Enhancing Database Transaction Management through Hibernate in Secure Microservices Architectures
Keywords:
Microservices, Hibernate, Transaction management, ACID, Connection pooling, Database performance, Secure communication, Encryption, Graph database, Query optimizationAbstract
This paper explores improving database transaction management and security in microservices architectures using Hibernate and modern database techniques. The main purpose is to ensure data consistency, optimize performance, and secure inter-service communication in distributed systems. Microservices often face challenges with separate databases, high traffic, and complex data relationships, which can lead to latency, overload, or data breaches. To address this, the study uses a combined method of literature review and practical implementation. Existing research on Hibernate, connection pooling, secure communication protocols, and graph databases is analyzed to identify best practices. A prototype microservices system is developed using Spring Boot and Hibernate for transaction management. Connection pooling with HikariCP is applied to reduce latency and prevent database overload. Security is enforced using TLS encryption, JWT authentication, and role-based access control for inter-service communication. Selected services are migrated to a graph database, such as Neo4j, to evaluate improvements in handling complex relationships. Findings show that Hibernate ensures ACID-compliant transactions, connection pooling improves database performance, and secure communication prevents unauthorized access. Graph databases reduce query complexity and enhance response times in highly interconnected services. Overall, combining these strategies creates a robust, scalable, and fault-tolerant microservices architecture. This study demonstrates that integrating advanced transaction management, security, and graph database techniques provides an efficient framework for reliable, secure, and high-performance operations in modern microservices systems.Downloads
References
Aldea, C. L., Bocu, R., & Vasilescu, A. (2022). Relevant cybersecurity aspects of IoT microservices architectures deployed over next-generation mobile networks. Sensors, 23(1), 189. Available at: https://www.mdpi.com/1424-8220/23/1/189
Arcuri, A. and Juan Pablo Galeotti (2019). SQL data generation to enhance search-based system testing. Proceedings of the Genetic and Evolutionary Computation Conference. Available at: https://doi.org/10.1145/3321707.3321732
Baresi, L. and Garriga, M. (2019). Microservices: The Evolution and Extinction of Web Services? Microservices, pp.3–28. Available at: https://doi.org/10.1007/978-3-030-31646-4_1
Cassell, C. (2017). The SAGE Handbook of Qualitative Business and Management Research Methods : Methods and Challenges. www.torrossa.com, [online] pp.1–542. Available at: https://www.torrossa.com/gs/resourceProxy?an=5018775&publisher=FZ7200#page=489
Cruz, J.P., Kaji, Y. and Yanai, N. (2018). RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access, 6, pp.12240–12251. Available at: https://doi.org/10.1109/access.2018.2812844
GÜVERCİN, A.E. and AVENOGLU, B. (2022). Nesne-İlişkisel Eşleme (ORM) Araçlarının .NET 6 Ortamında Performans Analizi. Bilişim Teknolojileri Dergisi, 15(4), pp.453–465. Available at: https://doi.org/10.17671/gazibtd.1059516
Hu, Y., Zhu, Z., Neal, I., Kwon, Y., Cheng, T., Chidambaram, V. and Witchel, E. (2019). TxFS. ACM Transactions on Storage, 15(2), pp.1–20. Available at: https://doi.org/10.1145/3318159
Ibrahim, I.M., Ameen, S.Y., Yasin, H.M., Omar, N., Kak, S.F., Rashid, Z.N., Salih, A.A., Salim, N.O.M. and Ahmed, D.M. (2021). Web Server Performance Improvement Using Dynamic Load Balancing Techniques: A Review. Asian Journal of Research in Computer Science, pp.47–62. Available at: https://doi.org/10.9734/ajrcos/2021/v10i130234
Keville, K.L., Garg, R., Yates, D.J., Arya, K. and Cooperman, G. (2012). Towards Fault-Tolerant Energy-Efficient High Performance Computing in the Cloud. [online] pp.622–626. Available at: https://doi.org/10.1109/cluster.2012.74
Knauth, T., Steiner, M., Chakrabarti, S., Lei, L., Xing, C. and Vij, M. (2019). Integrating Remote Attestation with Transport Layer Security. [online] arXiv.org. Available at: https://doi.org/10.48550/arXiv.1801.05863
Laigner, R., Zhou, Y., Salles, M. A. V., Liu, Y., & Kalinowski, M. (2021). Data management in microservices: State of the practice, challenges, and research directions. arXiv preprint arXiv:2103.00170. Available at: https://arxiv.org/pdf/2103.00170
Luo, S., Xu, H., Lu, C., Ye, K., Xu, G., Zhang, L., Ding, Y., He, J. and Xu, C.-Z. (2021). Characterizing Microservice Dependency and Performance. Available at: https://doi.org/10.1145/3472883.3487003
Mateus-Coelho, N., Cruz-Cunha, M., & Ferreira, L. G. (2021). Security in microservices architectures. Procedia Computer Science, 181, 1225-1236. Available at: https://www.sciencedirect.com/science/article/pii/S1877050921003719/pdf?md5=862927ebe360370490eac5ae06eddf46&pid=1-s2.0-S1877050921003719-main.pdf
Naguib, M. and Al, A. (2021). Implementing Robust Security in .NET Applications: Best Practices for Authentication and Authorization - Repository Universitas Muhammadiyah Sidoarjo. Umsida.ac.id. [online] Available at: http://eprints.umsida.ac.id/16128/1/289%20Implementing%20Robust%20Security%20in%20.NET%20Applications%20Best%20Practices%20for%20Authentication%20and%20Authorization.pdf
Nor Sobri, N.A., Abas, M.A.H., Mohd Yassin, A.I., Megat Ali, M.S.A., Md Tahir, N. and Zabidi, A. (2022). Database connection pool in microservice architecture / Nur Ayuni Nor Sobri ...[et al.]. Journal of Electrical and Electronic Systems Research (JEESR), [online] 20, pp.29–33. Available at: https://doi.org/10.24191/jeesr.v20i1.004
Priebe, C., Vaswani, K. and Costa, M. (2018). EnclaveDB: A Secure Database Using SGX. [online] IEEE Xplore. Available at: https://doi.org/10.1109/SP.2018.00025
Shafabakhsh, B. (2020). Research on Interprocess Communication in Microservices Architecture. [online] DIVA. Available at: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1451042.
Shingala, K. (2019). JSON Web Token (JWT) based client authentication in Message Queuing Telemetry Transport (MQTT). arXiv:1903.02895 [cs]. [online] Available at: https://arxiv.org/abs/1903.02895
Sobri, N. A. N., Abas, M. A. H., Yassin, I. M., Ali, M. S. A. M., Tahir, N. M., Zabidi, A., & Rizman, Z. I. (2022). A study of database connection pool in microservice architecture. JOIV: International Journal on Informatics Visualization, 6(2-2), 566-571. Available at: https://www.joiv.org/index.php/joiv/article/viewFile/1094/507
Stanescu, L. (2021). A Comparison between a Relational and a Graph Database in the Context of a Recommendation System. Available at: https://doi.org/10.15439/2021f33
Vikram Nitin, Asthana, S., Ray, B. and Krishna, R. (2022). CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. arXiv (Cornell University). Available at: https://doi.org/10.1145/3551349.3556960
Virolainen, T. (2021). Migrating Microservices to Graph Database. Available at: https://core.ac.uk/download/pdf/395382235.pdf
References of Figure
Annual-Report (2020). MAKING BANKING BETTER, TOGETHER. [online] Available at: https://www.temenos.com/wp-content/uploads/2021/03/2020-Annual-Report-7u42lsu22.pdf
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.
 
						 
											


