Published: June 28, 2024
Language: Английский
Published: June 28, 2024
Language: Английский
ACM Computing Surveys, Journal Year: 2024, Volume and Issue: 57(3), P. 1 - 36
Published: Oct. 17, 2024
Recently, academics and the corporate sector have paid attention to serverless computing, which enables dynamic scalability an economic model. In users only pay for time they actually use resources, enabling zero scaling optimise cost resource utilisation. However, this approach also introduces cold start problem. Researchers developed various solutions address problem, yet it remains unresolved research area. article, we propose a systematic literature review on latency in computing. Furthermore, create detailed taxonomy of approaches latency, investigate existing techniques reducing frequency. We classified current studies into several categories such as caching application-level optimisation-based solutions, well Artificial Intelligence/Machine Learning-based solutions. Moreover, analyzed impact quality service, explored mitigation methods, datasets, implementation platforms, them based their common characteristics features. Finally, outline open challenges highlight possible future directions.
Language: Английский
Citations
13International Journal of Current Science Research and Review, Journal Year: 2024, Volume and Issue: 07(01)
Published: Jan. 11, 2024
This research study explores the challenges and solutions related to serverless computing so that computer systems connected network can be protected. Serverless defined as a method of managing services without need have fixed servers. The qualitative is used by this study, which does not include any numerical data involves examination non-number security identified in detail. In literature review, past studies from 2019 2023 are reviewed identify gaps foundation for investigating security. review based on thematic analysis, all organized into meaningful themes. findings like privacy, insecure dependencies limited control. strategies overcome these encryption, strong monitoring other relevant strategies. also suggests use blockchain technology Artificial Intelligence. short, provides insights improve guides future researchers innovate creative developing challenges.
Language: Английский
Citations
10Computing, Journal Year: 2024, Volume and Issue: 106(11), P. 3755 - 3809
Published: Aug. 17, 2024
Language: Английский
Citations
8Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 281 - 332
Published: July 26, 2024
Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.
Language: Английский
Citations
4International Journal of Advanced Research in Science Communication and Technology, Journal Year: 2025, Volume and Issue: unknown, P. 620 - 630
Published: April 4, 2025
Serverless mobile cloud applications, while highly scalable and cost-efficient, face critical challenges in terms of security vulnerabilities inefficient resource management. These are amplified by the dynamic nature environments reliance on third-party infrastructure. This research specifically addresses problem securing data transmission, managing authentication optimizing allocation computing resources serverless architectures. To resolve these issues, paper proposes a novel, integrated framework that leverages machine learning to predict application demands proactively scale functions. The approach includes implementation multi-factor authentication, role-based access control, encryption protocols enhance confidentiality system integrity. demonstrates significant improvements performance, reduced infrastructure costs, better cache management, notable reduction latency miss rates. proposed model enhances applications' reliability, scalability, cost-effectiveness combining adaptive mechanisms with intelligent provisioning
Language: Английский
Citations
0IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 343 - 356
Published: Feb. 28, 2025
This work investigates the evolving landscape of serverless computing and its transformative impact on modern software development cloud deployment strategies. Serverless architecture represents a significant paradigm shift by abstracting away traditional server management responsibilities from developers, introduces unique challenges that must be addressed to fully leverage potential. The paper discusses strategies mitigate these challenges, such as optimizing function code reduce cold start times, using advanced monitoring tools gain visibility into operations. Through an extensive review contemporary literature real-world case studies, identifies best practices for designing implementing applications. contributes ongoing discourse providing balanced perspective advantages offering practical insights developers organization seeking adopt or optimize architectures in their
Language: Английский
Citations
0Ad Hoc Networks, Journal Year: 2025, Volume and Issue: unknown, P. 103878 - 103878
Published: April 1, 2025
Language: Английский
Citations
0Published: Jan. 11, 2024
This research study explores the challenges and solutions related to serverless computing so that computer systems connected network can be protected. Serverless defined as a method of managing services without need have fixed servers. The qualitative is used by this study, which does not include any numerical data involves examination non-number security identified in detail. In literature review, past studies from 2019 2023 are reviewed identify gaps foundation for investigating security. review based on thematic analysis, all organized into meaningful themes. findings like privacy, insecure dependencies limited control. strategies overcome these encryption, strong monitoring other relevant strategies. also suggests use blockchain technology Artificial Intelligence. short, provides insights improve guides future researchers innovate creative developing challenges.
Language: Английский
Citations
2World Journal of Advanced Engineering Technology and Sciences, Journal Year: 2024, Volume and Issue: 11(2), P. 175 - 200
Published: March 18, 2024
Transmission Control Protocol/ Internet Protocol (TCP/IP) is the backbone of transmission. The Transport Layer TCP/IP stack, which includes TCP (Transmission Protocol) and UDP (User Datagram protocols, plays a crucial role in ensuring reliable communication between devices over network. To come up with measures that make networks more secure, it important to learn about vulnerabilities exist transport stack then have an understanding typical attacks carried out such layer. This paper explores how works, 3 Way Handshake, Header Structure, classical layer TCP/IP, tools, solutions adopted prevent reduce chances some these attacks. findings indicated major TCP/ IP threats include Finger printing, SYN Flood, reassembly sequencing, Spoofing, session hijacking, RST FIN denial service attack, Ping Death, Low Rate/ Shrew Attacks. Their preventive mechanisms are discussed.
Language: Английский
Citations
0Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 234 - 257
Published: Feb. 23, 2024
This chapter delves into the challenges of securing sensitive data and systems in digital landscape, focusing on serverless computing, IoT, authentication protocols. It discusses best practices for implementing security measures architectures, including encryption, access control, monitoring. The rise IoT devices has revolutionized industries by enabling real-time collection analysis, but also presents a significant cyber threat surface. To secure ecosystems, strategies include device authentication, intrusion detection systems. Authentication protocols like multi-factor biometrics, blockchain-based solutions are crucial. Understanding security, is essential businesses to proactively address gaps safeguard assets an evolving landscape.
Language: Английский
Citations
0