
Figure 12: Time that pm sends CSR/CRMF and receives
the certificate.
6 RELATED WORK
In the study of ”Securing IoT Microservices with Cer-
tificates” by (Pahl and Donini, 2018) addresses secu-
rity issues in IoT systems where microservices oper-
ate on distributed, resource-limited nodes. The au-
thor proposes a certificate-based approach to main-
tain authentication, accountability, and data integrity
throughout the service lifecycle, from development to
updates. Another paper proposes a framework for se-
curely managing and rotating secrets in cloud-based
microservices (Singh and Aggarwal, 2023). It auto-
mates secret rotation, balances centralized and decen-
tralized strategies, and ensures minimal service dis-
ruption. The approach includes key encryption, peri-
odic rotation, access control, and automated revoca-
tion, enhancing overall system security. The frame-
work focuses on scalability, continuous monitoring,
and robust auditing, providing a secure and efficient
solution for cloud environments. Finally, (Kr
¨
amer
et al., 2019) addresses securing applications in smart
city cloud environments using microservices. It out-
lines challenges such as data privacy, authentication,
and inter-service communication. The authors pro-
pose a multi-layered security model that combines
role-based access control, encryption, and trusted
communication protocols.
Our paper distinguishes itself from existing re-
search by focusing on implementing Public Key In-
frastructure (PKI) through a microservice-based ar-
chitecture tailored for small and medium-sized en-
terprises (SMEs). Unlike traditional cloud-centric
or monolithic PKI systems, your solution prioritizes
on-premises scalability, modular updates, and mini-
mal resource overhead, using Docker-based microser-
vices and Commercial Off-The-Shelf (COTS) prod-
ucts. This design avoids the high costs, vendor lock-
ins, and complexities of Kubernetes, offering SMEs
greater control, security, and adaptability. By focus-
ing on localized infrastructure, your approach ensures
scalability, cost efficiency, and robust security without
relying on cloud dependencies, making it a practical
and accessible choice for businesses with limited bud-
gets and resources.
7 CONCLUSION
This paper presents a cost-efficient security model for
device lifecycle management, integrating key provi-
sioning, certificate management, and software man-
agement through a microservice architecture. The
model supports small-sized organizations and diverse
operational environments, ensuring cost efficiency,
flexibility, and scalability.
A case study demonstrates the model’s implemen-
tation using commercially off-the-shelf (COTS) solu-
tions. This approach allows organizations to establish
a security infrastructure that meets current require-
ments and adapts to future challenges and changes
in the security landscape, maintaining robust security
measures against evolving threats.
REFERENCES
Al Blooshi, S. and Han, K. (2022). A study on employ-
ing uptane for secure software update ota in drone en-
vironments. In 2022 IEEE international conference
on omni-layer intelligent systems (COINS), pages 1–
6. IEEE.
Chandramouli, R. (2019). Microservices-based application
systems. NIST Special Publication, 800(204):800–
204.
Chia, J., Heng, S.-H., Chin, J.-J., Tan, S.-Y., and Yau, W.-C.
(2021). An implementation suite for a hybrid public
key infrastructure. Symmetry, 13(8):1535.
Dua, A., Barpanda, S. S., Kumar, N., and Tanwar, S.
(2020). Trustful: A decentralized public key infras-
tructure and identity management system. In 2020
IEEE Globecom Workshops (GC Wkshps. IEEE.
Gaudio, D., Reichel, M., and Hirmer, P. (2020). A life cy-
cle method for device management in dynamic IoT
environments. In Proceedings of the 5th International
Conference on Internet of Things, Big Data and Secu-
rity. SCITEPRESS - Science and Technology Publi-
cations.
Hasselbring, W. (2016). Microservices for scalability:
Keynote talk abstract. In Proceedings of the 7th
ACM/SPEC on International Conference on Perfor-
mance Engineering, pages 133–134.
Howell, G., Franklin, J. M., Sritapan, V., Souppaya, M., and
Scarfone, K. (2023). Guidelines for managing the se-
curity of mobile devices in the enterprise. Technical
Securing the Device Lifecycle Management: A Scalable and Cost-Efficient Public Key Infrastructure Through Microservices
351