TY - JOUR AU1 - Chawla, Rishabh AU2 - AB - (IJACSA) International Journal of Advanced Computer Science and Applications, Rishabh Chawla The Pennsylvania State University May 2020 Abstract—Security for Serverless Systems is looked at from might leave the host machine vulnerable. Traditional security two perspectives, the server-level security managed by the infras- practices are unable to achieve the flexibility, generality and tructure company and the Application level Security managed efficiency expected by cloud providers and tenants [1]. by the tenants.The Trusted computing base for cloud systems is enormous as it encompasses all the functions running on a system. B. Application Level Security Authentication for systems is mostly done using ACL. Most Serverless Systems share data and thus, ACL isn’t sufficient. IFC Users express their applications as collections of func- using appropriate label design can enforce continuously through- tions triggered in response to user requests or calls by other out the application. IFC can be used to increase confidence functions. With serverless systems the use of third party between functions with other functions and cloud provider and also mitigate security vulnerabilities making the system safer. A services has increased which in turn increases the risk of data survey of the present IFC implementations for Serverless Systems vulnerability during communication, the TI - Information Flow Control for Serverless Systems JF - International Journal of Advanced Computer Science and Applications DO - 10.14569/ijacsa.2021.0120901 DA - 2021-01-01 UR - https://www.deepdyve.com/lp/unpaywall/information-flow-control-for-serverless-systems-1FmKMAFCkT DP - DeepDyve ER -