Exploring the use of functions as a service paradigm in enterprise application integration
Enterprise application integration (EAI) addresses the challenge of integrating independent business systems. This process requires the integration mechanism to guarantee the confidentiality and integrity of the data at all times. The problem addressed in this article lies in the need to execute a c...
- Autores:
-
Pérez Covo, Ernesto Carlos
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2024
- Institución:
- Universidad de los Andes
- Repositorio:
- Séneca: repositorio Uniandes
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.uniandes.edu.co:1992/75387
- Acceso en línea:
- https://hdl.handle.net/1992/75387
- Palabra clave:
- TEE
Application integration
Security
Software Sustainability
Ingeniería
- Rights
- openAccess
- License
- Attribution 4.0 International
Summary: | Enterprise application integration (EAI) addresses the challenge of integrating independent business systems. This process requires the integration mechanism to guarantee the confidentiality and integrity of the data at all times. The problem addressed in this article lies in the need to execute a complex service in a completely secure environment while reducing resources consumption. Right now, solutions for this problem require the service to run continuously which leads to inefficient resource management and solution costs going up. In this article an alternative approach using Functions-as-a-Service (FaaS) paradigm to simplify the solutions is explored to simplify the execution process while maintaining the security standards. The lack of a secure channel through which critical operations are executed and processes are integrated in a smart city exposes vulnerabilities that compromise the security of the infrastructure and sensitive information. This document proposes the use of trusted execution environments (TEE) together with an asymmetric encryption system to encrypt information. This information will later be processed within the secure execution environment, which guarantees integrity and reliability of critical operations on the data, preventing access from the outside world. With this approach to the problem, secure data management can be guaranteed and unauthorized access can be reduced by operating within a completely isolated environment. |
---|