Computational Yoshino-Ori Folding for Secure Code Isolation in Serverless It Architectures
Keywords:
Yoshino-Ori Folding, Serverless Security, Code Isolation, Computational Origami, Multi-Tenant CloudAbstract
Scalable and event-driven application deployment Serverless computing has emerged as a new main paradigm, though it exposes sensitive workloads to security effects, such as side-channel leakage, dependency contamination and cross-tenant interference due to its shared and ephemeral execution model. The present paper introduces Computational Yoshino-Ori Folding, a new framework, which utilizes origami mathematics and origami folding geometry to serverless systems for security in terms of code isolation. The conceptualization of execution units as foldable geometric primitives by the approach ensures dynamic, hierarchical and symmetric partitions which enhance confidentiality, integrity and availability without imposing prohibitive performance overheads. The Yoshino-Ori folding abstraction is an alternative to sandboxing and microVM-based techniques that are light weights and has formalizable isolation guarantees and adaptive scalability. Some potential applications are multi-tenancy in the cloud, privacy preserving data pipelines, and infrastructures with sensitive applications that need to be run using untrusted code.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Well Testing Journal

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This license requires that re-users give credit to the creator. It allows re-users to distribute, remix, adapt, and build upon the material in any medium or format, for noncommercial purposes only.