Improving Security and Data Protection of Serverless Computing in the Cloud Environment

Authors

DOI:

https://doi.org/10.26438/ijcse/v12i5.1927

Keywords:

serverless computing, cloud computing, cyber- securit, application security and privac

Abstract

Offering scalability and cost-effectiveness, serverless computing has become a promising paradigm for managing and deploying applications in the cloud. But as serverless architectures become more widely used, security and data protection issues have taken center stage. This study investigates techniques and approaches to improve serverless computing`s security and data protection in cloud environments. It looks at a number of serverless architecture-specific security issues, including function-level vulnerabilities, the shared responsibility paradigm, and the possibility of data disclosure. The study also looks into best practices and current security techniques, such as access control, encryption, monitoring, and compliance procedures, to help address these issues. This presentation offers an overview of the current security situation in serverless computing through an extensive examination of the literature and case studies.Organizations can take use of serverless computing`s advantages while maintaining the privacy, availability, and integrity of their data and apps by resolving these problems.

References

[1]Marin, Eduard, Diego Perino, and Roberto Di Pietro. "Serverless computing: a security perspective." Journal of Cloud Computing 11, No.1, 2022.

[2] M. Wu, Z. Mi and Y. Xia, "A Survey on Serverless Computing and Its Implications for JointCloud Computing," 2020 IEEE International Conference on Joint Cloud Computing, Oxford, UK, pp.94-101, 2020. doi:10.1109/JCC49151.2020.00023.

[3] W. O`Meara and R. G. Lennon, “Serverless Computing Security Protecting Application Logic”, 2020 31st Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland, pp.1-5, 2020. doi 10.1109ISSC49989.2020.9180214.

[4] Sankaran, A., Datta, P. and Bates, A., 2020, December. “Workflow integration alleviates identity and access management in serverless computing”. In Annual Computer Security Applications Conference pp.496-509, 2020. https://doi.org/10.1145/3427228.3427665

[5] Polinsky, I., Datta, P., Bates, A. and Enck, W., 2021, June. SCIFFS: “Enabling secure third-party security analytics using serverless computing”. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies pp.175-186, 2021. https://doi.org/10.1145/3450569.3463567

[6] Alpernas, K., Flanagan, C., Fouladi, S., Ryzhyk, L., Sagiv, M., Schmitz, T. and Winstein, K., 2018. “Secure serverless computing using dynamic information flow control. Proceedings of the ACM on Programming Languages”, 2 (OOPSLA), pp.1-26, 2018. https://doi.org/10.1145/3276488

[7] Ahmadi, S., 2024. “Challenges and Solutions in Network Security for Serverless Computing” No.11747, 2024. EasyChair.DOI: 10.47191/ijcsrr/V7-i1-23, Impact Factor: 6.789

[8] Gadepalli, P.K., Peach, G., Cherkasova, L., Aitken, R. and Parmer, G., 2019, October. “Challenges and opportunities for efficient serverless computing” at the edge. In 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp.261-2615, 2019. IEEE.DOI 10.1109/SRDS47363.2019.00036

[9] Ihtesham, M., Tahir, S., Tahir, H., Hasan, A., Sultan, A., Saeed, S. and Rana, O., 2023.” Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS)”, 2023. IEEE Access. Digital Object Identifier 10.1109/ACCESS.2023.3324817

[10] Chowdhury, N.A., “Evaluating the Security Implications of Serverless Computing Environments: A Focus on Vulnerabilities and Countermeasures”. DOI: 10.5281/zenodo.10488030

[11]Cinar, B., “The Rise of Serverless Architectures: Security Challenges and Best Practices. Asian Journal of Research in Computer Science”, Vol.16, Issue.4, pp.194-210, 2023. DOI: 10.9734/AJRCOS/2023/v16i4382

[12]Qiang, W., Dong, Z. and Jin, H., 2018. Se-lambda: “Securing privacy-sensitive serverless applications using sgx enclave. In Security and Privacy in Communication Networks”: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, pp.451-470, 2018. Springer International Publishing.https://doi.org/10.1007/978-3-030-01701-9_25

[13] Stigler, M. and Stigler, M., 2018.” Understanding serverless computing”. Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud, pp.1-https://doi.org/10.1007/978-1-4842-3084-8_1

[14]Sewak, M. and Singh, S., April. “Winning in the era of serverless computing and function as a service”. In 2018 3rd International Conference for Convergence in Technology (I2CT), pp.1-5, 2018. IEEE. 978-1-5386-4273-3/18/$31.00 ©2018 IEEE

[15]Rashid, A. and Chaturvedi, A. “Cloud computing characteristics and services: a brief review”. International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.421-426, 2019.

[16] Suryateja, P.S., 2018.” Threats and vulnerabilities of cloud computing: a review”. International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.

Downloads

Published

2024-05-31
CITATION
DOI: 10.26438/ijcse/v12i5.1927
Published: 2024-05-31

How to Cite

[1]
S. Singh and G. Singh Bhathal, “Improving Security and Data Protection of Serverless Computing in the Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 12, no. 5, pp. 19–27, May 2024.

Issue

Section

Research Article