Confidential computing for serverless workloads: Secure and scalable data processing in untrusted environments

Shah, Samarth and Choksi, Neil (2025) Confidential computing for serverless workloads: Secure and scalable data processing in untrusted environments. World Journal of Advanced Engineering Technology and Sciences, 14 (3). 086-104. ISSN 2582-8266

[thumbnail of WJAETS-2025-0067.pdf] Article PDF
WJAETS-2025-0067.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 755kB)

Abstract

Confidential Computing for Serverless Workloads: Secure and Scalable Data Processing in Untrusted Environments As the adoption of serverless architectures grows, the need to address data privacy and security concerns in cloud-based environments becomes critical. Serverless workloads, by design, allow developers to focus on code without managing infrastructure, leading to operational efficiency and scalability. However, this model introduces challenges related to the trustworthiness of the cloud provider, where sensitive data may be exposed to malicious actors within the system. Confidential computing, a new paradigm that leverages hardware-based trusted execution environments (TEEs), offers a solution by enabling secure processing of sensitive data even in untrusted environments. This paper explores the integration of confidential computing with serverless workloads to provide secure data processing while maintaining scalability and performance. By utilizing TEEs such as Intel SGX, confidential computing ensures that data remains encrypted during processing, mitigating risks of data leaks and attacks such as side-channel and privilege escalation. The paper investigates how serverless platforms can leverage confidential computing to safeguard both user data and application logic while enabling the flexibility and elasticity inherent in serverless architectures. We discuss the challenges of implementing confidential computing in serverless environments, including compatibility with existing frameworks, performance overhead, and regulatory concerns. The potential for improved data privacy and compliance in industries such as finance, healthcare, and government is also highlighted, showcasing how this technology can address the growing need for secure cloud computing solutions.

Item Type: Article
Official URL: https://doi.org/10.30574/wjaets.2025.14.3.0067
Uncontrolled Keywords: Confidential computing; Serverless workloads; Data privacy; Scalable architecture; Untrusted environments; Trusted execution environments (TEEs); Intel SGX; Secure data processing; Cloud security; Performance overhead; Data encryption; Cloud computing solutions; Regulatory compliance
Depositing User: Editor Engineering Section
Date Deposited: 25 Jul 2025 16:13
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/2488