Cloud vs Serverless Computing: A Security Point of View

被引:0
作者
Ortega Candel, Jose Manuel [1 ]
Elouali, A. [1 ]
Mora Gimeno, Francisco Jose [1 ]
Mora, Higinio [1 ]
机构
[1] Univ Alicante, Dept Comp Sci & Technol, Alicante, Spain
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022) | 2023年 / 594卷
关键词
FaaS; Cloud computing; Serverless computing; Serverless architecture; Security; Attack vectors;
D O I
10.1007/978-3-031-21333-5_109
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last few years, there has been an evolution of the traditional cloud architectures which offers the possibility the provider assumes a big percentage of the security to the level of infrastructure, leaving the responsibility for the security of the applications to the developers. The new model of serverless computation, represents an evolution of the cloud architecture, improving also some appearances related with the security of the applications that use this new model. In this paper, we analyze which are the advantages and problems of the serverless architectures from the point of view of the security, comparing the main risks and attack vectors in both architectures. From this comparative, we can conclude that in serverless architectures new risks appear in the applications and improve others that are found in methodologies of safe development like Open Web Application Security Project (OWASP). Given the event-driven nature of serverless architectures, this type of applications add an additional complexity and arise new risks, among which can stand out those related with the data injection of events in functions and the creation of flows between serverless functions that could increase the attack surface of an application and do it vulnerable to attacks already known. To the best of our knowledge, this is the first paper to compare cloud and serverless computing from a security point of view.
引用
收藏
页码:1098 / 1109
页数:12
相关论文
共 29 条
  • [1] [Anonymous], AWS RESPONSIBILITY M
  • [2] [Anonymous], OWASP SERVERLESS TOP
  • [3] [Anonymous], JSON Web Tokens
  • [4] [Anonymous], Google Cloud Functions
  • [5] [Anonymous], 10 MOST CRITICAL RIS
  • [6] [Anonymous], AWS LAMBDA
  • [7] [Anonymous], Azure functions
  • [8] [Anonymous], AWS - API Gateway
  • [9] Bhajantri Lokesh B., 2019, 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), P376, DOI 10.1109/I-SMAC47947.2019.9032545
  • [10] Fox GC, 2017, Arxiv, DOI [arXiv:1708.08028, DOI 10.13140/RG.2.2.15007.87206]