Security in Cloud-Native Services: A Survey

Author:

Theodoropoulos Theodoros1ORCID,Rosa Luis2ORCID,Benzaid Chafika3ORCID,Gray Peter4,Marin Eduard5,Makris Antonios1ORCID,Cordeiro Luis2ORCID,Diego Ferran5,Sorokin Pavel4,Girolamo Marco Di6ORCID,Barone Paolo6,Taleb Tarik3ORCID,Tserpes Konstantinos1ORCID

Affiliation:

1. Department of Informatics and Telematics, Harokopio University of Athens, 17671 Athens, Greece

2. OneSource, 3030-384 Coimbra, Portugal

3. Faculty of Information Technology and Electrical Engineering, University of Oulu, 90570 Oulu, Finland

4. CloudSigma, 6300 Zug, Switzerland

5. Telefonica Research, 28050 Madrid, Spain

6. Hewlett Packard Enterprise, 20063 Milan, Italy

Abstract

Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process sensitive data that must be protected from unauthorized access. On top of that, the dynamic and scalable nature of cloud-native services makes it difficult to maintain consistent security, as deploying new instances and infrastructure introduces new vulnerabilities. To address these challenges, efficient security solutions are needed to mitigate potential threats while aligning with the characteristics of cloud-native services. Despite the abundance of works focusing on security aspects in the cloud, there has been a notable lack of research that is focused on the security of cloud-native services. To address this gap, this work is the first survey that is dedicated to exploring security in cloud-native services. This work aims to provide a comprehensive investigation of the aspects, features, and solutions that are associated with security in cloud-native services. It serves as a uniquely structured mapping study that maps the key aspects to the corresponding features, and these features to numerous contemporary solutions. Furthermore, it includes the identification of various candidate open-source technologies that are capable of supporting the realization of each explored solution. Finally, it showcases how these solutions can work together in order to establish each corresponding feature. The insights and findings of this work can be used by cybersecurity professionals, such as developers and researchers, to enhance the security of cloud-native services.

Funder

EU’s Horizon 2020

Publisher

MDPI AG

Subject

General Earth and Planetary Sciences,General Environmental Science

Reference157 articles.

1. Cloud-native applications;Gannon;IEEE Cloud Comput.,2017

2. Huang, S.Y., Chen, C.Y., Chen, J.Y., and Chao, H.C. (2023). A Survey on Resource Management for Cloud Native Mobile Computing: Opportunities and Challenges. Symmetry, 15.

3. DevOps critical succes factors—A systematic literature review;Azad;Inf. Softw. Technol.,2023

4. Beyond the Buzz: A Journey Through CI/CD Principles and Best Practices;Thatikonda;Eur. J. Theor. Appl. Sci.,2023

5. Kumar, M., Mishra, S., Lathar, N., and Singh, P. (2023). Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022, Springer Nature Singapore.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3