Article Content

 

Main article text

Introduction

  • (1)

    We propose a novel access control scheme based on runtime dynamic tokens that addresses the permission management challenges in serverless platforms, providing enhanced granularity and dynamicity compared to existing static permission models;

  • (2)

    We develop a token generation mechanism that integrates function context information and user-defined rules, creating tokens with high dynamicity, time-effectiveness, and unpredictability, which effectively resist common attacks such as replay attacks;

  • (3)

    We introduce a multi-factor verification process that combines request context analysis and behavioral patterns to create a comprehensive defense-in-depth permission control system;

  • (4)

    We implement and evaluate a prototype system on mainstream serverless platforms, demonstrating through comprehensive experiments that our approach effectively enhances security while maintaining acceptable performance overhead.

Serverless computing model and security challenges

Security threat analysis of serverless platforms

Existing solutions and their limitations

Implementation principles of dynamic tokens

Design philosophy

Dynamic token generation mechanism

DecryptToken=H(RequestID|InstanceID|Nonce|Timestamp|DataKey).

Function-level token management policy

Security enhancement mechanisms

Encryption and decryption process

Audit log recording

Performance optimization considerations

Security and performance evaluation

Security analysis

Attack model analysis

Qualitative evaluation of defense effect

Performance evaluation

Experimental setup

Performance test results

User experience research

User convenience survey

Case analysis of practical applications

Discussion

Advantages and limitations of the method

Application prospects and future research directions

Conclusion

Additional Information and Declarations

Competing Interests

Author Contributions

Data Availability

Funding

The authors received no funding for this work.

 

References

  • Agache ABrooker MIordache ALiguori ANeugebauer RPiwonka PPopa D-M. 2020. Firecracker: lightweight virtualization for serverless applications.
  • Alpernas KFlanagan CFouladi SRyzhyk LSagiv MSchmitz TWinstein K. 2018. Secure serverless computing using dynamic information flow control. Proceedings of the ACM on Programming Languages 2(OOPSLA):126
  • Alzayat MMace JDruschel PGarg D. 2023. Groundhog: efficient request isolation in faas.
  • Barrak AFofe GMackowiak LKouam EJaafar F. 2024. Securing AWS lambda: advanced strategies and best practices.
  • Calles MA. 2020. Serverless security: understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud
  • Datta PKumar PMorris TGrace MCRahmati ABates A. 2020. Valve: securing function workflows on serverless computing platforms.
  • de Oliveira A. 2022. Securing weak points in serverless architectures. Resources Trend Micro131
  • Eismann SScheuner JVan Eyk ESchwinger MGrohmann JHerbst NAbad CLIosup A. 2020. A review of serverless use cases and their characteristics. ArXiv
  • Govind HGonzález–Vélez H. 2021. Benchmarking serverless workloads on kubernetes.
  • Jegan DSWang LBhagat SRistenpart TSwift M. 2020. Guarding serverless applications with seclambda. Arxiv
  • Kritikos KSkrzypek P. 2018. A review of serverless frameworks.
  • Li ZCheng JChen QGuan EBian ZTao YZha BWang QHan WGuo M. 2022. RunD: a lightweight secure container runtime for high-density deployment and high-concurrency startup in serverless computing.
  • Li XLeng XChen Y. 2022. Securing serverless computing: challenges, solutions, and opportunities. IEEE Network 37(2):166173
  • Ouyang RWang JXu HChen SXiong XTolba AZhang X. 2023. A microservice and serverless architecture for secure IoT system. Sensors 23(10):4868
  • OWASP Foundation. 2018. OWASP Serverless Top 10: Serverless Interpretation. (accessed 1 July 2025)
  • Sabbioni AMazzocca CColajanni MMontanari RCorradi A. 2022. A fully decentralized architecture for access control verification in serverless environments.
  • Sankaran ADatta PBates A. 2020. Workflow integration alleviates identity and access management in serverless computing. In: Annual Computer Security Applications Conference, ACSA’20. New York, USA: Association for Computing Machinery496509
  • Wang DChen XWang QWang SXu FZheng T. 2022. Autoscaling cracker: an efficient asymmetric ddos attack on serverless functions.
  • Zhang TXie DLi FStutsman R. 2019. Narrowing the gap between serverless and its state with storage functions.
WhatsApp