Abstract :
This research study explores the challenges and solutions related to serverless computing so that the computer systems connected to the network can be protected. Serverless computing can be defined as a method of managing computer services without the need to have fixed servers. The qualitative research method is used by this research study, which does not include any numerical data and involves the examination of non-number data so that the network security challenges can be identified in detail. In the literature review, the past studies from 2019 to 2023 are reviewed to identify study gaps so that the foundation for investigating serverless network security. The literature review is based on thematic analysis, so all the data can be organized into meaningful themes. The findings of this research study include the solutions to the challenges like data privacy, insecure dependencies and limited control. The strategies to overcome these challenges include encryption, strong monitoring and other relevant strategies. This research study also suggests the use of blockchain technology and Artificial Intelligence. In short, this research study provides insights to improve serverless computing security and also guides future researchers to innovate creative solutions for developing security challenges.
Keywords :
Cloud Security, Data Privacy Issues, Insecure Dependencies, Network Security, Serverless Computing.References :
- Javed, A. N. Toosi and M. S. Aslanpour, “Serverless platforms on edge: a performance analysis,” New Frontiers in Cloud Computing and Internet of Things, pp. 165-184, 2022.
- Mahajan, “Azure Serverless Computing: Architecture, Advantages, Azure Function,” 27 September 2023. [Online]. Available: https://k21academy.com/microsoft-azure/az-303/azure-serverless-computing-architecture-advantages-azure-function/.
- K. Gadepalli, G. Peach, L. Cherkasova, R. Aitken and G. Parmer, “Challenges and opportunities for efficient serverless computing at the edge,” 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp. 261-2615, 2019.
- BasuMallick, “What Is Serverless? Definition, Architecture, Examples, and Applications,” 24 March 2022. [Online]. Available: https://www.spiceworks.com/tech/devops/articles/what-is-serverless/.
- Kumar, “Serverless architectures review, future trend and the solutions to open problems,” American Journal of Software Engineering, pp. 1-10, 2019.
- Yussupov, U. Breitenbücher, F. Leymann and C. Müller, “Facing the unplanned migration of serverless applications: A study on portability problems, solutions, and dead ends,” Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, pp. 273-283, 2019.
- Golec, G. K. Walia, M. Kumar, F. Cuadrado, S. S. Gill and S. Uhlig, “Cold start latency in serverless computing: A systematic review, taxonomy, and future directions,” arXiv preprint arXiv:2310.08437, 2023.
- Singh, M. Masud, M. S. Hossain, A. Kaur, G. Muhammad and A. Ghoneim, “Privacy-preserving serverless computing using federated learning for smart grids,” IEEE Transactions on Industrial Informatics, pp. 7843-7852, 2021.
- Paloaltonetworks, “What Is Serverless Security?” 2020. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-serverless-security.
- Xiong, M. Wei, Z. Lu and Y. Liu, “Warmonger: inflicting denial-of-service via serverless functions in the cloud,” Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 955-969, 2021.
- Kelly, F. G. Glavin and E. Barrett, “Denial of wallet—defining a looming threat to serverless computing,” Journal of Information Security and Applications, p. 102843, 2021.
- Cloudflare, “What is a denial-of-service (DoS) attack?” 2020. [Online]. Available: https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/.
- A. S. Cassel, V. F. Rodrigues, R. da Rosa Righi, M. R. Bez, A. C. Nepomuceno and C. A. da Costa, “Serverless computing for Internet of Things: A systematic literature review,” Future Generation Computer Systems, pp. 299-316, 2022.
- Li, Y. Lin, Y. Wang, K. Ye and C. Xu, “Serverless computing: state-of-the-art, challenges and opportunities,” IEEE Transactions on Services Computing, pp. 1522-1539, 2022.
- Fortinet, “What Is Serverless Computing?,” 2020. [Online]. Available: https://www.fortinet.com/resources/cyberglossary/serverless-computing.
- Solaiman, “Novel architecture for mitigating cold start problem in serverless computing,” 2023.
- Li, X. Leng and Y. Chen, “Securing Serverless Computing: Challenges, Solutions, and Opportunities,” IEEE Network, 2022.
- Kumari, M. K. Patra and B. Sahoo, “Data Controlling and Security Issues in Cloud: A Step Towards Serverless,” Perspectives on Social Welfare Applications’ Optimization and Enhanced Computer Applications, pp. 105-124, 2023.
- Kolodiy, “Importance of Security in Serverless Technologies,” 31 March 2022. [Online]. Available: https://www.techmagic.co/blog/serverless-security-main-threats-and-how-to-overcome-them/.
- Stojkovic, T. Xu, H. Franke and J. Torrellas, “MXFaaS: Resource Sharing in Serverless Environments for Parallelism and Efficiency,” Proceedings of the 50th Annual International Symposium on Computer Architecture, pp. 1-15, 2023.
- Marin, D. Perino and R. Di Pietro, “Serverless computing: a security perspective,” Journal of Cloud Computing, pp. 1-12, 2022.
- Sharma, “Serverless Computing: Advantages and Disadvantages,” 2020. [Online]. Available: https://www.tatvasoft.com/outsourcing/2022/11/benefits-of-serverless.html.
- Kumari and B. Sahoo, “ACPM: adaptive container provisioning model to mitigate serverless cold-start,” Cluster Computing, pp. 1-28, 2023.
- Wu and W. C. Feng, “Game to dethrone: The least privilege CTF,” IEEE 6th International Conference on Smart Cloud (SmartCloud), pp. 132-137, 2021.
- Arulprakash and K. Sampath Kumar, “Improved Encryption Towards Data Security in Serverless Computing,” Journal of Computational and Theoretical Nanoscience, pp. 5256-5260, 2020.
- A. Prakash and K. S. Kumar, “Cloud serverless security and services: a survey,” Applications of Computational Methods in Manufacturing and Product Design: Select Proceedings of IPDIMS, pp. 453-462, 2022.
- Torkut, “How to Mitigate Risks Of Your Multi-Tenant Security Model,” 17 May 2023. [Online]. Available: https://ascendixtech.com/multi-tenant-security-model/.
- Loaiza Enriquez, “Cloud Security Posture Management/CSPM) in Azure,” 2021.
- O’Meara and R. G. Lennon, “Serverless computing security: Protecting application logic,” 31st Irish Signals and Systems Conference (ISSC), pp. 1-5, 2020.
- Casey, “Serverless Security Best Practices,” 12 April 2023. [Online]. Available: https://www.beyondtrust.com/blog/entry/serverless-security-best-practices.
- Mateus-Coelho and M. Cruz-Cunha, “Serverless Service Architectures and Security Minimals,” 10th International Symposium on Digital Forensics and Security (ISDFS), pp. 1-6, 2022.
- a. P. T. Center, “Serverless Security: Everything You Need to Know About It,” 11 July 2019. [Online]. Available: https://www.plugandplaytechcenter.com/resources/serverless-security-everything-you-need-know-about-it/.
- Adastracorp, “The Pros and Cons of Serverless Computing,” 12 JULY 2020. [Online]. Available: https://adastracorp.com/insights/the-pros-and-cons-of-serverless-computing/.
- V. L. N. Venugopal and C. R. K. Reddy, “Serverless through cloud-native architecture,” Int. J. Eng. Res. Technol, pp. 484-496, 2021.
- Li, L. Guo, J. Cheng, Q. Chen, B. He and M. Guo, “The serverless computing survey: A technical primer for design architecture,” ACM Computing Surveys (CSUR), pp. 1-34, 2022.
- Seth, S. Dalal, V. Jaglan, D. N. Le, S. Mohan and G. Srivastava, “Integrating encryption techniques for secure data storage in the cloud,” Transactions on Emerging Telecommunications Technologies, p. 4108, 2022.
- Addeppally, “Serverless Architecture – The What, When and Why,” 2020. [Online]. Available: https://www.cloudnowtech.com/blog/serverless-architecture-the-what-when-and-why/.
- Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, p. 1333, 2023.
- Ngo, P. Wang, T. Tran and S. Chung, “Serverless Computing Architecture Security and Quality Analysis for Backend Development,” Journal of The Colloquium for Information Systems Security Education, pp. 8-8, 2020.
- Harauzek, “Cloud Computing: Challenges of cloud computing from business users perspective-vendor lock-in,” 2022.
- Papazov, G. Sharkov, G. Koykov and C. Todorova, “Managing Cyber-Education Environments with Serverless Computing,” Digital Transformation, Cyber Security and Resilience of Modern Societies, pp. 49-60, 2021.