a research methodology: an overview and guidelines. Journal of Business Research. 2019;104(5):333–339. doi: 10.1016/j.jbusres.2019.07.039. [DOI] [Google Scholar]
  • Soldani (2019).Soldani J. Grey literature: a safe bridge between academy and industry? ACM SIGSOFT Software Engineering Notes. 2019;44(3):11–12. doi: 10.1145/3356773.3356776. [DOI] [Google Scholar]
  • Soldani, Tamburri & Van Den Heuvel (2018).Soldani J, Tamburri DA, Van Den Heuvel W-J. The pains and gains of microservices: a systematic grey literature review. Journal of Systems and Software. 2018;146(3):215–232. doi: 10.1016/j.jss.2018.09.082. [DOI] [Google Scholar]
  • Souppaya, Morello & Scarfone (2017).Souppaya M, Morello J, Scarfone K. Application container security guide (2nd draft) 2017. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf Technical report, National Institute of Standards and Technology.
  • Stallenberg & Panichella (2019).Stallenberg DM, Panichella A. Jcomix: a search-based tool to detect xml injection vulnerabilities in web applications. Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering; New York: ACM; 2019. pp. 1090–1094. [Google Scholar]
  • Stewart, Chapple & Gibson (2012).Stewart JM, Chapple M, Gibson D. CISSP: certified information systems security professional study guide. Hoboken: John Wiley & Sons; 2012. [Google Scholar]
  • Stock, Schel & Bauernhansl (2020).Stock D, Schel D, Bauernhansl T. Middleware-based cyber-physical production system modeling for operators. Procedia Manufacturing. 2020;42(1):111–118. doi: 10.1016/j.promfg.2020.02.031. [DOI] [Google Scholar]
  • Stocker et al. (2018).Stocker M, Zimmermann O, Zdun U, Lübke D, Pautasso C. Interface quality patterns: Communicating and improving the quality of microservices Apis. Proceedings of the 23rd European Conference on Pattern Languages of Programs; 2018. pp. 1–16. [Google Scholar]
  • Sultan, Ahmad & Dimitriou (2019).Sultan S, Ahmad I, Dimitriou T. Container security: issues, challenges, and the road ahead. IEEE Access. 2019;7:52976–52996. doi: 10.1109/ACCESS.2019.2911732. [DOI] [Google Scholar]
  • Sun, Nanda & Jaeger (2015).Sun Y, Nanda S, Jaeger T. Security-as-a-service for microservices-based cloud applications. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom); Piscataway: IEEE; 2015. pp. 50–57. [Google Scholar]
  • Sundelin, Gonzalez-Huerta & Wnuk (2020).Sundelin A, Gonzalez-Huerta J, Wnuk K. The hidden cost of backward compatibility: when deprecation turns into technical debt-an experience report. Proceedings of the 3rd International Conference on Technical Debt; 2020. pp. 67–76. [Google Scholar]
  • Suneja, Kanso & Isci (2019).Suneja S, Kanso A, Isci C. Can container fusion be securely achieved?. Proceedings of the 5th International Workshop on Container Technologies and Container Clouds; 2019. pp. 31–36. [Google Scholar]
  • Surantha & Ivan (2019).Surantha N, Ivan F. Secure kubernetes networking design based on zero trust model: A case study of financial service enterprise in indonesia. International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing; Berlin: Springer; 2019. pp. 348–361. [Google Scholar]
  • Syed & Fernandez (2017).Syed MH, Fernandez EB. The container manager pattern. Proceedings of the 22nd European Conference on Pattern Languages of Programs; 2017. pp. 1–9. [Google Scholar]
  • Syed & Fernandez (2018).Syed MH, Fernandez EB. A reference architecture for the container ecosystem. Proceedings of the 13th International Conference on Availability, Reliability and Security; 2018. pp. 1–6. [Google Scholar]
  • Taha, Talhi & Ould-Slimanec (2019).Taha MB, Talhi C, Ould-Slimanec H. A cluster of CP-ABE microservices for vanet. Procedia Computer Science. 2019;155(9):441–448. doi: 10.1016/j.procs.2019.08.061. [DOI] [Google Scholar]
  • Taherizadeh & Grobelnik (2020).Taherizadeh S, Grobelnik M. Key influencing factors of the kubernetes auto-scaler for computing-intensive microservice-native cloud-based applications. Advances in Engineering Software. 2020;140(9):102734. doi: 10.1016/j.advengsoft.2019.102734. [DOI] [Google Scholar]
  • Tchoubraev & Wiczynski (2015).Tchoubraev D, Wiczynski D. Swiss tso integrated operational planning, optimization and ancillary services system. 2015 IEEE Eindhoven PowerTech; Piscataway: IEEE; 2015. pp. 1–6. [Google Scholar]
  • Tenev & Tsvetanov (2020).Tenev T, Tsvetanov S. Recommendations for enhancing security in microservice environment altered in an intelligent way. 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM); Piscataway: IEEE; 2020. pp. 1–6. [Google Scholar]
  • Thanh et al. (2016).Thanh TQ, Covaci S, Magedanz T, Gouvas P, Zafeiropoulos A. Embedding security and privacy into the development and operation of cloud applications and services. 2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks); Piscataway: IEEE; 2016. pp. 31–36. [Google Scholar]
  • Thramboulidis, Vachtsevanou & Kontou (2019).Thramboulidis K, Vachtsevanou DC, Kontou I. Cpus-IoT: a cyber-physical microservice and iot-based framework for manufacturing assembly systems. Annual Reviews in Control. 2019;47(1):237–248. doi: 10.1016/j.arcontrol.2019.03.005. [DOI] [Google Scholar]
  • Tien et al. (2019).Tien C-W, Huang T-Y, Tien C-W, Huang T-C, Kuo S-Y. Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches. Engineering Reports. 2019;1(5):e12080. doi: 10.1002/eng2.12080. [DOI] [Google Scholar]
  • Torkura, Sukmana & Kayem (2018).Torkura KA, Sukmana MI, Kayem AV. A cyber risk based moving target defense mechanism for microservice architectures. 2018 IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom); Piscataway: IEEE; 2018. pp. 932–939. [Google Scholar]
  • Torkura, Sukmana & Meinel (2017).Torkura KA, Sukmana MI, Meinel C. Integrating continuous security assessments in microservices and cloud native applications. Proceedings of the10th International Conference on Utility and Cloud Computing; 2017. pp. 171–180. [Google Scholar]
  • Torkura et al. (2017).Torkura KA, Sukmana MI, Cheng F, Meinel C. Leveraging cloud native design patterns for security-as-a-service applications. 2017 IEEE International Conference on Smart Cloud (SmartCloud); Piscataway: IEEE; 2017. pp. 90–97. [Google Scholar]
  • Tourani et al. (2019).Tourani R, Bos A, Misra S, Esposito F. Towards security-as-a-service in multi-access edge. Proceedings of the 4th ACM/IEEE Symposium on Edge Computing; 2019. pp. 358–363. [Google Scholar]
  • Trihinas, Tryfonos & Dikaiakos (2016).Trihinas D, Tryfonos A, Dikaiakos MD. Designing scalable and secure microservices by embracing devops-as-a-service offerings. 2016. https://ieeexplore.ieee.org/document/8590984 https://ieeexplore.ieee.org/document/8590984
  • Trihinas et al. (2018).Trihinas D, Tryfonos A, Dikaiakos MD, Pallis G. Devops as a service: pushing the boundaries of microservice adoption. IEEE Internet Computing. 2018;22(3):65–71. doi: 10.1109/MIC.2018.032501519. [DOI] [Google Scholar]
  • Trnka, Černý & Stickney (2018).Trnka M, Černý T, Stickney N. Survey of authentication and authorization for the internet of things. Security and Communication Networks. 2018;2018(7):1–17. doi: 10.1155/2018/4351603. [DOI] [Google Scholar]
  • Troiano et al. (2019).Troiano E, Soldatos J, Polyviou A, Polyviou A, Mamelli A, Drakoulis D. Big data platform for integrated cyber and physical security of critical infrastructures for the financial sector: critical infrastructures as cyber-physical systems. Proceedings of the 11th International Conference on Management of Digital EcoSystems; 2019. pp. 262–269. [Google Scholar]
  • Trubiani et al. (2018).Trubiani C, Bran A, van Hoorn A, Avritzer A, Knoche H. Exploiting load testing and profiling for performance antipattern detection. Information and Software Technology. 2018;95(10):329–345. doi: 10.1016/j.infsof.2017.11.016. [DOI] [Google Scholar]
  • Truong & Klein (2020).Truong H-L, Klein P. Devops contract for assuring execution of iot microservices in the edge. Internet of Things. 2020;9(3):100150. doi: 10.1016/j.iot.2019.100150. [DOI] [Google Scholar]
  • Tuma et al. (2020).Tuma K, Sion L, Scandariato R, Yskout K. Automating the early detection of security design flaws. Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems; New York: ACM; 2020. pp. 332–342. [Google Scholar]
  • UcedaVelez & Morana (2015).UcedaVelez T, Morana MM. Risk centric threat modeling. Hoboken: Wiley Online Library; 2015. [Google Scholar]
  • Vadapalli (2018).Vadapalli S. DevOps: continuous delivery, integration, and deployment with DevOps: dive into the core DevOps strategies. Birmingham : Packt Publishing Ltd; 2018. [Google Scholar]
  • Vale et al. (2019).Vale AP, Márquez G, Astudillo H, Fernandez EB. Security mechanisms used in microservices-based systems: a systematic mapping. XLV Latin American Computing Conference; 2019. pp. 1–10. [Google Scholar]
  • Van Eck & Waltman (2010).Van Eck N, Waltman L. Software survey: vosviewer, a computer program for bibliometric mapping. Scientometrics. 2010;84(2):523–538. doi: 10.1007/s11192-009-0146-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • Vaquero et al. (2019).Vaquero LM, Cuadrado F, Elkhatib Y, Bernal-Bernabe J, Srirama SN, Zhani MF. Research challenges in nextgen service orchestration. Future Generation Computer Systems. 2019;90(5):20–38. doi: 10.1016/j.future.2018.07.039. [DOI] [Google Scholar]
  • Varghese & Buyya (2018).Varghese B, Buyya R. Next generation cloud computing: new trends and research directions. Future Generation Computer Systems. 2018;79(6):849–861. doi: 10.1016/j.future.2017.09.020. [DOI] [Google Scholar]
  • Vassilakis, Panaousis & Mouratidis (2016).Vassilakis V, Panaousis E, Mouratidis H. Security challenges of small cell as a service in virtualized mobile edge computing environments. IFIP International Conference on Information Security Theory and Practice; Berlin: Springer; 2016. pp. 70–84. [Google Scholar]
  • Vehent (2018).Vehent J. Securing DevOps: security in the cloud. Greenwich: Manning Publications Co; 2018. [Google Scholar]
  • Voigt & Von dem Bussche (2017).Voigt P, Von dem Bussche A. The eu general data protection regulation (gdpr): a practical guide. First Edition. Cham: Springer International Publishing; 2017. [Google Scholar]
  • Vural, Koyuncu & Guney (2017).Vural H, Koyuncu M, Guney S. A systematic literature review on microservices. In: Gervasi O, Murgante B, Misra S, Borruso G, Torre CM, Rocha AMA, Taniar D, Apduhan BO, Stankova E, Cuzzocrea A, editors. Computational Science and Its Applications – ICCSA 2017. Cham: Springer International Publishing; 2017. pp. 203–217. [Google Scholar]
  • Walker & Cerny (2020).Walker A, Cerny T. On cloud computing infrastructure for existing code-clone detection algorithms. ACM SIGAPP Applied Computing Review. 2020;20(1):5–14. doi: 10.1145/3392350.3392351. [DOI] [Google Scholar]
  • Walsh & Manferdelli (2017).Walsh K, Manferdelli J. Mechanisms for mutual attested microservice communication. Companion Proceedings of the10th International Conference on Utility and Cloud Computing; 2017. pp. 59–64. [Google Scholar]
  • Wang et al. (2020).Wang L, Zhao N, Chen J, Li P, Zhang W, Sui K. Root-cause metric location for microservice systems via log anomaly detection. 2020 IEEE International Conference on Web Services (ICWS); Piscataway: IEEE; 2020. pp. 142–150. [Google Scholar]
  • Wang et al. (2018).Wang P, Xu J, Ma M, Lin W, Pan D, Wang Y, Chen P. Cloudranger: root cause identification for cloud native systems. 2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID); Piscataway: IEEE; 2018. pp. 492–502. [Google Scholar]
  • Waseem, Liang & Shahin (2020).Waseem M, Liang P, Shahin M. A systematic mapping study on microservices architecture in devops. Journal of Systems and Software. 2020;170(12):110798. doi: 10.1016/j.jss.2020.110798. [DOI] [Google Scholar]
  • Wen et al. (2019).Wen Z, Lin T, Yang R, Ji S, Ranjan R, Romanovsky A, Lin C, Xu J. Ga-par: dependable microservice orchestration framework for geo-distributed clouds. IEEE Transactions on Parallel and Distributed Systems. 2019;31(1):129–143. doi: 10.1109/TPDS.2019.2929389. [DOI] [Google Scholar]
  • Westerlund & Kratzke (2018).Westerlund M, Kratzke N. Towards distributed clouds: a review about the evolution of centralized cloud computing, distributed ledger technologies, and a foresight on unifying opportunities and security implications. 2018 International Conference on High Performance Computing & Simulation (HPCS); Piscataway: IEEE; 2018. pp. 655–663. [Google Scholar]
  • Wieber (2020).Wieber N. Automated generation of client-specific backends utilizing existing microservices and architectural knowledge. 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE); Piscataway: IEEE; 2020. pp. 1158–1160. [Google Scholar]
  • Wohlin (2014).Wohlin C. Guidelines for snowballing in systematic literature studies and a replication in software engineering. Proceedings of the 18th international conference on evaluation and assessment in software engineering; 2014. pp. 1–10. [Google Scholar]
  • Wu et al. (2019).Wu X, Hou K, Leng X, Li X, Yu Y, Wu B, Chen Y. State of the art and research challenges in the security technologies of network function virtualization. IEEE Internet Computing. 2019;24(1):25–35. doi: 10.1109/MIC.2019.2956712. [DOI] [Google Scholar]
  • Wuyts et al. (2018).Wuyts K, Van Landuyt D, Hovsepyan A, Joosen W. Effective and efficient privacy threat modeling through domain refinements. Proceedings of the 33rd Annual ACM Symposium on Applied Computing; New York: ACM; 2018. pp. 1175–1178. [Google Scholar]
  • Xu & Bian (2020).Xu B, Bian J. A cloud robotic application platform design based on the microservices architecture. 2020 International Conference on Control, Robotics and Intelligent System; 2020. pp. 13–18. [Google Scholar]
  • Xu, Jin & Kim (2019).Xu R, Jin W, Kim D. Microservice security agent based on api gateway in edge computing. Sensors. 2019;19(22):4905. doi: 10.3390/s19224905. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • Xu et al. (2019).Xu R, Nikouei SY, Chen Y, Blasch E, Aved A. Blendmas: a blockchain-enabled decentralized microservices architecture for smart public safety. 2019 IEEE International Conference on Blockchain (Blockchain); Piscataway: IEEE; 2019. pp. 564–571. [Google Scholar]
  • Yang et al. (2014).Yang X, Wallom D, Waddington S, Wang J, Shaon A, Matthews B, Wilson M, Guo Y, Guo L, Blower JD, Vasilakos AV, Liu K, Kershaw P. Cloud computing in e-science: research challenges and opportunities. The Journal of Supercomputing. 2014;70(1):408–464. doi: 10.1007/s11227-014-1251-5. [DOI] [Google Scholar]
  • Yang et al. (2018).Yang Y, Zu Q, Liu P, Ouyang D, Li X. Microshare: privacy-preserved medical resource sharing through microservice architecture. International Journal of Biological Sciences. 2018;14(8):907–919. doi: 10.7150/ijbs.24617. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • Yarygina (2018).Yarygina T. Exploring microservice security. 2018. https://bora.uib.no/bora-xmlui/handle/1956/18696 https://bora.uib.no/bora-xmlui/handle/1956/18696
  • Yarygina & Bagge (2018).Yarygina T, Bagge AH. Overcoming security challenges in microservice architectures. 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE); Piscataway: IEEE; 2018. pp. 11–20. [Google Scholar]
  • Yarygina & Otterstad (2018).Yarygina T, Otterstad C. A game of microservices: automated intrusion response. IFIP International Conference on Distributed Applications and Interoperable Systems; Berlin: Springer; 2018. pp. 169–177. [Google Scholar]
  • Yousefpour et al. (2019).Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP. All one needs to know about fog computing and related edge computing paradigms: a complete survey. Journal of Systems Architecture. 2019;98(2011):289–330. doi: 10.1016/j.sysarc.2019.02.009. [DOI] [Google Scholar]
  • Yu et al. (2019).Yu D, Jin Y, Zhang Y, Zheng X. A survey on security issues in services communication of microservices-enabled fog applications. Concurrency and Computation: Practice and Experience. 2019;31(22):e4436. doi: 10.1002/cpe.4436. [DOI] [Google Scholar]
  • Yuan et al. (2019).Yuan M, Fang Y, Lv J, Zheng S, Zhou Z. Research on power trading platform based on big data and artificial intelligence technology. IOP Conference Series: Materials Science and Engineering. 2019;486:012109. doi: 10.1088/1757-899X/486/1/012109. [DOI] [Google Scholar]
  • Zaheer et al. (2019).Zaheer Z, Chang H, Mukherjee S, Van der Merwe J. eztrust: network-independent zero-trust perimeterization for microservices. Proceedings of the 2019 ACM Symposium on SDN Research; 2019. pp. 49–61. [Google Scholar]
  • Zdun, Wittern & Leitner (2019).Zdun U, Wittern E, Leitner P. Emerging trends, challenges, and experiences in devops and microservice Apis. IEEE Software. 2019;37(1):87–91. doi: 10.1109/MS.2019.2947982. [DOI] [Google Scholar]
  • Zhang et al. (2020).Zhang C, Liu X, Zheng X, Li R, Liu H. Fenghuolun: a federated learning based edge computing platform for cyber-physical systems. 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops); Piscataway: IEEE; 2020. pp. 1–4. [Google Scholar]
  • Zhang et al. (2017).Zhang N, Li H, Hu H, Park Y. Towards effective virtualization of intrusion detection systems. Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization; New York: ACM; 2017. pp. 47–50. [Google Scholar]
  • Zhiyi, Shahidehpour & Xuan (2018).Zhiyi L, Shahidehpour M, Xuan L. Cyber-secure decentralized energy management for iot-enabled active distribution networks. Journal of Modern Power Systems and Clean Energy. 2018;6(5):900–917. doi: 10.1007/s40565-018-0425-1. [DOI] [Google Scholar]
  • Zimmermann (2017a).Zimmermann O. Architectural refactoring for the cloud: a decision-centric view on cloud migration. Computing. 2017a;99(2):129–145. doi: 10.1007/s00607-016-0520-y. [DOI] [Google Scholar]
  • Zimmermann (2017b).Zimmermann O. Microservices tenets. Computer Science-Research and Development. 2017b;32(3–4):301–310. doi: 10.1007/s00450-016-0337-0. [DOI] [Google Scholar]
  • Zuo et al. (2020).Zuo Y, Wu Y, Min G, Huang C, Pei K. An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis. IEEE Transactions on Cognitive Communications and Networking. 2020;6(2):548–561. doi: 10.1109/TCCN.2020.2966615. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Supplemental Information 1. LaTeX macros for pie chart by using PGF/Tikz package.
DOI: 10.7717/peerj-cs.779/supp-1
Supplemental Information 2. Makefile to automate the LaTeX build process.
DOI: 10.7717/peerj-cs.779/supp-2

Data Availability Statement

The following information was supplied regarding data availability:

The data is available on Zenodo: Davide Berardi, Saverio Giallorenzo, Jacopo Mauro, Andrea Melis, Fabrizio Montesi, & Marco Prandini. (2021). Microservice Security: A Systematic Literature Review, dataset (1.0) [Data set]. Zenodo. https://doi.org/10.5281/zenodo.5513580.


Articles from PeerJ Computer Science are provided here courtesy of PeerJ, Inc

RESOURCES