Cloud Computing
Cloud Computing
Data Science
Instructor: Sir Nusratullah
Sec A
Submitted By
Abdul Moeed B-26546 Fall 2021-2025
Ahmad Usman B-26763 Fall 2021-2025
Haider Ali B-26714 Fall 2021-2025
1|Page
Title: Serverless Computing: A Comprehensive Analysis of Benefits and
Challenges
Abstract
Introduction
2|Page
Problem Statement
Research Questions
Research Objectives
3|Page
Scope and Limitations
The study examines peer-reviewed papers from 2023 to 2025, covering economic,
operational, and technical aspects of serverless computing. While the scope
includes performance benchmarks, cost implications, and security paradigms, it
excludes in-depth evaluations of vendor-specific implementations unless
generalizable insights are provided. Limitations include the rapidly evolving nature
of serverless technologies and reliance on published literature, which may not fully
reflect the state-of-the-art practices employed in cutting-edge commercial systems.
Additionally, due to the heterogeneity in cloud environments, results may vary
across different organizational contexts.
Literature Review
Key Characteristics
SLR Protocol
Search Strategy:
Searches were conducted using Google Scholar, IEEE Xplore, SpringerLink, ACM
Digital Library, and Elsevier. Keywords included “serverless computing,” “FaaS,”
“benefits,” “challenges,” “cold start,” “vendor lock-in,” “security,” and “multi-
cloud.”
5|Page
Inclusion Criteria:
Exclusion Criteria:
Quality Assessment:
Each study was reviewed for research rigor, methodology transparency, impact
relevance, and clarity. High-quality studies employed case studies, empirical data,
or quantitative performance evaluations.
6|Page
Security Paradigms and Privacy Challenges
Security in serverless is complex due to the ephemeral and distributed nature of
function execution. Functions often require access to various resources via IAM
roles, expanding the attack surface. Isolation between functions is crucial, yet not
always clearly enforced. Moreover, debugging security incidents can be difficult
due to transient logs and limited visibility.
7|Page
Theoretical Frameworks for Adoption
Comparative Analysis
Traditional
Metric Serverless
Infrastructure
Scalability Automatic Manual scaling
Cost Model Pay-per-use (OpEx) CapEx-heavy
Deployment Time Minutes Days to weeks
Maintenance Cloud-managed Organization-managed
Security High (shared
Moderate
Complexity responsibility)
Flexibility High (event-driven) Moderate
Observability
Evolving Mature
Tools
Discussion
8|Page
Interpretation of Key Findings
Practical Implications
Organizations can use serverless to drive innovation but must adopt mitigation
strategies:
Conclusion
Serverless computing revolutionizes how applications are built and deployed. Its
core advantages in cost, scalability, and development speed make it attractive for
modern IT environments. However, its limitations necessitate caution and strategic
planning. The study underscores that successful serverless adoption requires
addressing its challenges through optimized architecture, security posture
management, and investment in developer tooling.
9|Page
1. Developing standard benchmarks for evaluating serverless performance
across providers.
2. Investigating observability frameworks tailored for distributed serverless
workflows.
3. Exploring hybrid-cloud and edge integration scenarios.
4. Analyzing long-term cost implications of serverless in enterprise-scale
deployments.
5. Creating formal security models for event-driven function chains.
References
10 | P a g e