Informatika i Ee Primeneniya [Informatics and its Applications]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Inform. Primen.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatika i Ee Primeneniya [Informatics and its Applications], 2022, Volume 16, Issue 4, Pages 87–92
DOI: https://doi.org/10.14357/19922264220413
(Mi ia820)
 

About the secure architecture of a microservice-based computing system

A. A. Grushoa, N. A. Grushoa, M. I. Zabezhailoa, D. V. Smirnovb, E. E. Timoninaa, S. Ya. Shorgina

a Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
b Sberbank of Russia, 19 Vavilov Str., Moscow 117999, Russian Federation
References:
Abstract: The paper discusses a network-centric microservice architecture system in which all microservice computers are the same for simplicity. Each microservice computer may fail or receive malicious code. The maximum negative impact on the microservice computer is a calculation error and providing the consumer with the wrong result. The tasks of detecting failed microservice computers and detecting microservice computers with malicious code are considered. In solving the set tasks, elements of training are used. Correctly solved problems (conditions, source data, and correct answers) are accumulated in the memory of the control system. This means that one can restart any task with an already known correct result. At the same time, the article uses the ideas and results of the present authors to ensure information security while using metadata. Depending on the assumptions about the possible actions of malicious code, two classes of secure computing algorithms are built in the context of its possible impact on intermediate results in the flow of solved problems. The second class of algorithms works in the assumption that malicious code can correctly calculate the solution to the current problem with probability $p$ and introduce distortion into the result with probability $1-p$. The authors consider three types of distortions that malicious code can introduce and which allow one to either find the true solution accurately or with low probability of error.
Keywords: information security, secure computing under malicious code conditions, microservice architecture.
Received: 11.10.2022
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “About the secure architecture of a microservice-based computing system”, Inform. Primen., 16:4 (2022), 87–92
Citation in format AMSBIB
\Bibitem{GruGruZab22}
\by A.~A.~Grusho, N.~A.~Grusho, M.~I.~Zabezhailo, D.~V.~Smirnov, E.~E.~Timonina, S.~Ya.~Shorgin
\paper About the secure architecture of~a~microservice-based computing system
\jour Inform. Primen.
\yr 2022
\vol 16
\issue 4
\pages 87--92
\mathnet{http://mi.mathnet.ru/ia820}
\crossref{https://doi.org/10.14357/19922264220413}
Linking options:
  • https://www.mathnet.ru/eng/ia820
  • https://www.mathnet.ru/eng/ia/v16/i4/p87
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Информатика и её применения
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025