Introducing Security Configuration for gRPC in Microservices with Application Load Balancer

Isarar Khan*, Mohammad Kalamuddin Ahmad**
*-** Department of Computer Application, Integral University, Lucknow, India.
Periodicity:October - December'2022
DOI : https://doi.org/10.26634/jse.17.2.19107

Abstract

The primary goals of this paper is to contribute a useful method and present the advantages of Google Remote Procedure Calls (gRPC) for real-time two-way data transfer as well as to improve the security of microservices that use gRPC. The communication between two or more services is one of the key difficulties in splitting a monolithic application into microservices. When it utilizes gRPC to transmit in real-time, it responds quickly and with greater security. The gRPC protocol is now supported by application load balancing.

Keywords

Microservices, gRPC, Data Security, Authentication, Application Load Balancer.

How to Cite this Article?

Khan, I., and Ahmad, M. K. (2022). Introducing Security Configuration for gRPC in Microservices with Application Load Balancer. i-manager’s Journal on Software Engineering, 17(2), 27-30. https://doi.org/10.26634/jse.17.2.19107

References

[1]. Chawla, H., & Kathuria, H. (2019). Securing microservices. In Building Microservices Applications on Microsoft Azure (pp. 193-223). Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4828-7_7
[2]. de Almeida, M. G., & Canedo, E. D. (2022). Authentication and authorization in microservices architecture: A systematic literature review. Applied Sciences, 12(6), 3023. https://doi.org/10.3390/app12063023
[3]. Giretti, A. (2022). Create a gRPC-web service from a gRPC-service with ASP. NET Core. In Beginning gRPC with ASP. NET Core 6 (pp. 395-418). Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-8008-9_11
[4]. Hannousse, A., & Yahiouche, S. (2021). Securing microservices and microservice architectures: A systematic mapping study. Computer Science Review, 41, 100415. https://doi.org/10.1016/j.cosrev.2021.100415
[5]. Kalubowila, D. C., Athukorala, S. M., Tharaka, B. S., Samarasekara, H. R., Arachchilage, U. S. S. S., & Kasthurirathna, D. (2021, December). Optimization of microservices security. In 2021 3rd International Conference on Advancements in Computing (ICAC) (pp. 49-54). IEEE. https://doi.org/10.1109/ICAC54203.2021.9671131
[6]. Kuryazov, D., Jabborov, D., & Khujamuratov, B. (2020, October). Towards decomposing monolithic applications into microservices. In 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT) (pp. 1-4). https://doi.org/10.1109/AICT50176.2020.9368571
[7]. Pankaj. (2021). gRPC for Microservices Communication. Retrieved from https://techdozo.dev/grpc-for-microservices-communication/
[8]. Shi, J., Wang, S., & Sun, L. (2020). A parallel AES encryption algorithms and its application. In International Conference on Big Data Analytics for Cyber-Physical- Systems (pp. 173-179). Springer, Singapore. https://doi.org/10.1007/978-981-15-2568-1_24
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.