Enhancing Database Transaction Management through Hibernate in Secure Microservices Architectures

Authors

  • Jaya Krishna Modadugu, Ravi Teja Prabhala Venkata, Karthik Prabhala Venkata

Keywords:

Microservices, Hibernate, Transaction management, ACID, Connection pooling, Database performance, Secure communication, Encryption, Graph database, Query optimization

Abstract

This paper explores improving database transaction management and security in microservices architectures using Hibernate and modern database techniques. The main purpose is to ensure data consistency, optimize performance, and secure inter-service communication in distributed systems. Microservices often face challenges with separate databases, high traffic, and complex data relationships, which can lead to latency, overload, or data breaches. To address this, the study uses a combined method of literature review and practical implementation. Existing research on Hibernate, connection pooling, secure communication protocols, and graph databases is analyzed to identify best practices. A prototype microservices system is developed using Spring Boot and Hibernate for transaction management. Connection pooling with HikariCP is applied to reduce latency and prevent database overload. Security is enforced using TLS encryption, JWT authentication, and role-based access control for inter-service communication. Selected services are migrated to a graph database, such as Neo4j, to evaluate improvements in handling complex relationships. Findings show that Hibernate ensures ACID-compliant transactions, connection pooling improves database performance, and secure communication prevents unauthorized access. Graph databases reduce query complexity and enhance response times in highly interconnected services. Overall, combining these strategies creates a robust, scalable, and fault-tolerant microservices architecture. This study demonstrates that integrating advanced transaction management, security, and graph database techniques provides an efficient framework for reliable, secure, and high-performance operations in modern microservices systems.

Downloads

Download data is not yet available.

References

Aldea, C. L., Bocu, R., & Vasilescu, A. (2022). Relevant cybersecurity aspects of IoT microservices architectures deployed over next-generation mobile networks. Sensors, 23(1), 189. Available at: https://www.mdpi.com/1424-8220/23/1/189

Arcuri, A. and Juan Pablo Galeotti (2019). SQL data generation to enhance search-based system testing. Proceedings of the Genetic and Evolutionary Computation Conference. Available at: https://doi.org/10.1145/3321707.3321732

Baresi, L. and Garriga, M. (2019). Microservices: The Evolution and Extinction of Web Services? Microservices, pp.3–28. Available at: https://doi.org/10.1007/978-3-030-31646-4_1

Cassell, C. (2017). The SAGE Handbook of Qualitative Business and Management Research Methods : Methods and Challenges. www.torrossa.com, [online] pp.1–542. Available at: https://www.torrossa.com/gs/resourceProxy?an=5018775&publisher=FZ7200#page=489

Cruz, J.P., Kaji, Y. and Yanai, N. (2018). RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access, 6, pp.12240–12251. Available at: https://doi.org/10.1109/access.2018.2812844

GÜVERCİN, A.E. and AVENOGLU, B. (2022). Nesne-İlişkisel Eşleme (ORM) Araçlarının .NET 6 Ortamında Performans Analizi. Bilişim Teknolojileri Dergisi, 15(4), pp.453–465. Available at: https://doi.org/10.17671/gazibtd.1059516

Hu, Y., Zhu, Z., Neal, I., Kwon, Y., Cheng, T., Chidambaram, V. and Witchel, E. (2019). TxFS. ACM Transactions on Storage, 15(2), pp.1–20. Available at: https://doi.org/10.1145/3318159

Ibrahim, I.M., Ameen, S.Y., Yasin, H.M., Omar, N., Kak, S.F., Rashid, Z.N., Salih, A.A., Salim, N.O.M. and Ahmed, D.M. (2021). Web Server Performance Improvement Using Dynamic Load Balancing Techniques: A Review. Asian Journal of Research in Computer Science, pp.47–62. Available at: https://doi.org/10.9734/ajrcos/2021/v10i130234

Keville, K.L., Garg, R., Yates, D.J., Arya, K. and Cooperman, G. (2012). Towards Fault-Tolerant Energy-Efficient High Performance Computing in the Cloud. [online] pp.622–626. Available at: https://doi.org/10.1109/cluster.2012.74

Knauth, T., Steiner, M., Chakrabarti, S., Lei, L., Xing, C. and Vij, M. (2019). Integrating Remote Attestation with Transport Layer Security. [online] arXiv.org. Available at: https://doi.org/10.48550/arXiv.1801.05863

Laigner, R., Zhou, Y., Salles, M. A. V., Liu, Y., & Kalinowski, M. (2021). Data management in microservices: State of the practice, challenges, and research directions. arXiv preprint arXiv:2103.00170. Available at: https://arxiv.org/pdf/2103.00170

Luo, S., Xu, H., Lu, C., Ye, K., Xu, G., Zhang, L., Ding, Y., He, J. and Xu, C.-Z. (2021). Characterizing Microservice Dependency and Performance. Available at: https://doi.org/10.1145/3472883.3487003

Mateus-Coelho, N., Cruz-Cunha, M., & Ferreira, L. G. (2021). Security in microservices architectures. Procedia Computer Science, 181, 1225-1236. Available at: https://www.sciencedirect.com/science/article/pii/S1877050921003719/pdf?md5=862927ebe360370490eac5ae06eddf46&pid=1-s2.0-S1877050921003719-main.pdf

Naguib, M. and Al, A. (2021). Implementing Robust Security in .NET Applications: Best Practices for Authentication and Authorization - Repository Universitas Muhammadiyah Sidoarjo. Umsida.ac.id. [online] Available at: http://eprints.umsida.ac.id/16128/1/289%20Implementing%20Robust%20Security%20in%20.NET%20Applications%20Best%20Practices%20for%20Authentication%20and%20Authorization.pdf

Nor Sobri, N.A., Abas, M.A.H., Mohd Yassin, A.I., Megat Ali, M.S.A., Md Tahir, N. and Zabidi, A. (2022). Database connection pool in microservice architecture / Nur Ayuni Nor Sobri ...[et al.]. Journal of Electrical and Electronic Systems Research (JEESR), [online] 20, pp.29–33. Available at: https://doi.org/10.24191/jeesr.v20i1.004

Priebe, C., Vaswani, K. and Costa, M. (2018). EnclaveDB: A Secure Database Using SGX. [online] IEEE Xplore. Available at: https://doi.org/10.1109/SP.2018.00025

Shafabakhsh, B. (2020). Research on Interprocess Communication in Microservices Architecture. [online] DIVA. Available at: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1451042.

Shingala, K. (2019). JSON Web Token (JWT) based client authentication in Message Queuing Telemetry Transport (MQTT). arXiv:1903.02895 [cs]. [online] Available at: https://arxiv.org/abs/1903.02895

Sobri, N. A. N., Abas, M. A. H., Yassin, I. M., Ali, M. S. A. M., Tahir, N. M., Zabidi, A., & Rizman, Z. I. (2022). A study of database connection pool in microservice architecture. JOIV: International Journal on Informatics Visualization, 6(2-2), 566-571. Available at: https://www.joiv.org/index.php/joiv/article/viewFile/1094/507

Stanescu, L. (2021). A Comparison between a Relational and a Graph Database in the Context of a Recommendation System. Available at: https://doi.org/10.15439/2021f33

Vikram Nitin, Asthana, S., Ray, B. and Krishna, R. (2022). CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. arXiv (Cornell University). Available at: https://doi.org/10.1145/3551349.3556960

Virolainen, T. (2021). Migrating Microservices to Graph Database. Available at: https://core.ac.uk/download/pdf/395382235.pdf

References of Figure

Annual-Report (2020). MAKING BANKING BETTER, TOGETHER. [online] Available at: https://www.temenos.com/wp-content/uploads/2021/03/2020-Annual-Report-7u42lsu22.pdf

Downloads

Published

28.11.2023

How to Cite

Jaya Krishna Modadugu. (2023). Enhancing Database Transaction Management through Hibernate in Secure Microservices Architectures. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 961–968. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7884

Issue

Section

Research Article