Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Improved Encryption Towards Data Security in Serverless Computing

View through CrossRef
Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment. Such increase in deployment of serverless computing makes the research to rethink on its security aspects. Since, the serverless security computing may undergo problems due to malicious users or hackers. In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption. Initially, the data is encrypted using user attributes; further the data is split into cipher text. It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system. The performance on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.
Title: Improved Encryption Towards Data Security in Serverless Computing
Description:
Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment.
Such increase in deployment of serverless computing makes the research to rethink on its security aspects.
Since, the serverless security computing may undergo problems due to malicious users or hackers.
In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption.
Initially, the data is encrypted using user attributes; further the data is split into cipher text.
It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system.
The performance on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.

Related Results

Serverless Computing: Architecture, Challenges, and Future Trends
Serverless Computing: Architecture, Challenges, and Future Trends
Serverless computing, a paradigm shift in cloud computing, has received prominence for its specific architecture, imparting benefits in terms of cost performance, scalability, and ...
Harnessing Serverless Computing for Agile Cloud Application Development
Harnessing Serverless Computing for Agile Cloud Application Development
Serverless computing revolutionises cloud application development with elastic, cost-effective, scalable infrastructure management solutions. This research explores the adoption of...
Exploring the Cost Benefits of Serverless Computing in Cloud Infrastructure
Exploring the Cost Benefits of Serverless Computing in Cloud Infrastructure
As organizations increasingly shift to the cloud, the adoption of serverless computing has emerged as a promising solution to optimize cloud infrastructure costs while maintaining ...
Serverless Mesh Architectures for Multi-Cloud and Edge
Serverless Mesh Architectures for Multi-Cloud and Edge
Serverless computing is changing the cloud application de- sign by removing the need to design, build, and manage infrastructure, and instead focusing on deploying code that can be...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Elevating Cloud Security via Serverless Computing: An in Depth Exploration
Elevating Cloud Security via Serverless Computing: An in Depth Exploration
The research aims to elucidate the transformative potential of serverless architecture in enhancing cloud security, addressing common threats, and mitigating vulnerabilities. Throu...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...

Back to Top