Serverless computing: a security perspective

نویسندگان

چکیده

Abstract In this article we review the current serverless architectures, abstract and categorize their founding principles, provide an in-depth security analysis. particular, we: show shortcomings of analyzed architectural paradigms; point to possible countermeasures; and, highlight several research directions for practitioners, Industry, Academia.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Serverless Computing: Current Trends and Open Problems

Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the maturity and wide adoption of cloud technologies. In this chapter, we survey existing serverless platforms from industry, academia, and open source projects, identify key char...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Computer Security and Risky Computing Practices: A Rational Choice Perspective

Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computi...

متن کامل

Mobile Cloud Computing: Issues from a Security Perspective

Mobile Cloud Computing (MCC) is exploring prodigious storm in IT due to anywhere anytime data access. Mobile contrivances are enabled with affluent utilizer experience especially, Smartphones. Apple, Google, Facebook and Amazon are the top four horsemen in the mobile world. That is why the mobile cloud computing technology is growing rapidly among the users and at the same time it introduces th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cloud Computing

سال: 2022

ISSN: ['2326-6538']

DOI: https://doi.org/10.1186/s13677-022-00347-w