Securing the Edge: A Multi-Layered Approach to Protecting Serverless Functions in Edge Computing Environments
Abstract
This paper investigates the security challenges of deploying serverless functions at the edge and proposes a multi-layered security approach to mitigate these challenges. We explore techniques for secure authentication, data protection, and runtime monitoring in resource-constrained edge environments with intermittent connectivity. The paper proposes a multi-layered security framework that addresses key vulnerabilities in these environments. By focusing on techniques such as secure authentication, data encryption, and continuous runtime monitoring, the proposed approach aims to ensure serverless functions' integrity, confidentiality, and availability while mitigating potential threats. The framework offers a comprehensive solution to bolster the security of edge computing deployments, ensuring that the benefits of serverless computing can be realized without compromising safety.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2019 Innovative Computer Sciences Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.


