Open Access   Article Go Back

Improving Security and Data Protection of Serverless Computing in the Cloud Environment

Sahibdeep Singh1 , Gurjit Singh Bhathal2

  1. Dept. of computer Science and Engineering, Punjabi University, Patiala, India.
  2. Dept. of computer Science and Engineering, Punjabi University, Patiala, India.

Section:Research Paper, Product Type: Journal Paper
Volume-12 , Issue-5 , Page no. 19-27, May-2024

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v12i5.1927

Online published on May 31, 2024

Copyright © Sahibdeep Singh, Gurjit Singh Bhathal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sahibdeep Singh, Gurjit Singh Bhathal, “Improving Security and Data Protection of Serverless Computing in the Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.19-27, 2024.

MLA Style Citation: Sahibdeep Singh, Gurjit Singh Bhathal "Improving Security and Data Protection of Serverless Computing in the Cloud Environment." International Journal of Computer Sciences and Engineering 12.5 (2024): 19-27.

APA Style Citation: Sahibdeep Singh, Gurjit Singh Bhathal, (2024). Improving Security and Data Protection of Serverless Computing in the Cloud Environment. International Journal of Computer Sciences and Engineering, 12(5), 19-27.

BibTex Style Citation:
@article{Singh_2024,
author = {Sahibdeep Singh, Gurjit Singh Bhathal},
title = {Improving Security and Data Protection of Serverless Computing in the Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2024},
volume = {12},
Issue = {5},
month = {5},
year = {2024},
issn = {2347-2693},
pages = {19-27},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5687},
doi = {https://doi.org/10.26438/ijcse/v12i5.1927}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v12i5.1927}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5687
TI - Improving Security and Data Protection of Serverless Computing in the Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Sahibdeep Singh, Gurjit Singh Bhathal
PY - 2024
DA - 2024/05/31
PB - IJCSE, Indore, INDIA
SP - 19-27
IS - 5
VL - 12
SN - 2347-2693
ER -

VIEWS PDF XML
115 121 downloads 84 downloads
  
  
           

Abstract

Offering scalability and cost-effectiveness, serverless computing has become a promising paradigm for managing and deploying applications in the cloud. But as serverless architectures become more widely used, security and data protection issues have taken center stage. This study investigates techniques and approaches to improve serverless computing`s security and data protection in cloud environments. It looks at a number of serverless architecture-specific security issues, including function-level vulnerabilities, the shared responsibility paradigm, and the possibility of data disclosure. The study also looks into best practices and current security techniques, such as access control, encryption, monitoring, and compliance procedures, to help address these issues. This presentation offers an overview of the current security situation in serverless computing through an extensive examination of the literature and case studies.Organizations can take use of serverless computing`s advantages while maintaining the privacy, availability, and integrity of their data and apps by resolving these problems.

Key-Words / Index Term

cloud computing, serverless computing, cyber- security, application security and privacy

References

[1]Marin, Eduard, Diego Perino, and Roberto Di Pietro. "Serverless computing: a security perspective." Journal of Cloud Computing 11, No.1, 2022.
[2] M. Wu, Z. Mi and Y. Xia, "A Survey on Serverless Computing and Its Implications for JointCloud Computing," 2020 IEEE International Conference on Joint Cloud Computing, Oxford, UK, pp.94-101, 2020. doi:10.1109/JCC49151.2020.00023.
[3] W. O`Meara and R. G. Lennon, “Serverless Computing Security Protecting Application Logic”, 2020 31st Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland, pp.1-5, 2020. doi 10.1109ISSC49989.2020.9180214.
[4] Sankaran, A., Datta, P. and Bates, A., 2020, December. “Workflow integration alleviates identity and access management in serverless computing”. In Annual Computer Security Applications Conference pp.496-509, 2020. https://doi.org/10.1145/3427228.3427665
[5] Polinsky, I., Datta, P., Bates, A. and Enck, W., 2021, June. SCIFFS: “Enabling secure third-party security analytics using serverless computing”. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies pp.175-186, 2021. https://doi.org/10.1145/3450569.3463567
[6] Alpernas, K., Flanagan, C., Fouladi, S., Ryzhyk, L., Sagiv, M., Schmitz, T. and Winstein, K., 2018. “Secure serverless computing using dynamic information flow control. Proceedings of the ACM on Programming Languages”, 2 (OOPSLA), pp.1-26, 2018. https://doi.org/10.1145/3276488
[7] Ahmadi, S., 2024. “Challenges and Solutions in Network Security for Serverless Computing” No.11747, 2024. EasyChair.DOI: 10.47191/ijcsrr/V7-i1-23, Impact Factor: 6.789
[8] Gadepalli, P.K., Peach, G., Cherkasova, L., Aitken, R. and Parmer, G., 2019, October. “Challenges and opportunities for efficient serverless computing” at the edge. In 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp.261-2615, 2019. IEEE.DOI 10.1109/SRDS47363.2019.00036
[9] Ihtesham, M., Tahir, S., Tahir, H., Hasan, A., Sultan, A., Saeed, S. and Rana, O., 2023.” Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS)”, 2023. IEEE Access. Digital Object Identifier 10.1109/ACCESS.2023.3324817
[10] Chowdhury, N.A., “Evaluating the Security Implications of Serverless Computing Environments: A Focus on Vulnerabilities and Countermeasures”. DOI: 10.5281/zenodo.10488030
[11]Cinar, B., “The Rise of Serverless Architectures: Security Challenges and Best Practices. Asian Journal of Research in Computer Science”, Vol.16, Issue.4, pp.194-210, 2023. DOI: 10.9734/AJRCOS/2023/v16i4382
[12]Qiang, W., Dong, Z. and Jin, H., 2018. Se-lambda: “Securing privacy-sensitive serverless applications using sgx enclave. In Security and Privacy in Communication Networks”: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, pp.451-470, 2018. Springer International Publishing.https://doi.org/10.1007/978-3-030-01701-9_25
[13] Stigler, M. and Stigler, M., 2018.” Understanding serverless computing”. Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud, pp.1-https://doi.org/10.1007/978-1-4842-3084-8_1
[14]Sewak, M. and Singh, S., April. “Winning in the era of serverless computing and function as a service”. In 2018 3rd International Conference for Convergence in Technology (I2CT), pp.1-5, 2018. IEEE. 978-1-5386-4273-3/18/$31.00 ©2018 IEEE
[15]Rashid, A. and Chaturvedi, A. “Cloud computing characteristics and services: a brief review”. International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.421-426, 2019.
[16] Suryateja, P.S., 2018.” Threats and vulnerabilities of cloud computing: a review”. International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.