Security Analysis and Implementation Models for Serverless Cloud Computing Applications

Security Analysis and Implementation Models for Serverless Cloud Computing Applications

Devansh Malik (Amity School of Engineering and Technology, Amity University, Delhi, India), Saru Dhir (Amity University, Delhi, India), Betty Paulraj (Amity School of Engineering and Technology, Amity University, Delhi, India), and Sumita Gupta (Amity School of Engineering and Technology, Amity University, Delhi, India)
Copyright: © 2025 |Pages: 14
DOI: 10.4018/979-8-3693-7137-4.ch014
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This work investigates the evolving landscape of serverless computing and its transformative impact on modern software development and cloud deployment strategies. Serverless architecture represents a significant paradigm shift by abstracting away the traditional server management responsibilities from developers, and serverless computing introduces unique challenges that must be addressed to fully leverage its potential. The paper discusses strategies to mitigate these challenges, such as optimizing function code to reduce cold start times, and using advanced monitoring tools to gain visibility into serverless operations. Through an extensive review of contemporary literature and real-world case studies, the paper identifies best practices for designing and implementing serverless applications. This paper contributes to the ongoing discourse on serverless computing by providing a balanced perspective on its advantages and challenges, offering practical insights for developers and organization seeking to adopt or optimize serverless architectures in their cloud computing strategies.
Chapter Preview

Complete Chapter List

Search this Book:
Reset