A survey on security issues in services communication of Microservices-enabled fog applications

Dongjin Yu, Yike Jin, Yuqun Zhang*, Xi Zheng

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

77 Citations (Scopus)


Fog computing is used as a popular extension of cloud computing for a variety of emerging applications. To incorporate various design choices and customized policies in fog computing paradigm, Microservices is proposed as a new software architecture, which is easy to modify and quick to deploy fog applications because of its significant features, ie, fine granularity and loose coupling. Unfortunately, the Microservices architecture is vulnerable due to its wildly distributed interfaces that are easily attacked. However, the industry has not been fully aware of its security issues. In this paper, a survey of different security risks that pose a threat to the Microservices-based fog applications is presented. Because a fog application based on Microservices architecture consists of numerous services and communication among services is frequent, we focus on the security issues that arise in services communication of Microservices in four aspects: containers, data, permission, and network. Containers are often used as the deployment and operational environment for Microservices. Data is communicated among services and is vital for every enterprise. Permission is the guarantee of services security. Network security is the foundation for secure communication. Finally, we propose an ideal solution for security issues in services communication of Microservices-based fog applications.

Original languageEnglish
Article numbere4436
Pages (from-to)1-19
Number of pages19
JournalConcurrency Computation
Issue number22
Early online date14 Feb 2018
Publication statusPublished - 25 Nov 2019


  • container
  • data
  • Microservices
  • network
  • permission
  • security


Dive into the research topics of 'A survey on security issues in services communication of Microservices-enabled fog applications'. Together they form a unique fingerprint.

Cite this