A Resilient Secure Data Access Architecture for Real-Time Web and Mobile Cloud Applications

Main Article Content

Mahesh Babu Sakhamuri

Abstract

Real-time web and mobile applications, such as financial trading platforms and high-volume e-commerce, demand ultra-low-latency data access coupled with uncompromising security and fault tolerance. Traditional security models often introduce synchronous checks that degrade performance and become single points of failure. This paper proposes the Resilient Secure Data Access Architecture (RSDAA), a novel, multi-zone architecture designed to enforce security policies while maximizing availability and minimizing latency. RSDAA leverages a Decentralized Policy Enforcement Point (PEP) mesh combined with a leaderless, multi-region Policy Decision Point (PDP) to ensure continuous operation even during regional outages or security service failures. Key resilience mechanisms include asynchronous policy updates, fast failover routing based on health checks, and a "Secure-by-Cache" policy for transient network partitions. The empirical evaluation demonstrates that RSDAA achieves a $99.99\%$ availability for data access and maintains a P95 transaction latency increase of less than $1.0 \text{ms}$ under load, confirming its ability to deliver high-security standards without sacrificing the low-latency and resilience required by critical real-time cloud systems.

Article Details

Section

Articles

How to Cite

A Resilient Secure Data Access Architecture for Real-Time Web and Mobile Cloud Applications. (2024). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(Special Issue 1), 1-4. https://doi.org/10.15662/IJRPETM.2024.0705801

References

1. Chanda, R., Dutta, S., & Chatterjee, A. (2022). Policy as-Code for Cloud Security: A Comprehensive Review. Journal of Cloud Computing, 11(1), 1–25. https://doi.org/10.1186/s13677-022-00326-7

2. Gartner. (2023). Hype Cycle for Cloud Security, 2023. Gartner Research Note. (For contemporary trends in cloud security architecture and ZT maturity.)

3. Krishnan, S., & Singh, A. (2021). Building Resilient Microservices: A Decentralized Approach to Authorization. Proceedings of the IEEE International Conference on Software Engineering (ICSE), 120–130. https://doi.org/10.1109/ICSE-Companion50604.2021.00030

4. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207

5. Vogels, W. (2008). A decade of Dynamo: Lessons from high-scale distributed systems. ACM Queue, 6(6). (Foundational text on resilience and low-latency distributed design.)

6. Kolla, S. (2021). ZERO TRUST SECURITY MODELS FOR DATABASES: STRENGTHENING DEFENCES IN HYBRID AND REMOTE ENVIRONMENTS. International Journal of Computer Engineering and Technology, 12(1), 91-104. https://doi.org/10.34218/IJCET_12_01_009

7. Wang, L., Zhang, Y., & Chen, J. (2022). Performance Evaluation of Multi-Region Consensus Mechanisms in Cloud Native Environments. IEEE Transactions on Cloud Computing, 10(3), 1122–1135. https://doi.org/10.1109/TCC.2022.3168750

8. Pachyappan, R., Vijayaboopathy, V., & Paul, D. (2022). Enhanced Security and Scalability in Cloud Architectures Using AWS KMS and Lambda Authorizers: A Novel Framework. Newark Journal of Human-Centric AI and Robotics Interaction, 2, 87-119.

9. Vangavolu, S. V. (2023). DEEP DIVE INTO ANGULAR'S CHANGE DETECTION MECHANISM. International Journal of Computer Engineering and Technology (IJCET), 14(1), 81-99. https://doi.org/10.34218/IJCET_14_01_010