Secure Function-as-a-Service Platforms Using Trusted Execution Environments

Authors

  • Yamini Arul Independent Researcher Woraiyur, Tiruchirappalli, India (IN) – 620003 Author

DOI:

https://doi.org/10.63345/wjftcse

Keywords:

Function as a Service, Trusted Execution Environment, Intel SGX, Serverless Security, Confidential Computing

Abstract

Function‑as‑a‑Service (FaaS) represents a paradigm shift in cloud computing, enabling developers to deploy individual functions—discrete units of computation—in an event‑driven, fully managed environment. By abstracting away server provisioning and scaling concerns, FaaS empowers rapid development cycles and cost‑efficient execution based solely on actual resource consumption. However, the very characteristics that make FaaS attractive—multi‑tenancy, ephemeral execution, and opaque provider control—also introduce significant security and privacy challenges. Specifically, untrusted infrastructures and potentially malicious insiders can exploit shared kernels, memory channels, and management APIs to tamper with function code, exfiltrate sensitive data, or compromise integrity guarantees.

Trusted Execution Environments (TEEs), such as Intel SGX and ARM TrustZone, supply hardware‑enforced isolation and cryptographic memory protection within secure enclaves, thereby mitigating these risks. This manuscript undertakes a comprehensive exploration of Secure FaaS platforms that leverage TEEs. We begin with a systematic analysis of existing designs—surveying enclave‑based FaaS prototypes, snapshot‑driven optimization techniques, and attestation infrastructures—highlighting their security properties and performance trade‑offs. Building on these insights, we propose a reference architecture that integrates rapid enclave instantiation (via snapshot pools), a heterogeneous‑TEE scheduler, and an immutable, blockchain‑backed resource ledger for accountability. We then describe our prototype implementation atop Apache OpenWhisk: featuring an in‑enclave WebAssembly runtime, CRIU‑based snapshot manager, and a gRPC‑driven attestation broker.

Through extensive experiments—covering cold‑start latency, warm‑start throughput, scaling behavior, and measurement accuracy under adversarial tampering—we demonstrate that Secure FaaS can deliver end‑to‑end confidentiality and integrity with modest overhead (average latency increase ≤ 10%) while preserving the elasticity and pay‑per‑use economics of conventional serverless platforms. We conclude by discussing deployment considerations, developer tooling requirements, and avenues for future research in confidential, accountable serverless computing.

Downloads

Download data is not yet available.

Downloads

Additional Files

Published

2025-06-02

Issue

Section

Original Research Articles

How to Cite

Secure Function-as-a-Service Platforms Using Trusted Execution Environments. (2025). World Journal of Future Technologies in Computer Science and Engineering (WJFTCSE), 1(2), Jun (12-19). https://doi.org/10.63345/wjftcse

Similar Articles

11-20 of 44

You may also start an advanced similarity search for this article.