World Scientific News
EISSN 2392-2192
  • Login
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News
No Result
View All Result
SUBMIT ARTICLE
Register
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News
No Result
View All Result
World Scientific News
No Result
View All Result
Home 2024

Securing the Server-less Frontier: Challenges and Innovative Solutions in Network Security for Server-less Computing

Authors: Md. Abu Imran Mallick, Rishab Nath, 193(1) (2024) 1-45

2024-04-15
Reading Time: 25 mins read
0

ABSTRACT

Server less computing has gained significant popularity due to its flexibility, scalability, and cost-effectiveness. However, the increased use of server less platforms has brought new challenges, particularly in the realm of network security. This review paper aims to explore the challenges that arise in ensuring network security within server less computing environments and to propose potential solutions to mitigate these challenges. The first challenge addressed in this review is the lack of visibility and control in server less environments. Traditional security tools and methodologies are not always applicable to server less architectures, resulting in limited visibility into the network and the services hosted. This lack of visibility can lead to vulnerabilities and potential security breaches. To address this challenge, the paper proposes the adoption of specialized security tools designed specifically for server less environments, as well as the implementation of comprehensive monitoring and logging mechanisms to gain insight into network activities. Another significant challenge is the secure communication between server less functions and external services. Server less applications often rely on a wide array of external APIs and services, which can introduce security risks if not properly managed. The paper explores the need for secure communication protocols, including the use of encryption and authentication mechanisms, to protect data in transit and ensure the integrity and confidentiality of network communications. Furthermore, the dynamic nature of server less environments introduces challenges related to secure code deployment and runtime security. Traditional security measures such as network firewalls and intrusion detection systems may not adequately protect server less functions, which are ephemeral and often have short lifespans. This paper discusses the importance of implementing robust security practices during the development and deployment stages of server less applications, including secure coding techniques, vulnerability scanning, and runtime security controls. Additionally, the review addresses the challenge of securing sensitive data in server less environments. Data protection is a critical aspect of network security, and server less applications must adhere to stringent data privacy regulations. The paper explores the best practices for implementing data encryption, tokenization, and access control mechanisms to safeguard sensitive information within server less architectures. This review paper presents an in-depth analysis of the challenges posed by network security in server less computing and proposes a range of solutions to address these challenges. By understanding the unique security considerations of server less environments and implementing the recommended solutions, organizations can effectively enhance the network security posture of their server less applications. This paper aims to serve as a valuable resource for security professionals, researchers, and practitioners seeking to navigate the evolving landscape of server less computing while ensuring robust network security.

 

References

  • Aad, I., Hubaux, J. P., & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. IEEE/ACM transactions on networking, 16(4), 791-802.
  • Adeniyi, E. A., Ogundokun, R. O., Misra, S., Awotunde, J. B., & Abiodun, K. M. (2022). Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology. In Blockchain Applications in the Smart Era (pp. 65-83). Cham: Springer International Publishing.
  • Aditya, P., Akkus, I. E., Beck, A., Chen, R., Hilt, V., Rimac, I., … & Stein, M. (2019). Will serverless computing revolutionize NFV?. Proceedings of the IEEE, 107(4), 667-678.
  • Agache, A., Brooker, M., Iordache, A., Liguori, A., Neugebauer, R., Piwonka, P., & Popa, D. M. (2020). Firecracker: Lightweight virtualization for serverless applications. In 17th USENIX symposium on networked systems design and implementation (NSDI 20) (pp. 419-434).
  • Ahmad, S., Mehfuz, S., Urooj, S., & Alsubaie, N. (2024). Machine learning-based intelligent security framework for secure cloud key management. Cluster Computing, 1-27.
  • Ahmadi, S. (2024). Challenges and Solutions in Network Security for Serverless Computing. International Journal of Current Science Research and Review, 7(01), 218-229.
  • Albanese, M., Battista, E., Jajodia, S., & Casola, V. (2014, October). Manipulating the attacker’s view of a system’s attack surface. In 2014 IEEE Conference on Communications and Network Security (pp. 472-480). IEEE.
  • Ali, S. A. (2023). DESIGINING SECURE AND ROBUST E-COMMERCE PLAFORM FOR PUBLIC CLOUD. The Asian Bulletin of Big Data Management, 3(1).
  • Alpernas, K., Panda, A., Ryzhyk, L., & Sagiv, M. (2021, November). Cloud-scale runtime verification of serverless applications. In Proceedings of the ACM Symposium on Cloud Computing (pp. 92-107).
  • Alwan, Z. S., & Younis, M. F. (2017). Detection and prevention of SQL injection attack: a survey. International Journal of Computer Science and Mobile Computing, 6(8), 5-17.
  • Aravindhan, K., & Karthiga, R. R. (2013). One time password: A survey. International Journal of Emerging Trends in Engineering and Development, 1(3), 613-623.
  • Ariffin, M. A. M., Ibrahim, M. F., & Kasiran, Z. (2020). API vulnerabilities in cloud computing platform: attack and detection. International Journal of Engineering Trends and Technology, 1, 8-14.
  • Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., … & Zaharia, M. (2009). Above the clouds: A berkeley view of cloud computing (Vol. 17). Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
  • Ang’udi, J. J. (2023). Security challenges in cloud computing: A comprehensive analysis. World Journal of Advanced Engineering Technology and Sciences, 10(2), 155-181.
  • Asad, M. (2023). Security Management in Cloud Computing for healthcare Data.
  • Aslanpour, M. S., Toosi, A. N., Cicconetti, C., Javadi, B., Sbarski, P., Taibi, D., … & Dustdar, S. (2021, February). Serverless edge computing: vision and challenges. In Proceedings of the 2021 Australasian computer science week multiconference (pp. 1-10).
  • Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
  • Aurangzeb, S., Aleem, M., Iqbal, M. A., & Islam, M. A. (2017). Ransomware: a survey and trends. J. Inf. Assur. Secur, 6(2), 48-58.
  • Backes, M., Bugiel, S., & Derr, E. (2016, October). Reliable third-party library detection in android and its security applications. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 356-367).
  • Baldini, I., Cheng, P., Fink, S. J., Mitchell, N., Muthusamy, V., Rabbah, R., … & Tardieu, O. (2017, October). The serverless trilemma: Function composition for serverless computing. In Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 89-103).
  • Barcelona-Pons, D., Sutra, P., Sánchez-Artigas, M., París, G., & García-López, P. (2022). Stateful serverless computing with crucial. ACM Transactions on Software Engineering and Methodology (TOSEM), 31(3), 1-38.
  • Baresi, L., & Quattrocchi, G. (2021). PAPS: A serverless platform for edge computing infrastructures. Frontiers in Sustainable Cities, 3, 690660.
  • Basak, A., Bhunia, S., & Ray, S. (2016, June). Exploiting design-for-debug for flexible SoC security architecture. In Proceedings of the 53rd Annual Design Automation Conference (pp. 1-6).
  • Benedetti, P., Femminella, M., Reali, G., & Steenhaut, K. (2022, March). Reinforcement learning applicability for resource-based auto-scaling in serverless edge applications. In 2022 IEEE international conference on pervasive computing and communications workshops and other affiliated events (PerCom Workshops) (pp. 674-679). IEEE.
  • Berlin, K., Slater, D., & Saxe, J. (2015, October). Malicious behavior detection using windows audit logs. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security (pp. 35-44).
  • Bhatt, S., Manadhata, P. K., & Zomlot, L. (2014). The operational role of security information and event management systems. IEEE security & Privacy, 12(5), 35-41.
  • Bonguet, A., & Bellaiche, M. (2017). A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet, 9(3), 43.
  • Boscain, S. (2023). AWS Cloud: Infrastructure, DevOps techniques, State of Art (Doctoral dissertation, Politecnico di Torino).
  • Boza, E. F., Abad, C. L., Villavicencio, M., Quimba, S., & Plaza, J. A. (2017, October). Reserved, on demand or serverless: Model-based simulations for cloud budget planning. In 2017 IEEE second Ecuador technical chapters meeting (ETCM) (pp. 1-6). IEEE.
  • Brown, A. W., Delbaere, M., Eeles, P., Johnston, S., & Weaver, R. (2005). Realizing service-oriented solutions with the IBM rational software development platform. IBM systems journal, 44(4), 727-752.
  • Buennemeyer, T. K., Nelson, T. M., Clagett, L. M., Dunning, J. P., Marchany, R. C., & Tront, J. G. (2008, January). Mobile device profiling and intrusion detection using smart batteries. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (pp. 296-296). IEEE.
  • Butin, D., & Le Métayer, D. (2015, May). A guide to end-to-end privacy accountability. In 2015 IEEE/ACM 1st International Workshop on Technical and Legal aspects of data pRivacy and Security (pp. 20-25). IEEE.
  • Candel, J. M. O., Elouali, A., Gimeno, F. J. M., & Mora, H. (2022, November). Cloud vs Serverless Computing: A Security Point of View. In International Conference on Ubiquitous Computing and Ambient Intelligence (pp. 1098-1109). Cham: Springer International Publishing.
  • Castro, P., Isahagian, V., Muthusamy, V., & Slominski, A. (2023). Hybrid serverless computing: Opportunities and challenges. Serverless Computing: Principles and Paradigms, 43-77.
  • Cassel, G. A. S., Rodrigues, V. F., da Rosa Righi, R., Bez, M. R., Nepomuceno, A. C., & da Costa, C. A. (2022). Serverless computing for Internet of Things: A systematic literature review. Future Generation Computer Systems, 128, 299-316.
  • Catalfamo, A. (2023). How to strengthen Cloud Computing exploiting solutions to Edge. Universitá degli Studi di Messina.
  • Chase, J. S., Anderson, D. C., Thakar, P. N., Vahdat, A. M., & Doyle, R. P. (2001). Managing energy and server resources in hosting centers. ACM SIGOPS operating systems review, 35(5), 103-116.
  • Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Research, 3, 10-23.
  • Chopra, A. K., & Singh, M. P. (2021, September). Deserv: Decentralized serverless computing. In 2021 IEEE International Conference on Web Services (ICWS) (pp. 51-60). IEEE.
  • Chostak, C. (2020). Machine Learning Powered Serverless Fraud Detection (Master’s thesis, Instituto Politecnico do Porto (Portugal)).
  • Chowhan, R. S., & Tanwar, R. (2019). Password-less authentication: methods for user verification and identification to login securely over remote sites. In Machine Learning and Cognitive Science Applications in Cyber Security (pp. 190-212). IGI global.
  • Christensen, J. H. (2009, October). Using RESTful web-services and cloud computing to create next generation mobile applications. In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (pp. 627-634).
  • Christidis, A., Moschoyiannis, S., Hsu, C. H., & Davies, R. (2020). Enabling serverless deployment of large-scale ai workloads. IEEE Access, 8, 70150-70161.
  • Cicconetti, C., Conti, M., & Passarella, A. (2020). A decentralized framework for serverless edge computing in the internet of things. IEEE Transactions on Network and Service Management, 18(2), 2166-2180.
  • Cinar, B. (2023). The Rise of Serverless Architectures: Security Challenges and Best Practices. Asian Journal of Research in Computer Science, 16(4), 194-210.
  • Cobleigh, A., Hell, M., Karlsson, L., Reimer, O., Sönnerup, J., & Wisenhoff, D. (2018, October). Identifying, prioritizing and evaluating vulnerabilities in third party code. In 2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 208-211). IEEE.
  • Costa, R., & Hodun, D. (2021). Google Cloud Cookbook. “ O’Reilly Media, Inc.”.
  • Datta, P., Kumar, P., Morris, T., Grace, M., Rahmati, A., & Bates, A. (2020, April). Valve: Securing function workflows on serverless computing platforms. In Proceedings of The Web Conference 2020 (pp. 939-950).
  • Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., & Samarati, P. (2002). A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC), 5(2), 169-202.
  • Decan, A., Mens, T., & Constantinou, E. (2018, May). On the impact of security vulnerabilities in the npm package dependency network. In Proceedings of the 15th international conference on mining software repositories (pp. 181-191).
  • Devi, B. K., & Subbulakshmi, T. (2017, December). DDoS attack detection and mitigation techniques in cloud computing environment. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 512-517). IEEE.
  • Dramé-Maigné, S., Laurent, M., Castillo, L., & Ganem, H. (2021). Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT. ACM Computing Surveys (CSUR), 54(7), 1-34.
  • Duggineni, S. (2023). Impact of controls on data integrity and information systems. Science and Technology, 13(2), 29-35.
  • Eassa, A. M., Elhoseny, M., El-Bakry, H. M., & Salama, A. S. (2018). NoSQL injection attack detection in web applications using RESTful service. Programming and Computer Software, 44, 435-444.
  • Efterpi, P. (2020). Machine Learning Pipelines in Serverless Environments (Doctoral dissertation, University of Piraeus (Greece)).
  • Eismann, S., Scheuner, J., Van Eyk, E., Schwinger, M., Grohmann, J., Herbst, N., … & Iosup, A. (2020). A review of serverless use cases and their characteristics. arXiv preprint arXiv:2008.11110.
  • Enes, J., Expósito, R. R., & Touriño, J. (2020). Real-time resource scaling platform for big data workloads on serverless environments. Future Generation Computer Systems, 105, 361-379.
  • Fairhurst, G. (2017). Network Transport Circuit Breakers (No. rfc8084). Internet Engineering Task Force.
  • Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective on risk of security threats to information systems. Information Technology and Management, 6, 203-225.
  • García-López, P., Sánchez-Artigas, M., Shillaker, S., Pietzuch, P., Breitgand, D., Vernik, G., … & Ferrer, A. J. (2019). Servermix: Tradeoffs and challenges of serverless data analytics. arXiv preprint arXiv:1907.11465.
  • Genaud, S., & Gossa, J. (2011, July). Cost-wait trade-offs in client-side resource provisioning with elastic clouds. In 2011 IEEE 4th International Conference on Cloud Computing (pp. 1-8). IEEE.
  • George, A. S., Sagayarajan, S., Baskar, T., & George, A. H. (2023). Extending detection and response: how MXDR evolves cybersecurity. Partners Universal International Innovation Journal, 1(4), 268-285.
  • Ghorbani, A. A., Lu, W., & Tavallaee, M. (2009). Network intrusion detection and prevention: concepts and techniques (Vol. 47). Springer Science & Business Media.
  • Gill, S. S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, A., … & Uhlig, S. (2022). AI for next generation computing: Emerging trends and future directions. Internet of Things, 19, 100514.
  • Gjerdrum, A. T. (2020). Diggi: A Distributed Serverless Runtime for Developing Trusted Cloud Services.
  • Glaessner, T. C., Kellermann, T., & McNevin, V. (2002). Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues (Vol. 2870). World Bank Publications.
  • Golec, M., Ozturac, R., Pooranian, Z., Gill, S. S., & Buyya, R. (2021). IFaaSBus: A security-and privacy-based lightweight framework for serverless computing using IoT and machine learning. IEEE Transactions on Industrial Informatics, 18(5), 3522-3529.
  • Golec, M., Walia, G. K., Kumar, M., Cuadrado, F., Gill, S. S., & Uhlig, S. (2023). Cold start latency in serverless computing: A systematic review, taxonomy, and future directions. arXiv preprint arXiv:2310.08437.
  • Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. Information Systems Frontiers, 12, 185-205.
  • Gouareb, R., Friderikos, V., & Aghvami, A. H. (2018). Virtual network functions routing and placement for edge cloud latency minimization. IEEE Journal on Selected Areas in Communications, 36(10), 2346-2357.
  • Gowri, A. S., Bala, P. S., & Ramdinthara, I. Z. (2021). Comprehensive analysis of resource allocation and service placement in fog and cloud computing. International Journal of Advanced Computer Science and Applications, 12(3).
  • Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).
  • Gulati, S. S., & Gupta, S. (2012). A framework for enhancing security and performance in multi-tenant applications. International Journal of Information Technology and Knowledge Management, 5(2), 233-237.
  • Gunasekaran, A., Patel, C., & McGaughey, R. E. (2004). A framework for supply chain performance measurement. International journal of production economics, 87(3), 333-347.
  • Guo, Z., Blanco, Z., Shahrad, M., Wei, Z., Dong, B., Li, J., … & Zhang, Y. (2022). Decomposing and executing serverless applications as resource graphs. arXiv preprint arXiv:2206.13444.
  • Gupta, S., & Gupta, B. B. (2017). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management, 8, 512-530.
  • Haber, M. J., Chappell, B., & Hills, C. (2022). Mitigation Strategies. In Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources (pp. 221-296). Berkeley, CA: Apress.
  • Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., … & Felten, E. W. (2009). Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52(5), 91-98.
  • Hamilton, J. R. (2007, November). On Designing and Deploying Internet-Scale Services. In LISA(Vol. 18, No. 2007, pp. 1-18).
  • Hassan, H. B., Barakat, S. A., & Sarhan, Q. I. (2021). Survey on serverless computing. Journal of Cloud Computing, 10, 1-29.
  • Harsh, P., Dudouet, F., Cascella, R. G., Jégou, Y., & Morin, C. (2012, October). Using open standards for interoperability issues, solutions, and challenges facing cloud computing. In 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) (pp. 435-440). IEEE.
  • Heckathorn, M. (2011). Network monitoring for web-based threats. Network, 2, 1-2011.
  • Hellerstein, J. M., Faleiro, J., Gonzalez, J. E., Schleier-Smith, J., Sreekanti, V., Tumanov, A., & Wu, C. (2018). Serverless computing: One step forward, two steps back. arXiv preprint arXiv:1812.03651.
  • Hilley, D. (2009). Cloud computing: A taxonomy of platform and infrastructure-level offerings. Georgia Institute of Technology, Tech. Rep, 44-45.
  • Hobday, R. A., & Dancer, S. J. (2013). Roles of sunlight and natural ventilation for controlling infection: historical and current perspectives. Journal of hospital infection, 84(4), 271-282.
  • Humphreys, E. (2008). Information security management standards: Compliance, governance and risk management. information security technical report, 13(4), 247-255.
  • Huseinović, A., Mrdović, S., Bicakci, K., & Uludag, S. (2020). A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access, 8, 177447-177470.
  • Inamdar, D. M., & Gupta, S. (2020). A survey on web application security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology,(6), 223-228.
  • Jacob, S. (2022). Enhancing cyber attack prevention and detection using application process tracing. Technological University of the Shannon: Midlands Midwest
  • Jangda, A., Pinckney, D., Brun, Y., & Guha, A. (2019). Formal foundations of serverless computing. Proceedings of the ACM on Programming Languages, 3(OOPSLA), 1-26.
  • Javed, H., Toosi, A. N., & Aslanpour, M. S. (2022). Serverless platforms on the edge: a performance analysis. In New Frontiers in Cloud Computing and Internet of Things (pp. 165-184). Cham: Springer International Publishing.
  • Jegan, D. S., Wang, L., Bhagat, S., Ristenpart, T., & Swift, M. (2020). Guarding serverless applications with seclambda. arXiv preprint arXiv:2011.05322.
  • Jegan, D. S., Wang, L., Bhagat, S., & Swift, M. (2023). Guarding serverless applications with Kalium. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 4087-4104).
  • Jegannathan, A. P., Saha, R., & Addya, S. K. (2022, June). A time series forecasting approach to minimize cold start time in cloud-serverless platform. In 2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (pp. 325-330). IEEE.
  • Jonas, E., Schleier-Smith, J., Sreekanti, V., Tsai, C. C., Khandelwal, A., Pu, Q., … & Patterson, D. A. (2019). Cloud programming simplified: A berkeley view on serverless computing. arXiv preprint arXiv:1902.03383.
  • Katal, A., Sethi, V., & Lamba, S. (2021). Virtual Machine Scaling in Autonomic Cloud Resource Management. Autonomic Computing in Cloud Resource Management in Industry 4.0, 301-323.
  • Kelly, D., Glavin, F., & Barrett, E. (2020, October). Serverless computing: Behind the scenes of major platforms. In 2020 IEEE 13th International Conference on Cloud Computing (CLOUD) (pp. 304-312). IEEE.
  • Kesa, D. M. (2023). Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations. World Journal of Advanced Research and Reviews, 18(3), 970-992.
  • Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6, 1-22.
  • Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International journal of critical infrastructure protection, 25, 36-49.
  • Kitchin, R., & Dodge, M. (2020). The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. In Smart cities and innovative Urban technologies(pp. 47-65). Routledge.
  • Koschel, A., Klassen, S., Jdiya, K., Schaaf, M., & Astrova, I. (2021, July). Cloud computing: serverless. In 2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA) (pp. 1-7). IEEE.
  • Kumar, R., & Goyal, R. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 33, 1-48.
  • Kumar, M. (2019). Serverless architectures review, future trend and the solutions to open problems. American Journal of Software Engineering, 6(1), 1-10.
  • Kumari, A., Patra, M. K., & Sahoo, B. (2023). Data Controlling and Security Issues in Cloud: A Step Towards Serverless. In Perspectives on Social Welfare Applications’ Optimization and Enhanced Computer Applications (pp. 105-124). IGI Global.
  • Lannurien, V., D’orazio, L., Barais, O., & Boukhobza, J. (2023). Serverless Cloud Computing: State of the Art and Challenges. Serverless Computing: Principles and Paradigms, 275-316.
  • Lebanon, G., El-Geish, M., Lebanon, G., & El-Geish, M. (2018). Thoughts on System Design for Big Data. Computing with Data: An Introduction to the Data Industry, 495-541.
  • Leemans, T. T. (2022). Towards Serverless Enterprises: Developing the Enterprise Serverless Assessment (ESA) to assess and improve an organization’s fit and readiness for Serverless technology (Master’s thesis, University of Twente).
  • Li, Z., Guo, L., Cheng, J., Chen, Q., He, B., & Guo, M. (2022). The serverless computing survey: A technical primer for design architecture. ACM Computing Surveys (CSUR), 54(10s), 1-34.
  • Loaiza Enriquez, R. (2021). Cloud Security Posture Management/CSPM) in Azure.
  • Lynn, T., Rosati, P., Lejeune, A., & Emeakaroha, V. (2017, December). A preliminary review of enterprise serverless cloud computing (function-as-a-service) platforms. In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 162-169). IEEE.
  • Makani, S. T. (2023). STREAMLINING AWS SERVERLESS DEPLOYMENTS: A BITBUCKET PIPELINE APPROACH. International Journal of Computer Applications (IJCA), 4(1).
  • Malawski, M., Gajek, A., Zima, A., Balis, B., & Figiela, K. (2020). Serverless execution of scientific workflows: Experiments with hyperflow, aws lambda and google cloud functions. Future Generation Computer Systems, 110, 502-514.
  • Malik, M. I., Wani, S. H., & Rashid, A. (2018). CLOUD COMPUTING-TECHNOLOGIES. International Journal of Advanced Research in Computer Science, 9(2).
  • Malik, A. W., Bhatti, D. S., Park, T. J., Ishtiaq, H. U., Ryou, J. C., & Kim, K. I. (2024). Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors, 24(2), 433.
  • Mallick, M. A. I., & Nath, R. (2024).Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments. World Scientific News, 190(1), 1-69.
  • Mampage, A., Karunasekera, S., & Buyya, R. (2021, May). Deadline-aware dynamic resource management in serverless computing environments. In 2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid) (pp. 483-492). IEEE.
  • Mampage, A., Karunasekera, S., & Buyya, R. (2022). A holistic view on resource management in serverless computing environments: Taxonomy and future directions. ACM Computing Surveys (CSUR), 54(11s), 1-36.
  • Mannan, M., & van Oorschot, P. C. (2011). Leveraging personal devices for stronger password authentication from untrusted computers. Journal of Computer Security, 19(4), 703-750.
  • Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of network and computer applications, 41, 424-440.
  • Mateus-Coelho, N., & Cruz-Cunha, M. (2022, June). Serverless service architectures and security minimals. In 2022 10th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-6). IEEE.
  • McGrath, G., & Brenner, P. R. (2017, June). Serverless computing: Design, implementation, and performance. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) (pp. 405-410). IEEE.
  • Menzel, M., & Ranjan, R. (2012, April). CloudGenius: decision support for web server cloud migration. In Proceedings of the 21st international conference on World Wide Web (pp. 979-988).
  • Mitropoulos, D., & Spinellis, D. (2017). Fatal injection: A survey of modern code injection attack countermeasures. PeerJ Computer Science, 3, e136.
  • Mlyatu, M. M., & Sanga, C. (2022). Secure web application technologies implementation through hardening security headers using automated threat modelling techniques. Journal of Information Security, 14(1), 1-15.
  • Mohd Nazir, M. A. N. (2011). Cost-effective resource management for distributed computing (Doctoral dissertation, UCL (University College London).
  • Mondal, S. K., Pan, R., Kabir, H. D., Tian, T., & Dai, H. N. (2022). Kubernetes in IT administration and serverless computing: An empirical study and research challenges. The Journal of Supercomputing, 1-51.
  • Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8.
  • Mughal, A. A. (2018). The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection. International Journal of Intelligent Automation and Computing, 1(1), 1-20.
  • Mughal, A. A. (2019). Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges. Applied Research in Artificial Intelligence and Cloud Computing, 2(1), 1-31.
  • Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., & Ullah, A. (2017). Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, 8(10).
  • Mustafa, G., Ashraf, R., Mirza, M. A., Jamil, A., & Muhammad. (2018, June). A review of data security and cryptographic techniques in IoT based devices. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (pp. 1-9).
  • Nadji, Y., Saxena, P., & Song, D. (2009, February). Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In NDSS (Vol. 20).
  • Nastic, S., & Dustdar, S. (2018). Towards deviceless edge computing: Challenges, design aspects, and models for serverless paradigm at the edge. The Essence of Software Engineering, 121-136.
  • Ngo, C., Wang, P., Tran, T., & Chung, S. (2020, July). Serverless computing architecture security and quality analysis for back-end development. In Journal of The Colloquium for Information Systems Security Education (Vol. 7, No. 1, pp. 8-8).
  • Naranjo Rico, J. L. (2018). Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques.
  • Narasayya, V., & Chaudhuri, S. (2021). Cloud data services: Workloads, architectures and multi-tenancy. Foundations and Trends® in Databases, 10(1), 1-107
  • Olaoye, G., & Luz, A. (2024). Future trends and emerging technologies in cloud security. Telecommunication Engineering Centre. University of Melbourne
  • O’Meara, W., & Lennon, R. G. (2020, June). Serverless computing security: Protecting application logic. In 2020 31st Irish Signals and Systems Conference (ISSC) (pp. 1-5). IEEE.
  • Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115-133.
  • Orazi, G., Vallittu, K., Sainio, P., & Virtanen, S. (2020). Enhancing and integration of security testing in the development of a microservices environment.
  • Ortega-Fernandez, I., & Liberati, F. (2023). A review of denial of service attack and mitigation in the smart grid using reinforcement learning. Energies, 16(2), 635.
  • Ouyang, R., Wang, J., Xu, H., Chen, S., Xiong, X., Tolba, A., & Zhang, X. (2023). A Microservice and Serverless Architecture for Secure IoT System. Sensors, 23(10), 4868.
  • Padma, P., & Srinivasan, S. (2023). DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing. Wireless Personal Communications, 129(3), 1563-1583.
  • Pal, P. (2022). The adoption of waves of digital technology as antecedents of digital transformation by financial services institutions. Journal of Digital Banking, 7(1), 70-91.
  • Pan, Y., Sun, F., Teng, Z., White, J., Schmidt, D. C., Staples, J., & Krause, L. (2019). Detecting web attacks with end-to-end deep learning. Journal of Internet Services and Applications, 10(1), 1-22.
  • Pan, S., Zhao, H., Cai, Z., Li, D., Ma, R., & Guan, H. (2023). Sustainable serverless computing with cold-start optimization and automatic workflow resource scheduling. IEEE Transactions on Sustainable Computing.
  • Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E. P., Ioannidis, S., & Vasiliadis, G. (2018). Master of web puppets: Abusing web browsers for persistent and stealthy computation. arXiv preprint arXiv:1810.00464.
  • Papp, D., Ma, Z., & Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In 2015 13th Annual Conference on Privacy, Security and Trust (PST) (pp. 145-152). Ieee.
  • Park, J., & Jeong, J. (2023). An Autoscaling System Based on Predicting the Demand for Resources and Responding to Failure in Forecasting. Sensors, 23(23), 9436.
  • Pascoal, T. A., Fonseca, I. E., & Nigam, V. (2020). Slow denial-of-service attacks on software defined networks. Computer Networks, 173, 107223.
  • Patel, K. (2024). Mastering Cloud Scalability: Strategies, Challenges, and Future Directions: Navigating Complexities of Scaling in Digital Era. In Emerging Trends in Cloud Computing Analytics, Scalability, and Service Models (pp. 155-169). IGI Global.
  • Patidar, S., Rane, D., & Jain, P. (2011, December). Challenges of software development on cloud platform. In 2011 World Congress on Information and Communication Technologies (pp. 1009-1013). IEEE.
  • Patros, P., Spillner, J., Papadopoulos, A. V., Varghese, B., Rana, O., & Dustdar, S. (2021). Toward sustainable serverless computing. IEEE Internet Computing, 25(6), 42-50.
  • Patwary, A. A. N., Fu, A., Naha, R. K., Battula, S. K., Garg, S., Patwary, M. A. K., & Aghasian, E. (2020). Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review. arXiv preprint arXiv:2003.00395.
  • Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of network and computer applications, 36(1), 25-41.
  • Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: Issues, security threats, and solutions. ACM Computing Surveys (CSUR), 45(2), 1-39.
  • Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE.
  • Podjarny, G., & Ṭal, L. (2019). Serverless security. O’Reilly Media, Incorporated.
  • Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., & Vigna, G. (2014, February). Execute this! Analyzing unsafe and malicious dynamic code loading in android applications. In NDSS (Vol. 14, pp. 23-26).
  • Polinsky, I., Datta, P., Bates, A., & Enck, W. (2021, June). SCIFFS: Enabling secure third-party security analytics using serverless computing. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (pp. 175-186).
  • Ponta, S. E., Plate, H., & Sabetta, A. (2020). Detection, assessment and mitigation of vulnerabilities in open source dependencies. Empirical Software Engineering, 25(5), 3175-3215.
  • Prakash, A. A., & Kumar, K. S. (2022). Cloud serverless security and services: a survey. In Applications of Computational Methods in Manufacturing and Product Design: Select Proceedings of IPDIMS 2020 (pp. 453-462). Singapore: Springer Nature Singapore.
  • Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2014). DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global Journal of Computer Science and Technology, 14(7-E), 15.
  • Pusuluri, V. S. R. (2022). Taxonomy Of Security and Privacy Issues in Serverless Computing. St. Cloud State University.
  • Qazi, F. A. (2022). Insecure Application Programming Interfaces (APIs) in Zero-Trust Networks (Doctoral dissertation, Capitol Technology University).
  • Rawal, B. S., Manogaran, G., & Peter, A. (2023). Cybersecurity and Identity Access Management. Springer.
  • Reddy, V. K., Rao, B. T., Reddy, L. S. S., & Kiran, P. S. (2011). Research issues in cloud computing. Global Journal of Computer Science and Technology, 11(11), 59-64.
  • Rinta-Jaskari, E. (2021). Automatic Testing Approaches For Serverless Applications In AWS (Master’s thesis).
  • Rios, V. D. M., Inacio, P. R., Magoni, D., & Freire, M. M. (2022). Detection and mitigation of low-rate denial-of-service attacks: A survey. IEEE Access, 10, 76648-76668.
  • Rodriguez, M. A., & Buyya, R. (2019). Container‐based cluster orchestration systems: A taxonomy and future directions. Software: Practice and Experience, 49(5), 698-719.
  • Rodrigues, P., Freitas, F., & Simão, J. (2022). Quickfaas: Providing portability and interoperability between faas platforms. Future Internet, 14(12), 360.
  • Roy, R. B., Patel, T., & Tiwari, D. (2022, February). Icebreaker: Warming serverless functions better with heterogeneity. In Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 753-767).
  • Rubinstein, I. S., & Hartzog, W. (2016). Anonymization and risk. Wash. L. Rev. 91, 703.
  • Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, D. (2020). Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(3), 1977-2008.
  • Sabbioni, A. (2023). Serverless middlewares to integrate heterogeneous and distributed services in cloud continuum environments.
  • Sabbioni, A., Mazzocca, C., Colajanni, M., Montanari, R., & Corradi, A. (2022, June). A fully decentralized architecture for access control verification in serverless environments. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-6). IEEE.
  • Sailer, R., Valdez, E., Jaeger, T., Perez, R., Van Doorn, L., Griffin, J. L., … & Jaeger, T. (2005). sHype: Secure hypervisor approach to trusted virtualized systems. Techn. Rep. RC23511, 5.
  • Samaila, M. G., Neto, M., Fernandes, D. A., Freire, M. M., & Inácio, P. R. (2018). Challenges of securing Internet of Things devices: A survey. Security and Privacy, 1(2), e20.
  • Samea, F., Azam, F., Rashid, M., Anwar, M. W., Haider Butt, W., & Muzaffar, A. W. (2020). A model-driven framework for data-driven applications in serverless cloud computing. Plos one, 15(8), e0237317.
  • Sankaran, A., Datta, P., & Bates, A. (2020, December). Workflow integration alleviates identity and access management in serverless computing. In Proceedings of the 36th Annual Computer Security Applications Conference (pp. 496-509).
  • Scarfone, K., Souppaya, M., Cody, A., & Orebaugh, A. (2008). Technical guide to information security testing and assessment. NIST Special Publication, 800(115), 2-25.
  • Scholte, T., Robertson, W., Balzarotti, D., & Kirda, E. (2012, July). Preventing input validation vulnerabilities in web applications through automated type analysis. In 2012 IEEE 36th annual computer software and applications conference (pp. 233-243). IEEE.
  • Sewak, M., & Singh, S. (2018, April). Winning in the era of serverless computing and function as a service. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1-5). IEEE.
  • Shafiei, H., Khonsari, A., & Mousavi, P. (2022). Serverless computing: a survey of opportunities, challenges, and applications. ACM Computing Surveys, 54(11s), 1-32.
  • Shahrad, M., Fonseca, R., Goiri, I., Chaudhry, G., Batum, P., Cooke, J., … & Bianchini, R. (2020). Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider. In 2020 USENIX annual technical conference (USENIX ATC 20) (pp. 205-218).
  • Shen, J., Zhang, H., Geng, Y., Li, J., Wang, J., & Xu, M. (2022, November). Gringotts: Fast and accurate internal denial-of-wallet detection for serverless computing. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (pp. 2627-2641).
  • Shin, Y., Hur, J., Koo, D., & Yun, J. (2020). Toward serverless and efficient encrypted deduplication in mobile cloud computing environments. Security and Communication Networks, 2020, 1-15.
  • Silowash, G. J., Cappelli, D. M., Moore, A. P., Trzeciak, R. F., Shimeall, T., & Flynn, L. (2012). Common sense guide to mitigating insider threats.
  • Silva, P., Fireman, D., & Pereira, T. E. (2020, December). Prebaking functions to warm the serverless cold start. In Proceedings of the 21st International Middleware Conference (pp. 1-13).
  • Silverman, M. P. (2008). Quantum condensates in extreme gravity: Implications for cold stars and dark matter. International Journal of Modern Physics D, 17(03n04), 603-609.
  • Simmons, P. (2011, December). Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 73-82.
  • Singaravelu, L., Pu, C., Härtig, H., & Helmuth, C. (2006, April). Reducing TCB complexity for security-sensitive applications: Three case studies. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006 (pp. 161-174).
  • Singh, D., & Dautaniya, A. K. (2019). Cloud Computing Security Challenges and Solution. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1185-1190.
  • Singh, A., & Kolluri, S. (2021). Security and Privacy Challenges in Cloud-Based Database Management: Strategies and Solutions. TECHNO REVIEW Journal of Technology and Management, 1(1), 32-40.
  • Sivanathan, A. (2020). IoT behavioral monitoring via network traffic analysis. arXiv preprint arXiv:2001.10632.
  • Sobb, T., Turnbull, B., & Moustafa, N. (2020). Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics, 9(11), 1864.
  • Solaiman, K. (2023). Novel architecture for mitigating cold start problem in serverless computing.
  • Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer communications, 107, 30-48.
  • Stamp, J., Dillinger, J., Young, W., & DePoy, J. (2003). Common vulnerabilities in critical infrastructure control systems. SAND2003-1772C. Sandia National Laboratories.
  • Stojkovic, J., Xu, T., Franke, H., & Torrellas, J. (2023, June). Mxfaas: Resource sharing in serverless environments for parallelism and efficiency. In Proceedings of the 50th Annual International Symposium on Computer Architecture (pp. 1-15).
  • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS quarterly, 441-469.
  • Suo, K., Son, J., Cheng, D., Chen, W., & Baidya, S. (2021, September). Tackling cold start of serverless applications by efficient and adaptive container runtime reusing. In 2021 IEEE International Conference on Cluster Computing (CLUSTER) (pp. 433-443). IEEE.
  • Sushma, D., Nalini, M. K., Kumar, R. A., & Nidugala, M. (2023, November). To Detect and Mitigate the Risk in Continuous Integration and Continues Deployments (CI/CD) Pipelines in Supply Chain Using Snyk tool. In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) (pp. 1-10). IEEE.
  • Rangaraju, S. (2023). Secure by Intelligence: Enhancing Products with AI-Driven Security Measures. EPH-International Journal of Science And Engineering, 9(3), 36-41.
  • Reniers, V., Van Landuyt, D., Rafique, A., & Joosen, W. (2019). Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Information Systems, 85, 1-20.
  • Richards, N., & Hartzog, W. (2015). Taking trust seriously in privacy law. Stan. Tech. L. Rev. 19, 431.
  • Ristov, S., Hollaus, C., & Hautz, M. (2022, July). Colder than the warm start and warmer than the cold start! Experience the spawn start in faas providers. In Proceedings of the 2022 Workshop on Advanced tools, programming languages, and Platforms for Implementing and Evaluating algorithms for Distributed systems (pp. 35-39).
  • Ron, A., Shulman-Peleg, A., & Puzanov, A. (2016). Analysis and mitigation of NoSQL injections. IEEE Security & Privacy, 14(2), 30-39.
  • Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
  • Tan, R., Nguyen, H. H., Foo, E. Y., Yau, D. K., Kalbarczyk, Z., Iyer, R. K., & Gooi, H. B. (2017). Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Transactions on Information Forensics and Security, 12(7), 1609-1624.
  • Tatineni, S. (2023). Compliance and Audit Challenges in DevOps: A Security Perspective. International Research Journal of Modernization in Engineering Technology and Science, 5(10), 1306-1316.
  • Telo, J. (2023). Smart city security threats and countermeasures in the context of emerging technologies. International Journal of Intelligent Automation and Computing, 6(1), 31-45.
  • Tolosana-Calasanz, R., Castañé, G. G., Bañares, J. Á., & Rana, O. (2021). Modelling serverless function behaviours. In Economics of Grids, Clouds, Systems, and Services: 18th International Conference, GECON 2021, Virtual Event, September 21–23, 2021, Proceedings 18 (pp. 109-122). Springer International Publishing.
  • Tomarchio, O., Calcaterra, D., & Modica, G. D. (2020). Cloud resource orchestration in the multi-cloud landscape: a systematic review of existing frameworks. Journal of Cloud Computing, 9(1), 49.
  • Tuyishime, E., Balan, T. C., Cotfas, P. A., Cotfas, D. T., & Rekeraho, A. (2023). Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach. Applied Sciences, 13(22), 12359.
  • Uddin, M., Islam, S., & Al-Nemrat, A. (2019). A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access, 7, 166676-166689.
  • Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., & Rashid, A. (2018). Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, 18-54.
  • Vahidinia, P., Farahani, B., & Aliee, F. S. (2020, August). Cold start in serverless computing: Current trends and mitigation strategies. In 2020 International Conference on Omni-layer Intelligent Systems (COINS) (pp. 1-7). IEEE.
  • Van Eyk, E., Toader, L., Talluri, S., Versluis, L., Uță, A., & Iosup, A. (2018). Serverless is more: From paas to present cloud computing. IEEE Internet Computing, 22(5), 8-17.
  • Varia, J. (2010). Architecting for the cloud: Best practices. Amazon Web Services, 1, 1-21.
  • Vegesna, V. V. (2019). Investigations on Different Security Techniques for Data Protection in Cloud Computing using Cryptography Schemes. Indo-Iranian Journal of Scientific Research (IIJSR) Volume, 3, 69-84.
  • Verma, G., & Upadhayay, D. (2019). Cloud Computing Trends for the Future. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1177-1184.
  • Vielberth, M., Böhm, F., Fichtinger, I., & Pernul, G. (2020). Security operations center: A systematic study and open challenges. IEEE Access, 8, 227756-227779.
  • VS, D. P., Sethuraman, S. C., & Khan, M. K. (2023). Container security: precaution levels, mitigation strategies, and research perspectives. Computers & Security, 103490.
  • Wang, Z., Zhao, K., Li, P., Jacob, A., Kozuch, M., Mowry, T., & Skarlatos, D. (2023, October). Memento: Architectural Support for Ephemeral Memory Management in Serverless Environments. In Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture (pp. 122-136).
  • Wen, J., Chen, Z., Jin, X., & Liu, X. (2023). Rise of the planet of serverless computing: A systematic review. ACM Transactions on Software Engineering and Methodology, 32(5), 1-61.
  • Xiong, J., Wei, M., Lu, Z., & Liu, Y. (2021, November). Warmonger: inflicting denial-of-service via serverless functions in the cloud. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 955-969).
  • Yaqoob, T., Abbas, H., & Atiquzzaman, M. (2019). Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices – A review. IEEE Communications Surveys & Tutorials, 21(4), 3723-3768.
  • Yakoob, S. K. (2021). Advanced Machine Learning Approach to Handle Code Injection Attacks in Cloud Computing. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 4623-4629.
  • Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
  • Zanella, M., Massari, G., Galimberti, A., & Fornaciari, W. (2018, October). Back to the future: Resource management in post-cloud solutions. In Proceedings of the Workshop on INTelligent Embedded Systems Architectures and Applications (pp. 33-38).
  • Zhang, Y., Goiri, Í., Chaudhry, G. I., Fonseca, R., Elnikety, S., Delimitrou, C., & Bianchini, R. (2021, October). Faster and cheaper serverless computing on harvested resources. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (pp. 724-739).
  • Zheng, S. (2020). Improving Network Security with Low-Cost and Easy-to-Adopt Solutions (Doctoral dissertation, Duke University, Durham, NC, USA).
  • Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and challenges: a survey. IEEE access, 8, 43920-43943.
  • Zhou, H., Hu, Y., Ouyang, X., Su, J., Koulouzis, S., de Laat, C., & Zhao, Z. (2019). CloudsStorm: A framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications. Software: Practice and Experience, 49(10), 1421-1447.
  • Zobaed, S. M., & Salehi, M. A. (2023). Confidential computing across edge-to-cloud for machine learning: A survey study. arXiv preprint arXiv:2307.16447

Download all article in PDF

WSN 193(1) (2024) 1-45


 

ADVERTISEMENT
Tags: Challengesdata protectionEncryptionnetwork securitySecurity toolsServer-less computingSolutions
ShareTweetPin
Next Post

Impact of Corporate Social Responsibility on Corporate Brand Building: A Case Study of Selected Insurance Companies

Strong Independent Edge Saturation Number of Graphs

View free articles

  • Open access

View Articles

  • 2013 (5)
    • Volume 1 (2013), pp. 1-14 (2)
    • Volume 2 (2013), pp. 1-29 (3)
  • 2014 (13)
    • Volume 3 (2014), pp. 1-21 (3)
    • Volume 4 (2014), pp. 1-16 (2)
    • Volume 5 (2014), pp. 1-36 (4)
    • Volume 6 (2014), pp. 1-23 (3)
  • 2015 (109)
    • Volume 10 (2015), pp. 1-100 (5)
    • Volume 11 (2015), pp. 1-96 (6)
    • Volume 12 (2015), pp. 1-76 (6)
    • Volume 13 (2015), pp. 1-130 (7)
    • Volume 14 (2015), pp. 1-55 (1)
    • Volume 15 (2015), pp. 1-25 (2)
    • Volume 16 (2015), pp. 1-158 (9)
    • Volume 17 (2015), pp. 1-63 (1)
    • Volume 18 (2015), pp. 1-127 (8)
    • Volume 19 (2015), pp. 1-111 (7)
    • Volume 20 (2015), pp. 1-336 (1)
    • Volume 21 (2015), pp. 1-89 (7)
    • Volume 22 (2015), pp. 1-119 (8)
    • Volume 23 (2015), pp. 1-127 (10)
    • Volume 24 (2015), pp. 1-87 (6)
    • Volume 7 (2015), pp. 1-237 (9)
    • Volume 8 (2015), pp. 1-203 (7)
    • Volume 9 (2015), pp. 1-160 (9)
  • 2016 (517)
    • Volume 25 (2016), pp. 1-16 (2)
    • Volume 26 (2016), pp. 1-19 (2)
    • Volume 27 (2016), pp. 1-16 (2)
    • Volume 28 (2016), pp. 1-100 (7)
    • Volume 29 (2016), pp. 1-95 (6)
    • Volume 30 (2016), pp. 1-142 (10)
    • Volume 31 (2016), pp. 1-124 (8)
    • Volume 32 (2016), pp. 1-81 (9)
    • Volume 33 (2016), pp. 1-121 (8)
    • Volume 34 (2016), pp. 1-145 (10)
    • Volume 35 (2016), pp. 1-133 (10)
    • Volume 36 (2016), pp. 1-152 (10)
    • Volume 37 (2016), pp. 1-303 (18)
    • Volume 38 (2016), pp. 1-59 (1)
    • Volume 39 (2016), pp. 1-30 (2)
    • Volume 40 (2016), pp. 1-299 (20)
    • Volume 41 (2016), pp. 1-287 (36)
    • Volume 42 (2016), pp. 1-316 (21)
    • Volume 43(1,2,3) (2016), pp. 1-157 (3)
      • Volume 43, Issue 1 (2016), pp. 1-55 (1)
      • Volume 43, Issue 2 (2016), pp. 56-103 (1)
      • Volume 43, Issue 3 (2016), pp. 104-157 (1)
    • Volume 44 (2016), pp. 1-301 (20)
    • Volume 45(1,2) (2016), pp. 1-383 (21)
      • Volume 45, Issue 1 (2016), pp. 1-62 (1)
      • Volume 45, Issue 2 (2016), pp. 63-383 (20)
    • Volume 46 (2016), pp. 1-286 (20)
    • Volume 47(1,2) (2016), pp. 1-350 (21)
      • Volume 47, Issue 1 (2016), pp. 1-61 (1)
      • Volume 47, Issue 2 (2016), pp. 62-350 (20)
    • Volume 48 (2016), pp. 1-163 (17)
    • Volume 49(1,2) (2016), pp. 1-404 (21)
      • Volume 49, Issue 1 (2016), pp. 1-58 (1)
      • Volume 49, Issue 2 (2016), pp. 59-404 (20)
    • Volume 50 (2016), pp. 1-316 (20)
    • Volume 51 (2016), pp. 1-71 (7)
    • Volume 52 (2016), pp. 1-275 (20)
    • Volume 53(1,2,3) (2016), pp. 1-429 (22)
      • Volume 53, Issue 1 (2016), pp. 1-66 (1)
      • Volume 53, Issue 2 (2016), pp. 67-109 (1)
      • Volume 53, Issue 3 (2016), pp. 110-429 (20)
    • Volume 54 (2016), pp. 1-299 (20)
    • Volume 55 (2016), pp. 1-288 (20)
    • Volume 56 (2015), pp. 1-266 (20)
    • Volume 57 (2016), pp. 1-570 (53)
    • Volume 58 (2016), pp. 1-161 (10)
    • Volume 59 (2016), pp. 1-128 (10)
    • Volume 60 (2016), pp. 1-120 (10)
  • 2017 (481)
    • Volume 61(1,2) (2017), pp. 1-194 (11)
      • Volume 61, Issue 1 (2017), pp. 1-51 (1)
      • Volume 61, Issue 2 (2017), pp. 52-194 (10)
    • Volume 62 (2017), pp. 1-146 (10)
    • Volume 63 (2017), pp. 1-240 (1)
    • Volume 64 (2017), pp. 1-140 (10)
    • Volume 65 (2017), pp. 1-175 (10)
    • Volume 66 (2017), pp. 1-300 (20)
    • Volume 67(1,2,) (2017), pp. 1-389 (21)
      • Volume 67, Issue 1 (2017), pp. 1-67 (1)
      • Volume 67, Issue 2 (2017), pp. 68-389 (20)
    • Volume 68 (2017), pp. 1-141 (1)
    • Volume 69 (2017), pp. 1-253 (20)
    • Volume 70(1,2) (2017), pp. 1-321 (21)
      • Volume 70, Issue 1 (2017), pp. 1-50 (1)
      • Volume 70, Issue 2 (2017), pp. 51-321 (20)
    • Volume 71 (2017), pp. 1-219 (18)
    • Volume 72 (2017), pp. 1-478 (46)
    • Volume 73 (2017), pp. 1-133 (15)
    • Volume 74 (2017), pp. 1-287 (20)
    • Volume 75 (2017), pp. 1-111 (12)
    • Volume 76 (2017), pp. 1-199 (20)
    • Volume 77(1,2) (2017), pp. 1-380 (21)
      • Volume 77, Issue 1 (2017), pp. 1-102 (1)
      • Volume 77, Issue 2 (2017), pp. 103-380 (20)
    • Volume 78 (2017), pp. 1-230 (24)
    • Volume 79 (2017), pp. 1-89 (1)
    • Volume 80 (2017), pp. 1-323 (20)
    • Volume 81(1,2) (2017), pp. 1-312 (21)
      • Volume 81, Issue 1 (2017), pp. 1-47 (1)
      • Volume 81, Issue 2 (2017), pp. 48-312 (20)
    • Volume 82 (2017), pp. 1-90 (1)
    • Volume 83 (2017), pp. 1-239 (20)
    • Volume 84 (2017), pp. 1-92 (1)
    • Volume 85 (2017), pp. 1-73 (10)
    • Volume 86(1,2,3) (2017), pp. 1-370 (22)
      • Volume 86, Issue 1 (2017), pp. 1-58 (1)
      • Volume 86, Issue 2 (2017), pp. 59-122 (1)
      • Volume 86, Issue 3 (2017), pp. 123-370 (20)
    • Volume 87 (2017), pp. 1-255 (20)
    • Volume 88(1,2) (2017), pp. 1-226 (11)
      • Volume 88, Issue 1 (2017), pp. 1-57 (1)
      • Volume 88, Issue 2 (2017), pp. 58-226 (10)
    • Volume 89 (2017), pp. 1-321 (33)
    • Volume 90 (2017), pp. 1-270 (20)
  • 2018 (486)
    • Volume 100 (2018), pp. 1-253 (20)
    • Volume 101 (2018), pp. 1-252 (20)
    • Volume 102 (2018), pp. 1-223 (20)
    • Volume 103 (2018), pp. 1-249 (18)
    • Volume 104 (2018), pp. 1-492 (40)
    • Volume 105 (2018), pp. 1-232 (20)
    • Volume 106 (2018), pp. 1-244 (20)
    • Volume 107 (2018), pp. 1-232 (20)
    • Volume 108 (2018), pp. 1-244 (20)
    • Volume 109 (2018), pp. 1-266 (19)
    • Volume 110 (2018), pp. 1-243 (20)
    • Volume 111 (2018), pp. 1-181 (17)
    • Volume 112 (2018), pp. 1-251 (20)
    • Volume 113 (2018), pp. 1-250 (26)
    • Volume 114 (2018), pp. 1-264 (20)
    • Volume 91 (2018), pp. 1-137 (10)
    • Volume 92(1,2) (2018), pp. 1-399 (21)
      • Volume 92, Issue 1 (2018), pp. 1-138 (1)
      • Volume 92, Issue 2 (2018), pp. 139-399 (20)
    • Volume 93 (2018), pp. 1-141 (15)
    • Volume 94(1,2) (2018), pp. 1-332 (21)
      • Volume 94, Issue 1 (2018), pp. 1-71 (1)
      • Volume 94, Issue 2 (2018), pp. 72-332 (20)
    • Volume 95 (2018), pp. 1-272 (20)
    • Volume 96 (2018), pp. 1-250 (20)
    • Volume 97 (2018), pp. 1-284 (20)
    • Volume 98 (2018), pp. 1-232 (20)
    • Volume 99 (2018), pp. 1-229 (19)
  • 2019 (467)
    • Volume 115 (2019), pp. 1-268 (20)
    • Volume 116 (2019), pp. 1-252 (19)
    • Volume 117 (2019), pp. 1-242 (20)
    • Volume 118 (2019), pp. 1-280 (20)
    • Volume 119 (2019), pp. 1-253 (20)
    • Volume 120(1,2) (2019), pp. 1-295 (21)
      • Volume 120, Issue 1 (2019), pp. 1-59 (1)
      • Volume 120, Issue 2 (2019), pp. 60-295 (20)
    • Volume 121 (2019), pp. 1-100 (13)
    • Volume 122 (2019), pp. 1-262 (20)
    • Volume 123 (2019), pp. 1-273 (20)
    • Volume 124(1,2) (2019), pp. 1-333 (21)
      • Volume 124, Issue 1 (2019), pp. 1-85 (1)
      • Volume 124, Issue 2 (2019), pp. 86-1-333 (20)
    • Volume 125 (2019), pp. 1-259 (20)
    • Volume 126 (2019), pp. 1-298 (20)
    • Volume 127(1,2,3) (2019), pp. 1-376 (22)
      • Volume 127, Issue 1 (2019), pp. 1-55 (1)
      • Volume 127, Issue 2 (2019), pp. 56-105 (1)
      • Volume 127, Issue 3 (2019), pp. 106-376 (20)
    • Volume 128(1,2) (2019), pp. 1-432 (21)
      • Volume 128, Issue 1 (2019), pp. 1-70 (1)
      • Volume 128, Issue 2 (2019), pp. 71-432 (20)
    • Volume 129 (2019), pp. 1-267 (20)
    • Volume 130 (2019), pp. 1-308 (20)
    • Volume 131 (2019), pp. 1-288 (20)
    • Volume 132 (2019), pp. 1-312 (24)
    • Volume 133 (2019), pp. 1-274 (20)
    • Volume 134(1,2) (2020), pp. 1-338 (21)
      • Volume 134, Issue 1 (2019), pp. 1-51 (1)
      • Volume 134, Issue 2 (2019), pp. 52-338 (20)
    • Volume 135 (2019), pp. 1-298 (22)
    • Volume 136 (2019), pp. 1-246 (16)
    • Volume 137 (2019), pp. 1-236 (14)
    • Volume 138(1,2) (2019), pp. 1-294 (13)
      • Volume 138, Issue 1 (2019), pp. 1-64 (1)
      • Volume 138, Issue 2 (2019), pp. 65-294 (12)
  • 2020 (179)
    • Volume 139(1,2) (2020), pp. 1-258 (13)
      • Volume 139, Issue 1 (2020), pp. 1-60 (1)
      • Volume 139, Issue 2 (2020), pp. 61-258 (12)
    • Volume 140 (2020), pp. 1-184 (10)
    • Volume 141 (2020), pp. 1-155 (10)
    • Volume 142 (2020), pp. 1-194 (12)
    • Volume 143 (2020), pp. 1-261 (16)
    • Volume 144 (2020), pp. 1-449 (30)
    • Volume 145 (2020), pp. 1-408 (30)
    • Volume 146 (2020), pp. 1-289 (18)
    • Volume 147 (2020), pp. 1-208 (12)
    • Volume 148 (2020), pp. 1-121 (8)
    • Volume 149 (2020), pp. 1-165 (10)
    • Volume 150 (2020), pp. 1-181 (10)
  • 2021 (143)
    • Volume 151 (2021), pp. 1-122 (8)
    • Volume 152 (2021), pp. 1-125 (8)
    • Volume 153(1,2) (2021), pp. 1-215 (13)
      • Volume 153, Issue 1 (2021), pp. 1-42 (1)
      • Volume 153, Issue 2 (2021), pp. 43-215 (12)
    • Volume 154 (2021), pp. 1-174 (10)
    • Volume 155 (2021), pp. 1-154 (10)
    • Volume 156 (2021), pp. 1-191 (12)
    • Volume 157 (2021), pp. 1-188 (10)
    • Volume 158 (2021), pp. 1-298 (16)
    • Volume 159 (2021), pp. 1-223 (14)
    • Volume 160 (2021), pp. 1-337 (20)
    • Volume 161 (2021), pp. 1-156 (10)
    • Volume 162 (2021), pp. 1-178 (12)
  • 2022 (125)
    • Volume 163 (2022), pp. 1-157 (8)
    • Volume 164 (2022), pp. 1-149 (8)
    • Volume 165 (2022), pp. 1-209 (12)
    • Volume 166 (2022), pp. 1-145 (10)
    • Volume 167 (2022), pp. 1-161 (9)
    • Volume 168 (2022), pp. 1-146 (10)
    • Volume 169 (2022), pp. 1-201 (10)
    • Volume 170 (2022), pp. 1-171 (10)
    • Volume 171 (2022), pp. 1-125 (8)
    • Volume 172 (2022), pp. 1-333 (20)
    • Volume 173 (2022), pp. 1-161 (10)
    • Volume 174 (2022), pp. 1-176 (10)
  • 2023 (132)
    • Volume 175 (2023), pp. 1-108 (8)
    • Volume 176 (2023), pp. 1-174 (10)
    • Volume 177 (2023), pp. 1-136 (8)
    • Volume 178 (2023), pp. 1-165 (10)
    • Volume 179 (2023), pp. 1-164 (10)
    • Volume 180 (2023), pp. 1-162 (12)
    • Volume 181 (2023), pp. 1-215 (12)
    • Volume 182 (2023), pp. 1-265 (18)
    • Volume 183 (2023), pp. 1-226 (14)
    • Volume 184 (2023), pp. 1-154 (10)
    • Volume 185 (2023), pp. 1-191 (10)
    • Volume 186 (2023), pp. 1-160 (10)
  • 2024 (183)
    • Volume 187 (2024), pp. 1-156 (10)
    • Volume 188 (2024), pp. 1-197 (12)
    • Volume 189 (2024), pp. 1-310 (20)
    • Volume 190(1,2) (2024), pp. 1-351 (18)
      • Volume 190, Issue 1 (2024), pp. 1-69 (1)
      • Volume 190, Issue 2 (2024), pp. 70-351 (17)
    • Volume 191 (2024), pp. 1-207 (12)
    • Volume 192 (2024), pp. 1-319 (20)
    • Volume 193(1,2) (2024), pp. 1-252 (13)
      • Volume 193, Issue 1 (2024), pp. 1-45 (1)
      • Volume 193, Issue 2 (2024), pp. 46-252 (12)
    • Volume 194 (2024), pp. 1-213 (13)
    • Volume 195 (2024), pp. 1-235 (13)
    • Volume 196 (2024), pp. 1-221 (14)
    • Volume 197 (2024), pp. 1-231 (15)
    • Volume 198 (2024), pp. 1-402 (23)
  • 2025 (169)
    • Volume 199 (2025), pp. 1-253 (16)
    • Volume 200 (2025), pp. 1-223 (14)
    • Volume 201 (2025), pp. 1-245 (12)
    • Volume 202 (2025), pp. 1-317 (17)
    • Volume 203 (2025), pp. 1-438 (15)
    • Volume 204 (2025), pp. 1-353 (19)
    • Volume 205 (2025), pp. 1-272 (16)
    • Volume 206 (2025), pp. 1-172 (13)
    • Volume 207 (2025), pp. 1-173 (12)
    • Volume 208 (2025), pp. 1-174 (11)
    • Volume 209 (2025), pp. 1-184 (12)
    • Volume 210 (2025), pp. 1-158 (12)
  • 2026 (21)
    • Volume 211 (2026), pp. (21)
  • Info (6)
  • News (3)
  • Open access (460)
  • Premium (38)

Last Articles

  • All
  • Premium
  • Open access

Identification of Young People with European Identity Features

2024-02-15

The Jonathan administration in Nigeria: A postmortem study and lessons for dictators in Africa

2024-02-17

Estimation of Design Model Constants for a Constructed Wetland with Palm Kernel Shell as Substrate for Slaughterhouse Wastewater Treatment

2024-02-18

Popular Articles

  • About Us

    About Us

    0 shares
    Share 0 Tweet 0
  • Submit your Article

    0 shares
    Share 0 Tweet 0
  • Jeevamrut – A Natural Fertilizer

    0 shares
    Share 0 Tweet 0
  • Abstracting & Indexing

    0 shares
    Share 0 Tweet 0
  • Guide for Authors

    0 shares
    Share 0 Tweet 0

Careers

  • All
  • Careers
No Content Available
World Scientific News

World Scientific News (WSN) is an open-access fully peer-reviewed scholarly journal. The monthly – interdisciplinary journal is directed in the first place to scientists who want to publish their findings, insights, observations, conclusions, etc.

READ MORE

Menu

  • Home
  • About Us
  • Editorial Board
  • Guide for Authors
  • Instruction for Authors
  • Abstracting & Indexing
  • Submit your Article
  • Careers
  • News

Other databases

AGRO
CAS
Google Scholar
Google Scholar Metrics
ICZN
ProQuest
Road Directory
ZooBank

EISSN 2392-2192

Login / Register
Privacy Policy
Cookie Policy

made by fixfix

No Result
View All Result
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News

made by fixfix

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.