2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Work 2022
DOI: 10.1109/percomworkshops53856.2022.9767495
|View full text |Cite
|
Sign up to set email alerts
|

Serverless Computing for NFV: Is it Worth it? A Performance Comparison Analysis

Abstract: Network Function Virtualization has established itself as one of the most important paradigms towards softwarebased networking. While today Virtual Network Functions (VNFs) are typically deployed in the form of serverful virtualmachine or container-based applications, the emergence of serverless computing opens the door to the possibility of implementing them as serverless functions, with benefits in terms of scalability and resource efficiency. This paper aims to assess whether this really makes sense or not,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The technology is implemented directly into the apps, allowing developers to impose compliance measures in order to increase the security posture. However, in order to comprehend its importance, it is necessary to take a moment to delve into the concept of serverless architecture [40,41].…”
Section: What Is Serverless Security?mentioning
confidence: 99%
“…The technology is implemented directly into the apps, allowing developers to impose compliance measures in order to increase the security posture. However, in order to comprehend its importance, it is necessary to take a moment to delve into the concept of serverless architecture [40,41].…”
Section: What Is Serverless Security?mentioning
confidence: 99%
“…Imagine that the request is passed to Function 2 and Function 3 if the request originates from administrators, while if the request comes from end-users this is handled by Function 4 and Function 5. In such a case, the application's control flow can easily leak the role of the person issuing the request or the times at which the application is accessed by administrators and end-users attacks are likely to become a more important threat in the near future as serverless platforms evolve to fit the needs of stateful functions (e.g., [47]), since this will require placing more storage closer to the functions. As for countermeasures, in case the usage of warm containers is required to meet the application performance requirements, one possible way to mitigate the exposed issue would be for cloud providers to reduce the size of the /tmp/ folder to the minimum extent possible and to carefully monitor its contents after every function invocation.…”
Section: Infrastructure-level Attacksmentioning
confidence: 99%