Evaluating Security Models for Database-Driven Microservices using Java and Hibernate

Main Article Content

Jaya Krishna Modadugu, Ravi Teja Prabhala Venkata, Karthik Prabhala Venkata

Abstract

This paper investigates security models for database-driven microservices using Java and Hibernate. The primary purpose is to evaluate authentication, access control, encryption, and transactional integrity mechanisms. Secondary research was employed, analysing academic literature, technical reports, and case studies for evidence. Role-based and attribute-based access controls are examined for fine-grained permission enforcement across distributed services. Hibernate ORM is analysed for SQL injection prevention and ACID-compliant transactional integrity. JWT and OAuth2 integration are evaluated for stateless and scalable authentication across service endpoints. AES encryption secures data-at-rest, while TLS ensures safe transmission between microservices. Logging, anomaly detection, and monitoring frameworks are reviewed for real-time threat identification and mitigation. Findings demonstrate that RBAC simplifies administration, whereas ABAC enables dynamic, context-aware access control. Hibernate’s ORM mapping reduces injection vulnerabilities but requires careful configuration. JWT/OAuth2 improves scalability and endpoint security, but token revocation management remains essential. AES and TLS provide robust data confidentiality and integrity, contingent on proper key management. Hybrid RBAC-ABAC models enhance permission enforcement without significant performance loss. Containerised microservices require secure propagation of keys, tokens, and policies. Overall, layered security combining access control, encryption, authentication, and monitoring ensures resilient, scalable, and secure Java-Hibernate microservices. This study highlights practical trade-offs, implementation challenges, and mitigation strategies, providing comprehensive guidance for developers and researchers. The paper contributes evidence-based insights into securing database-driven microservices in distributed, high-concurrency architectures.

Article Details

Section
Articles