Threat modelling for serverless architectures identifying and mitigating risks in Function-As-A-Service (FAAS)
1 Southern Methodist University. USA.
2 Murray State University. USA.
Research Article
World Journal of Advanced Research and Reviews, 2022, 14(03), 727–735
Publication history:
Received on 03 May 2022; revised on 22 June 2022; accepted on 25 June 2022
Abstract:
One significant method for developing software is Function as a Service (FaaS), which entails making little, tailored functions to deal with particular jobs. Coders put less emphasis on creating full apps and more on creating these functions that are called when certain events or requests come in. If you want to learn about and use Function as a Service, this article is for you. Customers using the serverless approach do not need to reserve hardware resources, which is a departure from the conventional cloud computing service model. Billing is dependent on real resource consumption, and code execution is event-driven (via HTTP requests, cron jobs, etc.). In exchange, the provider is liable for assigning resources and tasks. Serverless is most often seen as a public cloud service, although there are solutions being worked on and supported by strong players in the industry that will enable private cloud serverless platforms to be built. "Function as a Service" (FaaS), the initial serverless offering, has serious flaws that might cancel out any advantages for providers and customers alike, particularly when it comes to providers' capacity to multiplex resources and customers' ability to save money. Providers and tenants alike could save a ton of money and energy if these problems were solved. In order to prevent serverless from becoming the default cloud computing model, this chapter will provide a thorough overview of its limits and highlight state-of-the-art research to address these issues.
Keywords:
Cloud computing; Serverless computing; Security; Threat models; Vulnerabilities
Full text article in PDF:
Copyright information:
Copyright © 2022 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0