ABSTRACT
Server less computing has gained significant popularity due to its flexibility, scalability, and cost-effectiveness. However, the increased use of server less platforms has brought new challenges, particularly in the realm of network security. This review paper aims to explore the challenges that arise in ensuring network security within server less computing environments and to propose potential solutions to mitigate these challenges. The first challenge addressed in this review is the lack of visibility and control in server less environments. Traditional security tools and methodologies are not always applicable to server less architectures, resulting in limited visibility into the network and the services hosted. This lack of visibility can lead to vulnerabilities and potential security breaches. To address this challenge, the paper proposes the adoption of specialized security tools designed specifically for server less environments, as well as the implementation of comprehensive monitoring and logging mechanisms to gain insight into network activities. Another significant challenge is the secure communication between server less functions and external services. Server less applications often rely on a wide array of external APIs and services, which can introduce security risks if not properly managed. The paper explores the need for secure communication protocols, including the use of encryption and authentication mechanisms, to protect data in transit and ensure the integrity and confidentiality of network communications. Furthermore, the dynamic nature of server less environments introduces challenges related to secure code deployment and runtime security. Traditional security measures such as network firewalls and intrusion detection systems may not adequately protect server less functions, which are ephemeral and often have short lifespans. This paper discusses the importance of implementing robust security practices during the development and deployment stages of server less applications, including secure coding techniques, vulnerability scanning, and runtime security controls. Additionally, the review addresses the challenge of securing sensitive data in server less environments. Data protection is a critical aspect of network security, and server less applications must adhere to stringent data privacy regulations. The paper explores the best practices for implementing data encryption, tokenization, and access control mechanisms to safeguard sensitive information within server less architectures. This review paper presents an in-depth analysis of the challenges posed by network security in server less computing and proposes a range of solutions to address these challenges. By understanding the unique security considerations of server less environments and implementing the recommended solutions, organizations can effectively enhance the network security posture of their server less applications. This paper aims to serve as a valuable resource for security professionals, researchers, and practitioners seeking to navigate the evolving landscape of server less computing while ensuring robust network security.
References
- Aad, I., Hubaux, J. P., & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. IEEE/ACM transactions on networking, 16(4), 791-802.
- Adeniyi, E. A., Ogundokun, R. O., Misra, S., Awotunde, J. B., & Abiodun, K. M. (2022). Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology. In Blockchain Applications in the Smart Era (pp. 65-83). Cham: Springer International Publishing.
- Aditya, P., Akkus, I. E., Beck, A., Chen, R., Hilt, V., Rimac, I., … & Stein, M. (2019). Will serverless computing revolutionize NFV?. Proceedings of the IEEE, 107(4), 667-678.
- Agache, A., Brooker, M., Iordache, A., Liguori, A., Neugebauer, R., Piwonka, P., & Popa, D. M. (2020). Firecracker: Lightweight virtualization for serverless applications. In 17th USENIX symposium on networked systems design and implementation (NSDI 20) (pp. 419-434).
- Ahmad, S., Mehfuz, S., Urooj, S., & Alsubaie, N. (2024). Machine learning-based intelligent security framework for secure cloud key management. Cluster Computing, 1-27.
- Ahmadi, S. (2024). Challenges and Solutions in Network Security for Serverless Computing. International Journal of Current Science Research and Review, 7(01), 218-229.
- Albanese, M., Battista, E., Jajodia, S., & Casola, V. (2014, October). Manipulating the attacker’s view of a system’s attack surface. In 2014 IEEE Conference on Communications and Network Security (pp. 472-480). IEEE.
- Ali, S. A. (2023). DESIGINING SECURE AND ROBUST E-COMMERCE PLAFORM FOR PUBLIC CLOUD. The Asian Bulletin of Big Data Management, 3(1).
- Alpernas, K., Panda, A., Ryzhyk, L., & Sagiv, M. (2021, November). Cloud-scale runtime verification of serverless applications. In Proceedings of the ACM Symposium on Cloud Computing (pp. 92-107).
- Alwan, Z. S., & Younis, M. F. (2017). Detection and prevention of SQL injection attack: a survey. International Journal of Computer Science and Mobile Computing, 6(8), 5-17.
- Aravindhan, K., & Karthiga, R. R. (2013). One time password: A survey. International Journal of Emerging Trends in Engineering and Development, 1(3), 613-623.
- Ariffin, M. A. M., Ibrahim, M. F., & Kasiran, Z. (2020). API vulnerabilities in cloud computing platform: attack and detection. International Journal of Engineering Trends and Technology, 1, 8-14.
- Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., … & Zaharia, M. (2009). Above the clouds: A berkeley view of cloud computing (Vol. 17). Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
- Ang’udi, J. J. (2023). Security challenges in cloud computing: A comprehensive analysis. World Journal of Advanced Engineering Technology and Sciences, 10(2), 155-181.
- Asad, M. (2023). Security Management in Cloud Computing for healthcare Data.
- Aslanpour, M. S., Toosi, A. N., Cicconetti, C., Javadi, B., Sbarski, P., Taibi, D., … & Dustdar, S. (2021, February). Serverless edge computing: vision and challenges. In Proceedings of the 2021 Australasian computer science week multiconference (pp. 1-10).
- Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
- Aurangzeb, S., Aleem, M., Iqbal, M. A., & Islam, M. A. (2017). Ransomware: a survey and trends. J. Inf. Assur. Secur, 6(2), 48-58.
- Backes, M., Bugiel, S., & Derr, E. (2016, October). Reliable third-party library detection in android and its security applications. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 356-367).
- Baldini, I., Cheng, P., Fink, S. J., Mitchell, N., Muthusamy, V., Rabbah, R., … & Tardieu, O. (2017, October). The serverless trilemma: Function composition for serverless computing. In Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 89-103).
- Barcelona-Pons, D., Sutra, P., Sánchez-Artigas, M., París, G., & García-López, P. (2022). Stateful serverless computing with crucial. ACM Transactions on Software Engineering and Methodology (TOSEM), 31(3), 1-38.
- Baresi, L., & Quattrocchi, G. (2021). PAPS: A serverless platform for edge computing infrastructures. Frontiers in Sustainable Cities, 3, 690660.
- Basak, A., Bhunia, S., & Ray, S. (2016, June). Exploiting design-for-debug for flexible SoC security architecture. In Proceedings of the 53rd Annual Design Automation Conference (pp. 1-6).
- Benedetti, P., Femminella, M., Reali, G., & Steenhaut, K. (2022, March). Reinforcement learning applicability for resource-based auto-scaling in serverless edge applications. In 2022 IEEE international conference on pervasive computing and communications workshops and other affiliated events (PerCom Workshops) (pp. 674-679). IEEE.
- Berlin, K., Slater, D., & Saxe, J. (2015, October). Malicious behavior detection using windows audit logs. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security (pp. 35-44).
- Bhatt, S., Manadhata, P. K., & Zomlot, L. (2014). The operational role of security information and event management systems. IEEE security & Privacy, 12(5), 35-41.
- Bonguet, A., & Bellaiche, M. (2017). A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet, 9(3), 43.
- Boscain, S. (2023). AWS Cloud: Infrastructure, DevOps techniques, State of Art (Doctoral dissertation, Politecnico di Torino).
- Boza, E. F., Abad, C. L., Villavicencio, M., Quimba, S., & Plaza, J. A. (2017, October). Reserved, on demand or serverless: Model-based simulations for cloud budget planning. In 2017 IEEE second Ecuador technical chapters meeting (ETCM) (pp. 1-6). IEEE.
- Brown, A. W., Delbaere, M., Eeles, P., Johnston, S., & Weaver, R. (2005). Realizing service-oriented solutions with the IBM rational software development platform. IBM systems journal, 44(4), 727-752.
- Buennemeyer, T. K., Nelson, T. M., Clagett, L. M., Dunning, J. P., Marchany, R. C., & Tront, J. G. (2008, January). Mobile device profiling and intrusion detection using smart batteries. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (pp. 296-296). IEEE.
- Butin, D., & Le Métayer, D. (2015, May). A guide to end-to-end privacy accountability. In 2015 IEEE/ACM 1st International Workshop on Technical and Legal aspects of data pRivacy and Security (pp. 20-25). IEEE.
- Candel, J. M. O., Elouali, A., Gimeno, F. J. M., & Mora, H. (2022, November). Cloud vs Serverless Computing: A Security Point of View. In International Conference on Ubiquitous Computing and Ambient Intelligence (pp. 1098-1109). Cham: Springer International Publishing.
- Castro, P., Isahagian, V., Muthusamy, V., & Slominski, A. (2023). Hybrid serverless computing: Opportunities and challenges. Serverless Computing: Principles and Paradigms, 43-77.
- Cassel, G. A. S., Rodrigues, V. F., da Rosa Righi, R., Bez, M. R., Nepomuceno, A. C., & da Costa, C. A. (2022). Serverless computing for Internet of Things: A systematic literature review. Future Generation Computer Systems, 128, 299-316.
- Catalfamo, A. (2023). How to strengthen Cloud Computing exploiting solutions to Edge. Universitá degli Studi di Messina.
- Chase, J. S., Anderson, D. C., Thakar, P. N., Vahdat, A. M., & Doyle, R. P. (2001). Managing energy and server resources in hosting centers. ACM SIGOPS operating systems review, 35(5), 103-116.
- Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Research, 3, 10-23.
- Chopra, A. K., & Singh, M. P. (2021, September). Deserv: Decentralized serverless computing. In 2021 IEEE International Conference on Web Services (ICWS) (pp. 51-60). IEEE.
- Chostak, C. (2020). Machine Learning Powered Serverless Fraud Detection (Master’s thesis, Instituto Politecnico do Porto (Portugal)).
- Chowhan, R. S., & Tanwar, R. (2019). Password-less authentication: methods for user verification and identification to login securely over remote sites. In Machine Learning and Cognitive Science Applications in Cyber Security (pp. 190-212). IGI global.
- Christensen, J. H. (2009, October). Using RESTful web-services and cloud computing to create next generation mobile applications. In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (pp. 627-634).
- Christidis, A., Moschoyiannis, S., Hsu, C. H., & Davies, R. (2020). Enabling serverless deployment of large-scale ai workloads. IEEE Access, 8, 70150-70161.
- Cicconetti, C., Conti, M., & Passarella, A. (2020). A decentralized framework for serverless edge computing in the internet of things. IEEE Transactions on Network and Service Management, 18(2), 2166-2180.
- Cinar, B. (2023). The Rise of Serverless Architectures: Security Challenges and Best Practices. Asian Journal of Research in Computer Science, 16(4), 194-210.
- Cobleigh, A., Hell, M., Karlsson, L., Reimer, O., Sönnerup, J., & Wisenhoff, D. (2018, October). Identifying, prioritizing and evaluating vulnerabilities in third party code. In 2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 208-211). IEEE.
- Costa, R., & Hodun, D. (2021). Google Cloud Cookbook. “ O’Reilly Media, Inc.”.
- Datta, P., Kumar, P., Morris, T., Grace, M., Rahmati, A., & Bates, A. (2020, April). Valve: Securing function workflows on serverless computing platforms. In Proceedings of The Web Conference 2020 (pp. 939-950).
- Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., & Samarati, P. (2002). A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC), 5(2), 169-202.
- Decan, A., Mens, T., & Constantinou, E. (2018, May). On the impact of security vulnerabilities in the npm package dependency network. In Proceedings of the 15th international conference on mining software repositories (pp. 181-191).
- Devi, B. K., & Subbulakshmi, T. (2017, December). DDoS attack detection and mitigation techniques in cloud computing environment. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 512-517). IEEE.
- Dramé-Maigné, S., Laurent, M., Castillo, L., & Ganem, H. (2021). Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT. ACM Computing Surveys (CSUR), 54(7), 1-34.
- Duggineni, S. (2023). Impact of controls on data integrity and information systems. Science and Technology, 13(2), 29-35.
- Eassa, A. M., Elhoseny, M., El-Bakry, H. M., & Salama, A. S. (2018). NoSQL injection attack detection in web applications using RESTful service. Programming and Computer Software, 44, 435-444.
- Efterpi, P. (2020). Machine Learning Pipelines in Serverless Environments (Doctoral dissertation, University of Piraeus (Greece)).
- Eismann, S., Scheuner, J., Van Eyk, E., Schwinger, M., Grohmann, J., Herbst, N., … & Iosup, A. (2020). A review of serverless use cases and their characteristics. arXiv preprint arXiv:2008.11110.
- Enes, J., Expósito, R. R., & Touriño, J. (2020). Real-time resource scaling platform for big data workloads on serverless environments. Future Generation Computer Systems, 105, 361-379.
- Fairhurst, G. (2017). Network Transport Circuit Breakers (No. rfc8084). Internet Engineering Task Force.
- Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective on risk of security threats to information systems. Information Technology and Management, 6, 203-225.
- García-López, P., Sánchez-Artigas, M., Shillaker, S., Pietzuch, P., Breitgand, D., Vernik, G., … & Ferrer, A. J. (2019). Servermix: Tradeoffs and challenges of serverless data analytics. arXiv preprint arXiv:1907.11465.
- Genaud, S., & Gossa, J. (2011, July). Cost-wait trade-offs in client-side resource provisioning with elastic clouds. In 2011 IEEE 4th International Conference on Cloud Computing (pp. 1-8). IEEE.
- George, A. S., Sagayarajan, S., Baskar, T., & George, A. H. (2023). Extending detection and response: how MXDR evolves cybersecurity. Partners Universal International Innovation Journal, 1(4), 268-285.
- Ghorbani, A. A., Lu, W., & Tavallaee, M. (2009). Network intrusion detection and prevention: concepts and techniques (Vol. 47). Springer Science & Business Media.
- Gill, S. S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, A., … & Uhlig, S. (2022). AI for next generation computing: Emerging trends and future directions. Internet of Things, 19, 100514.
- Gjerdrum, A. T. (2020). Diggi: A Distributed Serverless Runtime for Developing Trusted Cloud Services.
- Glaessner, T. C., Kellermann, T., & McNevin, V. (2002). Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues (Vol. 2870). World Bank Publications.
- Golec, M., Ozturac, R., Pooranian, Z., Gill, S. S., & Buyya, R. (2021). IFaaSBus: A security-and privacy-based lightweight framework for serverless computing using IoT and machine learning. IEEE Transactions on Industrial Informatics, 18(5), 3522-3529.
- Golec, M., Walia, G. K., Kumar, M., Cuadrado, F., Gill, S. S., & Uhlig, S. (2023). Cold start latency in serverless computing: A systematic review, taxonomy, and future directions. arXiv preprint arXiv:2310.08437.
- Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. Information Systems Frontiers, 12, 185-205.
- Gouareb, R., Friderikos, V., & Aghvami, A. H. (2018). Virtual network functions routing and placement for edge cloud latency minimization. IEEE Journal on Selected Areas in Communications, 36(10), 2346-2357.
- Gowri, A. S., Bala, P. S., & Ramdinthara, I. Z. (2021). Comprehensive analysis of resource allocation and service placement in fog and cloud computing. International Journal of Advanced Computer Science and Applications, 12(3).
- Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).
- Gulati, S. S., & Gupta, S. (2012). A framework for enhancing security and performance in multi-tenant applications. International Journal of Information Technology and Knowledge Management, 5(2), 233-237.
- Gunasekaran, A., Patel, C., & McGaughey, R. E. (2004). A framework for supply chain performance measurement. International journal of production economics, 87(3), 333-347.
- Guo, Z., Blanco, Z., Shahrad, M., Wei, Z., Dong, B., Li, J., … & Zhang, Y. (2022). Decomposing and executing serverless applications as resource graphs. arXiv preprint arXiv:2206.13444.
- Gupta, S., & Gupta, B. B. (2017). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management, 8, 512-530.
- Haber, M. J., Chappell, B., & Hills, C. (2022). Mitigation Strategies. In Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources (pp. 221-296). Berkeley, CA: Apress.
- Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., … & Felten, E. W. (2009). Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52(5), 91-98.
- Hamilton, J. R. (2007, November). On Designing and Deploying Internet-Scale Services. In LISA(Vol. 18, No. 2007, pp. 1-18).
- Hassan, H. B., Barakat, S. A., & Sarhan, Q. I. (2021). Survey on serverless computing. Journal of Cloud Computing, 10, 1-29.
- Harsh, P., Dudouet, F., Cascella, R. G., Jégou, Y., & Morin, C. (2012, October). Using open standards for interoperability issues, solutions, and challenges facing cloud computing. In 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) (pp. 435-440). IEEE.
- Heckathorn, M. (2011). Network monitoring for web-based threats. Network, 2, 1-2011.
- Hellerstein, J. M., Faleiro, J., Gonzalez, J. E., Schleier-Smith, J., Sreekanti, V., Tumanov, A., & Wu, C. (2018). Serverless computing: One step forward, two steps back. arXiv preprint arXiv:1812.03651.
- Hilley, D. (2009). Cloud computing: A taxonomy of platform and infrastructure-level offerings. Georgia Institute of Technology, Tech. Rep, 44-45.
- Hobday, R. A., & Dancer, S. J. (2013). Roles of sunlight and natural ventilation for controlling infection: historical and current perspectives. Journal of hospital infection, 84(4), 271-282.
- Humphreys, E. (2008). Information security management standards: Compliance, governance and risk management. information security technical report, 13(4), 247-255.
- Huseinović, A., Mrdović, S., Bicakci, K., & Uludag, S. (2020). A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access, 8, 177447-177470.
- Inamdar, D. M., & Gupta, S. (2020). A survey on web application security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology,(6), 223-228.
- Jacob, S. (2022). Enhancing cyber attack prevention and detection using application process tracing. Technological University of the Shannon: Midlands Midwest
- Jangda, A., Pinckney, D., Brun, Y., & Guha, A. (2019). Formal foundations of serverless computing. Proceedings of the ACM on Programming Languages, 3(OOPSLA), 1-26.
- Javed, H., Toosi, A. N., & Aslanpour, M. S. (2022). Serverless platforms on the edge: a performance analysis. In New Frontiers in Cloud Computing and Internet of Things (pp. 165-184). Cham: Springer International Publishing.
- Jegan, D. S., Wang, L., Bhagat, S., Ristenpart, T., & Swift, M. (2020). Guarding serverless applications with seclambda. arXiv preprint arXiv:2011.05322.
- Jegan, D. S., Wang, L., Bhagat, S., & Swift, M. (2023). Guarding serverless applications with Kalium. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 4087-4104).
- Jegannathan, A. P., Saha, R., & Addya, S. K. (2022, June). A time series forecasting approach to minimize cold start time in cloud-serverless platform. In 2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (pp. 325-330). IEEE.
- Jonas, E., Schleier-Smith, J., Sreekanti, V., Tsai, C. C., Khandelwal, A., Pu, Q., … & Patterson, D. A. (2019). Cloud programming simplified: A berkeley view on serverless computing. arXiv preprint arXiv:1902.03383.
- Katal, A., Sethi, V., & Lamba, S. (2021). Virtual Machine Scaling in Autonomic Cloud Resource Management. Autonomic Computing in Cloud Resource Management in Industry 4.0, 301-323.
- Kelly, D., Glavin, F., & Barrett, E. (2020, October). Serverless computing: Behind the scenes of major platforms. In 2020 IEEE 13th International Conference on Cloud Computing (CLOUD) (pp. 304-312). IEEE.
- Kesa, D. M. (2023). Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations. World Journal of Advanced Research and Reviews, 18(3), 970-992.
- Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6, 1-22.
- Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International journal of critical infrastructure protection, 25, 36-49.
- Kitchin, R., & Dodge, M. (2020). The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. In Smart cities and innovative Urban technologies(pp. 47-65). Routledge.
- Koschel, A., Klassen, S., Jdiya, K., Schaaf, M., & Astrova, I. (2021, July). Cloud computing: serverless. In 2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA) (pp. 1-7). IEEE.
- Kumar, R., & Goyal, R. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 33, 1-48.
- Kumar, M. (2019). Serverless architectures review, future trend and the solutions to open problems. American Journal of Software Engineering, 6(1), 1-10.
- Kumari, A., Patra, M. K., & Sahoo, B. (2023). Data Controlling and Security Issues in Cloud: A Step Towards Serverless. In Perspectives on Social Welfare Applications’ Optimization and Enhanced Computer Applications (pp. 105-124). IGI Global.
- Lannurien, V., D’orazio, L., Barais, O., & Boukhobza, J. (2023). Serverless Cloud Computing: State of the Art and Challenges. Serverless Computing: Principles and Paradigms, 275-316.
- Lebanon, G., El-Geish, M., Lebanon, G., & El-Geish, M. (2018). Thoughts on System Design for Big Data. Computing with Data: An Introduction to the Data Industry, 495-541.
- Leemans, T. T. (2022). Towards Serverless Enterprises: Developing the Enterprise Serverless Assessment (ESA) to assess and improve an organization’s fit and readiness for Serverless technology (Master’s thesis, University of Twente).
- Li, Z., Guo, L., Cheng, J., Chen, Q., He, B., & Guo, M. (2022). The serverless computing survey: A technical primer for design architecture. ACM Computing Surveys (CSUR), 54(10s), 1-34.
- Loaiza Enriquez, R. (2021). Cloud Security Posture Management/CSPM) in Azure.
- Lynn, T., Rosati, P., Lejeune, A., & Emeakaroha, V. (2017, December). A preliminary review of enterprise serverless cloud computing (function-as-a-service) platforms. In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 162-169). IEEE.
- Makani, S. T. (2023). STREAMLINING AWS SERVERLESS DEPLOYMENTS: A BITBUCKET PIPELINE APPROACH. International Journal of Computer Applications (IJCA), 4(1).
- Malawski, M., Gajek, A., Zima, A., Balis, B., & Figiela, K. (2020). Serverless execution of scientific workflows: Experiments with hyperflow, aws lambda and google cloud functions. Future Generation Computer Systems, 110, 502-514.
- Malik, M. I., Wani, S. H., & Rashid, A. (2018). CLOUD COMPUTING-TECHNOLOGIES. International Journal of Advanced Research in Computer Science, 9(2).
- Malik, A. W., Bhatti, D. S., Park, T. J., Ishtiaq, H. U., Ryou, J. C., & Kim, K. I. (2024). Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors, 24(2), 433.
- Mallick, M. A. I., & Nath, R. (2024).Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments. World Scientific News, 190(1), 1-69.
- Mampage, A., Karunasekera, S., & Buyya, R. (2021, May). Deadline-aware dynamic resource management in serverless computing environments. In 2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid) (pp. 483-492). IEEE.
- Mampage, A., Karunasekera, S., & Buyya, R. (2022). A holistic view on resource management in serverless computing environments: Taxonomy and future directions. ACM Computing Surveys (CSUR), 54(11s), 1-36.
- Mannan, M., & van Oorschot, P. C. (2011). Leveraging personal devices for stronger password authentication from untrusted computers. Journal of Computer Security, 19(4), 703-750.
- Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of network and computer applications, 41, 424-440.
- Mateus-Coelho, N., & Cruz-Cunha, M. (2022, June). Serverless service architectures and security minimals. In 2022 10th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-6). IEEE.
- McGrath, G., & Brenner, P. R. (2017, June). Serverless computing: Design, implementation, and performance. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) (pp. 405-410). IEEE.
- Menzel, M., & Ranjan, R. (2012, April). CloudGenius: decision support for web server cloud migration. In Proceedings of the 21st international conference on World Wide Web (pp. 979-988).
- Mitropoulos, D., & Spinellis, D. (2017). Fatal injection: A survey of modern code injection attack countermeasures. PeerJ Computer Science, 3, e136.
- Mlyatu, M. M., & Sanga, C. (2022). Secure web application technologies implementation through hardening security headers using automated threat modelling techniques. Journal of Information Security, 14(1), 1-15.
- Mohd Nazir, M. A. N. (2011). Cost-effective resource management for distributed computing (Doctoral dissertation, UCL (University College London).
- Mondal, S. K., Pan, R., Kabir, H. D., Tian, T., & Dai, H. N. (2022). Kubernetes in IT administration and serverless computing: An empirical study and research challenges. The Journal of Supercomputing, 1-51.
- Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8.
- Mughal, A. A. (2018). The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection. International Journal of Intelligent Automation and Computing, 1(1), 1-20.
- Mughal, A. A. (2019). Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges. Applied Research in Artificial Intelligence and Cloud Computing, 2(1), 1-31.
- Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., & Ullah, A. (2017). Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, 8(10).
- Mustafa, G., Ashraf, R., Mirza, M. A., Jamil, A., & Muhammad. (2018, June). A review of data security and cryptographic techniques in IoT based devices. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (pp. 1-9).
- Nadji, Y., Saxena, P., & Song, D. (2009, February). Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In NDSS (Vol. 20).
- Nastic, S., & Dustdar, S. (2018). Towards deviceless edge computing: Challenges, design aspects, and models for serverless paradigm at the edge. The Essence of Software Engineering, 121-136.
- Ngo, C., Wang, P., Tran, T., & Chung, S. (2020, July). Serverless computing architecture security and quality analysis for back-end development. In Journal of The Colloquium for Information Systems Security Education (Vol. 7, No. 1, pp. 8-8).
- Naranjo Rico, J. L. (2018). Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques.
- Narasayya, V., & Chaudhuri, S. (2021). Cloud data services: Workloads, architectures and multi-tenancy. Foundations and Trends® in Databases, 10(1), 1-107
- Olaoye, G., & Luz, A. (2024). Future trends and emerging technologies in cloud security. Telecommunication Engineering Centre. University of Melbourne
- O’Meara, W., & Lennon, R. G. (2020, June). Serverless computing security: Protecting application logic. In 2020 31st Irish Signals and Systems Conference (ISSC) (pp. 1-5). IEEE.
- Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115-133.
- Orazi, G., Vallittu, K., Sainio, P., & Virtanen, S. (2020). Enhancing and integration of security testing in the development of a microservices environment.
- Ortega-Fernandez, I., & Liberati, F. (2023). A review of denial of service attack and mitigation in the smart grid using reinforcement learning. Energies, 16(2), 635.
- Ouyang, R., Wang, J., Xu, H., Chen, S., Xiong, X., Tolba, A., & Zhang, X. (2023). A Microservice and Serverless Architecture for Secure IoT System. Sensors, 23(10), 4868.
- Padma, P., & Srinivasan, S. (2023). DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing. Wireless Personal Communications, 129(3), 1563-1583.
- Pal, P. (2022). The adoption of waves of digital technology as antecedents of digital transformation by financial services institutions. Journal of Digital Banking, 7(1), 70-91.
- Pan, Y., Sun, F., Teng, Z., White, J., Schmidt, D. C., Staples, J., & Krause, L. (2019). Detecting web attacks with end-to-end deep learning. Journal of Internet Services and Applications, 10(1), 1-22.
- Pan, S., Zhao, H., Cai, Z., Li, D., Ma, R., & Guan, H. (2023). Sustainable serverless computing with cold-start optimization and automatic workflow resource scheduling. IEEE Transactions on Sustainable Computing.
- Papadopoulos, P., Ilia, P., Polychronakis, M., Markatos, E. P., Ioannidis, S., & Vasiliadis, G. (2018). Master of web puppets: Abusing web browsers for persistent and stealthy computation. arXiv preprint arXiv:1810.00464.
- Papp, D., Ma, Z., & Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In 2015 13th Annual Conference on Privacy, Security and Trust (PST) (pp. 145-152). Ieee.
- Park, J., & Jeong, J. (2023). An Autoscaling System Based on Predicting the Demand for Resources and Responding to Failure in Forecasting. Sensors, 23(23), 9436.
- Pascoal, T. A., Fonseca, I. E., & Nigam, V. (2020). Slow denial-of-service attacks on software defined networks. Computer Networks, 173, 107223.
- Patel, K. (2024). Mastering Cloud Scalability: Strategies, Challenges, and Future Directions: Navigating Complexities of Scaling in Digital Era. In Emerging Trends in Cloud Computing Analytics, Scalability, and Service Models (pp. 155-169). IGI Global.
- Patidar, S., Rane, D., & Jain, P. (2011, December). Challenges of software development on cloud platform. In 2011 World Congress on Information and Communication Technologies (pp. 1009-1013). IEEE.
- Patros, P., Spillner, J., Papadopoulos, A. V., Varghese, B., Rana, O., & Dustdar, S. (2021). Toward sustainable serverless computing. IEEE Internet Computing, 25(6), 42-50.
- Patwary, A. A. N., Fu, A., Naha, R. K., Battula, S. K., Garg, S., Patwary, M. A. K., & Aghasian, E. (2020). Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review. arXiv preprint arXiv:2003.00395.
- Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of network and computer applications, 36(1), 25-41.
- Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: Issues, security threats, and solutions. ACM Computing Surveys (CSUR), 45(2), 1-39.
- Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE.
- Podjarny, G., & Ṭal, L. (2019). Serverless security. O’Reilly Media, Incorporated.
- Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., & Vigna, G. (2014, February). Execute this! Analyzing unsafe and malicious dynamic code loading in android applications. In NDSS (Vol. 14, pp. 23-26).
- Polinsky, I., Datta, P., Bates, A., & Enck, W. (2021, June). SCIFFS: Enabling secure third-party security analytics using serverless computing. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (pp. 175-186).
- Ponta, S. E., Plate, H., & Sabetta, A. (2020). Detection, assessment and mitigation of vulnerabilities in open source dependencies. Empirical Software Engineering, 25(5), 3175-3215.
- Prakash, A. A., & Kumar, K. S. (2022). Cloud serverless security and services: a survey. In Applications of Computational Methods in Manufacturing and Product Design: Select Proceedings of IPDIMS 2020 (pp. 453-462). Singapore: Springer Nature Singapore.
- Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2014). DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global Journal of Computer Science and Technology, 14(7-E), 15.
- Pusuluri, V. S. R. (2022). Taxonomy Of Security and Privacy Issues in Serverless Computing. St. Cloud State University.
- Qazi, F. A. (2022). Insecure Application Programming Interfaces (APIs) in Zero-Trust Networks (Doctoral dissertation, Capitol Technology University).
- Rawal, B. S., Manogaran, G., & Peter, A. (2023). Cybersecurity and Identity Access Management. Springer.
- Reddy, V. K., Rao, B. T., Reddy, L. S. S., & Kiran, P. S. (2011). Research issues in cloud computing. Global Journal of Computer Science and Technology, 11(11), 59-64.
- Rinta-Jaskari, E. (2021). Automatic Testing Approaches For Serverless Applications In AWS (Master’s thesis).
- Rios, V. D. M., Inacio, P. R., Magoni, D., & Freire, M. M. (2022). Detection and mitigation of low-rate denial-of-service attacks: A survey. IEEE Access, 10, 76648-76668.
- Rodriguez, M. A., & Buyya, R. (2019). Container‐based cluster orchestration systems: A taxonomy and future directions. Software: Practice and Experience, 49(5), 698-719.
- Rodrigues, P., Freitas, F., & Simão, J. (2022). Quickfaas: Providing portability and interoperability between faas platforms. Future Internet, 14(12), 360.
- Roy, R. B., Patel, T., & Tiwari, D. (2022, February). Icebreaker: Warming serverless functions better with heterogeneity. In Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 753-767).
- Rubinstein, I. S., & Hartzog, W. (2016). Anonymization and risk. Wash. L. Rev. 91, 703.
- Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, D. (2020). Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(3), 1977-2008.
- Sabbioni, A. (2023). Serverless middlewares to integrate heterogeneous and distributed services in cloud continuum environments.
- Sabbioni, A., Mazzocca, C., Colajanni, M., Montanari, R., & Corradi, A. (2022, June). A fully decentralized architecture for access control verification in serverless environments. In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-6). IEEE.
- Sailer, R., Valdez, E., Jaeger, T., Perez, R., Van Doorn, L., Griffin, J. L., … & Jaeger, T. (2005). sHype: Secure hypervisor approach to trusted virtualized systems. Techn. Rep. RC23511, 5.
- Samaila, M. G., Neto, M., Fernandes, D. A., Freire, M. M., & Inácio, P. R. (2018). Challenges of securing Internet of Things devices: A survey. Security and Privacy, 1(2), e20.
- Samea, F., Azam, F., Rashid, M., Anwar, M. W., Haider Butt, W., & Muzaffar, A. W. (2020). A model-driven framework for data-driven applications in serverless cloud computing. Plos one, 15(8), e0237317.
- Sankaran, A., Datta, P., & Bates, A. (2020, December). Workflow integration alleviates identity and access management in serverless computing. In Proceedings of the 36th Annual Computer Security Applications Conference (pp. 496-509).
- Scarfone, K., Souppaya, M., Cody, A., & Orebaugh, A. (2008). Technical guide to information security testing and assessment. NIST Special Publication, 800(115), 2-25.
- Scholte, T., Robertson, W., Balzarotti, D., & Kirda, E. (2012, July). Preventing input validation vulnerabilities in web applications through automated type analysis. In 2012 IEEE 36th annual computer software and applications conference (pp. 233-243). IEEE.
- Sewak, M., & Singh, S. (2018, April). Winning in the era of serverless computing and function as a service. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1-5). IEEE.
- Shafiei, H., Khonsari, A., & Mousavi, P. (2022). Serverless computing: a survey of opportunities, challenges, and applications. ACM Computing Surveys, 54(11s), 1-32.
- Shahrad, M., Fonseca, R., Goiri, I., Chaudhry, G., Batum, P., Cooke, J., … & Bianchini, R. (2020). Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider. In 2020 USENIX annual technical conference (USENIX ATC 20) (pp. 205-218).
- Shen, J., Zhang, H., Geng, Y., Li, J., Wang, J., & Xu, M. (2022, November). Gringotts: Fast and accurate internal denial-of-wallet detection for serverless computing. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (pp. 2627-2641).
- Shin, Y., Hur, J., Koo, D., & Yun, J. (2020). Toward serverless and efficient encrypted deduplication in mobile cloud computing environments. Security and Communication Networks, 2020, 1-15.
- Silowash, G. J., Cappelli, D. M., Moore, A. P., Trzeciak, R. F., Shimeall, T., & Flynn, L. (2012). Common sense guide to mitigating insider threats.
- Silva, P., Fireman, D., & Pereira, T. E. (2020, December). Prebaking functions to warm the serverless cold start. In Proceedings of the 21st International Middleware Conference (pp. 1-13).
- Silverman, M. P. (2008). Quantum condensates in extreme gravity: Implications for cold stars and dark matter. International Journal of Modern Physics D, 17(03n04), 603-609.
- Simmons, P. (2011, December). Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 73-82.
- Singaravelu, L., Pu, C., Härtig, H., & Helmuth, C. (2006, April). Reducing TCB complexity for security-sensitive applications: Three case studies. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006 (pp. 161-174).
- Singh, D., & Dautaniya, A. K. (2019). Cloud Computing Security Challenges and Solution. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1185-1190.
- Singh, A., & Kolluri, S. (2021). Security and Privacy Challenges in Cloud-Based Database Management: Strategies and Solutions. TECHNO REVIEW Journal of Technology and Management, 1(1), 32-40.
- Sivanathan, A. (2020). IoT behavioral monitoring via network traffic analysis. arXiv preprint arXiv:2001.10632.
- Sobb, T., Turnbull, B., & Moustafa, N. (2020). Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics, 9(11), 1864.
- Solaiman, K. (2023). Novel architecture for mitigating cold start problem in serverless computing.
- Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer communications, 107, 30-48.
- Stamp, J., Dillinger, J., Young, W., & DePoy, J. (2003). Common vulnerabilities in critical infrastructure control systems. SAND2003-1772C. Sandia National Laboratories.
- Stojkovic, J., Xu, T., Franke, H., & Torrellas, J. (2023, June). Mxfaas: Resource sharing in serverless environments for parallelism and efficiency. In Proceedings of the 50th Annual International Symposium on Computer Architecture (pp. 1-15).
- Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS quarterly, 441-469.
- Suo, K., Son, J., Cheng, D., Chen, W., & Baidya, S. (2021, September). Tackling cold start of serverless applications by efficient and adaptive container runtime reusing. In 2021 IEEE International Conference on Cluster Computing (CLUSTER) (pp. 433-443). IEEE.
- Sushma, D., Nalini, M. K., Kumar, R. A., & Nidugala, M. (2023, November). To Detect and Mitigate the Risk in Continuous Integration and Continues Deployments (CI/CD) Pipelines in Supply Chain Using Snyk tool. In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) (pp. 1-10). IEEE.
- Rangaraju, S. (2023). Secure by Intelligence: Enhancing Products with AI-Driven Security Measures. EPH-International Journal of Science And Engineering, 9(3), 36-41.
- Reniers, V., Van Landuyt, D., Rafique, A., & Joosen, W. (2019). Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Information Systems, 85, 1-20.
- Richards, N., & Hartzog, W. (2015). Taking trust seriously in privacy law. Stan. Tech. L. Rev. 19, 431.
- Ristov, S., Hollaus, C., & Hautz, M. (2022, July). Colder than the warm start and warmer than the cold start! Experience the spawn start in faas providers. In Proceedings of the 2022 Workshop on Advanced tools, programming languages, and Platforms for Implementing and Evaluating algorithms for Distributed systems (pp. 35-39).
- Ron, A., Shulman-Peleg, A., & Puzanov, A. (2016). Analysis and mitigation of NoSQL injections. IEEE Security & Privacy, 14(2), 30-39.
- Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
- Tan, R., Nguyen, H. H., Foo, E. Y., Yau, D. K., Kalbarczyk, Z., Iyer, R. K., & Gooi, H. B. (2017). Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Transactions on Information Forensics and Security, 12(7), 1609-1624.
- Tatineni, S. (2023). Compliance and Audit Challenges in DevOps: A Security Perspective. International Research Journal of Modernization in Engineering Technology and Science, 5(10), 1306-1316.
- Telo, J. (2023). Smart city security threats and countermeasures in the context of emerging technologies. International Journal of Intelligent Automation and Computing, 6(1), 31-45.
- Tolosana-Calasanz, R., Castañé, G. G., Bañares, J. Á., & Rana, O. (2021). Modelling serverless function behaviours. In Economics of Grids, Clouds, Systems, and Services: 18th International Conference, GECON 2021, Virtual Event, September 21–23, 2021, Proceedings 18 (pp. 109-122). Springer International Publishing.
- Tomarchio, O., Calcaterra, D., & Modica, G. D. (2020). Cloud resource orchestration in the multi-cloud landscape: a systematic review of existing frameworks. Journal of Cloud Computing, 9(1), 49.
- Tuyishime, E., Balan, T. C., Cotfas, P. A., Cotfas, D. T., & Rekeraho, A. (2023). Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach. Applied Sciences, 13(22), 12359.
- Uddin, M., Islam, S., & Al-Nemrat, A. (2019). A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access, 7, 166676-166689.
- Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., & Rashid, A. (2018). Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, 18-54.
- Vahidinia, P., Farahani, B., & Aliee, F. S. (2020, August). Cold start in serverless computing: Current trends and mitigation strategies. In 2020 International Conference on Omni-layer Intelligent Systems (COINS) (pp. 1-7). IEEE.
- Van Eyk, E., Toader, L., Talluri, S., Versluis, L., Uță, A., & Iosup, A. (2018). Serverless is more: From paas to present cloud computing. IEEE Internet Computing, 22(5), 8-17.
- Varia, J. (2010). Architecting for the cloud: Best practices. Amazon Web Services, 1, 1-21.
- Vegesna, V. V. (2019). Investigations on Different Security Techniques for Data Protection in Cloud Computing using Cryptography Schemes. Indo-Iranian Journal of Scientific Research (IIJSR) Volume, 3, 69-84.
- Verma, G., & Upadhayay, D. (2019). Cloud Computing Trends for the Future. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1177-1184.
- Vielberth, M., Böhm, F., Fichtinger, I., & Pernul, G. (2020). Security operations center: A systematic study and open challenges. IEEE Access, 8, 227756-227779.
- VS, D. P., Sethuraman, S. C., & Khan, M. K. (2023). Container security: precaution levels, mitigation strategies, and research perspectives. Computers & Security, 103490.
- Wang, Z., Zhao, K., Li, P., Jacob, A., Kozuch, M., Mowry, T., & Skarlatos, D. (2023, October). Memento: Architectural Support for Ephemeral Memory Management in Serverless Environments. In Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture (pp. 122-136).
- Wen, J., Chen, Z., Jin, X., & Liu, X. (2023). Rise of the planet of serverless computing: A systematic review. ACM Transactions on Software Engineering and Methodology, 32(5), 1-61.
- Xiong, J., Wei, M., Lu, Z., & Liu, Y. (2021, November). Warmonger: inflicting denial-of-service via serverless functions in the cloud. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 955-969).
- Yaqoob, T., Abbas, H., & Atiquzzaman, M. (2019). Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices – A review. IEEE Communications Surveys & Tutorials, 21(4), 3723-3768.
- Yakoob, S. K. (2021). Advanced Machine Learning Approach to Handle Code Injection Attacks in Cloud Computing. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 4623-4629.
- Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
- Zanella, M., Massari, G., Galimberti, A., & Fornaciari, W. (2018, October). Back to the future: Resource management in post-cloud solutions. In Proceedings of the Workshop on INTelligent Embedded Systems Architectures and Applications (pp. 33-38).
- Zhang, Y., Goiri, Í., Chaudhry, G. I., Fonseca, R., Elnikety, S., Delimitrou, C., & Bianchini, R. (2021, October). Faster and cheaper serverless computing on harvested resources. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (pp. 724-739).
- Zheng, S. (2020). Improving Network Security with Low-Cost and Easy-to-Adopt Solutions (Doctoral dissertation, Duke University, Durham, NC, USA).
- Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and challenges: a survey. IEEE access, 8, 43920-43943.
- Zhou, H., Hu, Y., Ouyang, X., Su, J., Koulouzis, S., de Laat, C., & Zhao, Z. (2019). CloudsStorm: A framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications. Software: Practice and Experience, 49(10), 1421-1447.
- Zobaed, S. M., & Salehi, M. A. (2023). Confidential computing across edge-to-cloud for machine learning: A survey study. arXiv preprint arXiv:2307.16447
Download all article in PDF