Securing AWS Lambda: Advanced Strategies and Best Practices DOI
Amine Barrak,

Gildas Fofe,

Léo Mackowiak

et al.

Published: June 28, 2024

Language: Английский

Cold Start Latency in Serverless Computing: A Systematic Review, Taxonomy, and Future Directions DOI Open Access
Muhammed Golec, Guneet Kaur Walia, Mohit Kumar

et al.

ACM Computing Surveys, Journal Year: 2024, Volume and Issue: 57(3), P. 1 - 36

Published: Oct. 17, 2024

Recently, academics and the corporate sector have paid attention to serverless computing, which enables dynamic scalability an economic model. In users only pay for time they actually use resources, enabling zero scaling optimise cost resource utilisation. However, this approach also introduces cold start problem. Researchers developed various solutions address problem, yet it remains unresolved research area. article, we propose a systematic literature review on latency in computing. Furthermore, create detailed taxonomy of approaches latency, investigate existing techniques reducing frequency. We classified current studies into several categories such as caching application-level optimisation-based solutions, well Artificial Intelligence/Machine Learning-based solutions. Moreover, analyzed impact quality service, explored mitigation methods, datasets, implementation platforms, them based their common characteristics features. Finally, outline open challenges highlight possible future directions.

Language: Английский

Citations

13

Challenges and Solutions in Network Security for Serverless Computing DOI Open Access
Sina Ahmadi

International Journal of Current Science Research and Review, Journal Year: 2024, Volume and Issue: 07(01)

Published: Jan. 11, 2024

This research study explores the challenges and solutions related to serverless computing so that computer systems connected network can be protected. Serverless defined as a method of managing services without need have fixed servers. The qualitative is used by this study, which does not include any numerical data involves examination non-number security identified in detail. In literature review, past studies from 2019 2023 are reviewed identify gaps foundation for investigating security. review based on thematic analysis, all organized into meaningful themes. findings like privacy, insecure dependencies limited control. strategies overcome these encryption, strong monitoring other relevant strategies. also suggests use blockchain technology Artificial Intelligence. short, provides insights improve guides future researchers innovate creative developing challenges.

Language: Английский

Citations

10

A survey on the cold start latency approaches in serverless computing: an optimization-based perspective DOI
Mohsen Ghorbian, Mostafa Ghobaei‐Arani

Computing, Journal Year: 2024, Volume and Issue: 106(11), P. 3755 - 3809

Published: Aug. 17, 2024

Language: Английский

Citations

8

Security Considerations in Generative AI for Web Applications DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 281 - 332

Published: July 26, 2024

Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.

Language: Английский

Citations

4

Optimization of Serverless Mobile Cloud Applications for Enhanced Security and Resource Efficiency DOI Open Access

Tapankumar A. Kakani

International Journal of Advanced Research in Science Communication and Technology, Journal Year: 2025, Volume and Issue: unknown, P. 620 - 630

Published: April 4, 2025

Serverless mobile cloud applications, while highly scalable and cost-efficient, face critical challenges in terms of security vulnerabilities inefficient resource management. These are amplified by the dynamic nature environments reliance on third-party infrastructure. This research specifically addresses problem securing data transmission, managing authentication optimizing allocation computing resources serverless architectures. To resolve these issues, paper proposes a novel, integrated framework that leverages machine learning to predict application demands proactively scale functions. The approach includes implementation multi-factor authentication, role-based access control, encryption protocols enhance confidentiality system integrity. demonstrates significant improvements performance, reduced infrastructure costs, better cache management, notable reduction latency miss rates. proposed model enhances applications' reliability, scalability, cost-effectiveness combining adaptive mechanisms with intelligent provisioning

Language: Английский

Citations

0

Security Analysis and Implementation Models for Serverless Cloud Computing Applications DOI

Devansh Malik,

Saru Dhir,

P. Betty

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 343 - 356

Published: Feb. 28, 2025

This work investigates the evolving landscape of serverless computing and its transformative impact on modern software development cloud deployment strategies. Serverless architecture represents a significant paradigm shift by abstracting away traditional server management responsibilities from developers, introduces unique challenges that must be addressed to fully leverage potential. The paper discusses strategies mitigate these challenges, such as optimizing function code reduce cold start times, using advanced monitoring tools gain visibility into operations. Through an extensive review contemporary literature real-world case studies, identifies best practices for designing implementing applications. contributes ongoing discourse providing balanced perspective advantages offering practical insights developers organization seeking adopt or optimize architectures in their

Language: Английский

Citations

0

MQTT-E: E2E encryption in MQTT via proxy re-encryption avoiding broker overloading DOI Creative Commons
Francesco Buccafurri, Vincenzo De Angelis,

Sara Lazzaro

et al.

Ad Hoc Networks, Journal Year: 2025, Volume and Issue: unknown, P. 103878 - 103878

Published: April 1, 2025

Language: Английский

Citations

0

Challenges and Solutions in Network Security for Serverless Computing DOI Open Access
Sina Ahmadi

Published: Jan. 11, 2024

This research study explores the challenges and solutions related to serverless computing so that computer systems connected network can be protected. Serverless defined as a method of managing services without need have fixed servers. The qualitative is used by this study, which does not include any numerical data involves examination non-number security identified in detail. In literature review, past studies from 2019 2023 are reviewed identify gaps foundation for investigating security. review based on thematic analysis, all organized into meaningful themes. findings like privacy, insecure dependencies limited control. strategies overcome these encryption, strong monitoring other relevant strategies. also suggests use blockchain technology Artificial Intelligence. short, provides insights improve guides future researchers innovate creative developing challenges.

Language: Английский

Citations

2

TCP/IP stack transport layer performance, privacy, and security issues DOI Creative Commons

Oroo Oyondi Felix

World Journal of Advanced Engineering Technology and Sciences, Journal Year: 2024, Volume and Issue: 11(2), P. 175 - 200

Published: March 18, 2024

Transmission Control Protocol/ Internet Protocol (TCP/IP) is the backbone of transmission. The Transport Layer TCP/IP stack, which includes TCP (Transmission Protocol) and UDP (User Datagram protocols, plays a crucial role in ensuring reliable communication between devices over network. To come up with measures that make networks more secure, it important to learn about vulnerabilities exist transport stack then have an understanding typical attacks carried out such layer. This paper explores how works, 3 Way Handshake, Header Structure, classical layer TCP/IP, tools, solutions adopted prevent reduce chances some these attacks. findings indicated major TCP/ IP threats include Finger printing, SYN Flood, reassembly sequencing, Spoofing, session hijacking, RST FIN denial service attack, Ping Death, Low Rate/ Shrew Attacks. Their preventive mechanisms are discussed.

Language: Английский

Citations

0

Landscape of Serverless Computing Technology and IoT Tools in the IT Sectors DOI

D. Dhanya,

M. Arun Manicka Raja,

Khasimbee Shaik

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 234 - 257

Published: Feb. 23, 2024

This chapter delves into the challenges of securing sensitive data and systems in digital landscape, focusing on serverless computing, IoT, authentication protocols. It discusses best practices for implementing security measures architectures, including encryption, access control, monitoring. The rise IoT devices has revolutionized industries by enabling real-time collection analysis, but also presents a significant cyber threat surface. To secure ecosystems, strategies include device authentication, intrusion detection systems. Authentication protocols like multi-factor biometrics, blockchain-based solutions are crucial. Understanding security, is essential businesses to proactively address gaps safeguard assets an evolving landscape.

Language: Английский

Citations

0