Adaptive Middleware Mesh Architecture for Secure API Orchestration in Multi-Cloud Environments
DOI:
https://doi.org/10.22399/ijcesen.3803Keywords:
Service mesh federation, multi-cloud orchestration, AI-driven policy management, zero-trust architecture, API securityAbstract
Modern enterprise applications increasingly rely on distributed multi-cloud architectures that demand sophisticated API orchestration mechanisms capable of maintaining security, performance, and scalability across heterogeneous cloud environments. Traditional API gateway solutions exhibit significant limitations when managing complex inter-cloud communications, particularly in enforcing consistent security policies and maintaining optimal performance metrics. This work presents an Adaptive Middleware Mesh (AMM) architecture that leverages federated service mesh networks combined with artificial intelligence-driven policy inference engines to address these challenges. The proposed framework implements zero-trust security principles through mutual TLS authentication and SPIFFE identities while utilizing machine learning algorithms to dynamically adjust security policies based on real-time traffic patterns and threat intelligence. The architecture integrates multiple service mesh control planes across AWS, Azure, and GCP environments, establishing a unified orchestration layer that maintains policy consistency and operational efficiency. Performance evaluations demonstrate significant improvements in latency reduction, threat detection accuracy, and horizontal scaling capabilities compared to conventional ESB systems and monolithic API gateways. The AMM framework provides enterprises with a robust foundation for secure, scalable, and intelligent API management in complex multi-cloud deployments.
References
[1] Marco Zambianco, et al., "Cost Minimization in Multi-cloud Systems with Runtime Microservice Re-orchestration," IEEE preprint archive, 04 Jan 2024. Available: https://arxiv.org/html/2401.01408v2
[2] Xiang Gao, et al., "API Gateway Optimization Architecture Based on Heterogeneous Hardware Acceleration," 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), Date Added to IEEE Xplore: 06 July 2023. Available: https://ieeexplore.ieee.org/document/10165387 DOI: https://doi.org/10.1109/ICIBA56860.2023.10165387
[3] Saidulu Aldas, Andrew Babakia, "Cloud-Native Service Mesh Readiness for 5G and Beyond," IEEE Access, 23 November 2023. https://ieeexplore.ieee.org/stampPDF/getPDF.jsp?arnumber=10327727 DOI: https://doi.org/10.1109/ACCESS.2023.3335994
[4] Santosh Pashikanti, "Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework," IEEE-affiliated journal (via IJLRP), September 2023, International Journal of Latest Research in Engineering and Technology (IJLRP). https://www.ijlrp.com/papers/2023/9/1173.pdf
[5] Philippe Massonet, et al., "An Architecture for Securing Federated Cloud Networks with Service Function Chaining," 18 August 2016, 2016 IEEE Symposium on Computers and Communication (ISCC). https://ieeexplore.ieee.org/document/7543711?reload=true DOI: https://doi.org/10.1109/ISCC.2016.7543711
[6] Abhishek Bichhawat, et al., "Automating Audit with Policy Inference," 10 August 2021, 2021 IEEE 34th Computer Security Foundations Symposium (CSF). https://ieeexplore.ieee.org/abstract/document/9505224 DOI: https://doi.org/10.1109/CSF51468.2021.00001
[7] Anthony Nguyen, et al., "Deployment of a Multi-site Cloud Environment for Molecular Virtual Screenings," 26 October 2015, 2015 IEEE 11th International Conference on e-Science. https://ieeexplore.ieee.org/abstract/document/7304285 DOI: https://doi.org/10.1109/eScience.2015.49
[8] Wonho Suh, et al., "Mobile Computing Traffic Simulation Framework," 23 January 2014, 2013 International Conference on IT Convergence and Security (ICITCS). https://ieeexplore.ieee.org/document/6717856/references#references
[9] T.M. Conte, et al., "Benchmark Characterization for Experimental System Evaluation," 06 August 2002, Twenty-Third Annual Hawaii International Conference on System Sciences. https://ieeexplore.ieee.org/document/205094/references#references
[10] Zeeshan Siddiqui, et al., "Qualified Analysis Between ESBs Using Analytical Hierarchy Process (AHP) Method," 14 March 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation. https://ieeexplore.ieee.org/abstract/document/5730328 DOI: https://doi.org/10.1109/ISMS.2011.25
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.