Performance Benchmarking of Serverless vs. Container-Based Banking Workloads
Keywords:
Serverless Computing, Container Orchestration, Banking Workload Benchmarking, Cloud Performance Optimization, Scalability and Latency Analysis.Abstract
The paper is a comparative performance benchmarking experiment of serverless systems ( AWS Lambda, Azure Functions ), and formally-contained systems (Docker/Kubernetes) to significant banking workloads. The key areas of performance that are considered in the research are response time, throughput, scalability, cost-effectiveness, security compliance in financial transactions systems. Whether because of automatic scalability, rapid provisioning of systems, and low operations overhead, serverless platforms were useful to the extent of low workload that is unpredictable in pattern and has low volume of work. Conversely, container deployment was also more predictable in its operation, it was more capable of its own transaction processing and resources allocation control in the event of sustained high frequency banking processes like fraud detection, payment processing and real-time analytics. Trade off analysis was used to compare the two architectures and the result showed that the two architectures can be adjusted according to the work intensity and traffic patterns indicating that no two solutions can be used in all banking conditions. Security and regulatory compliance tests were also used to identify architectural variation that affects the needs of data isolation and PCI-DSS compliance. I propose the hybrid cloud implementation strategy as the strategy of the future study, which would be based on the findings of the experiment and that would contribute to reaching the optimal performance and decreasing the costs of the infrastructure and being regulatory compliant. The results give evidence-based recommendations to the financial institutions and the cloud architects as concerns the way they choose and create scalable, resilient and cost effective cloud infrastructures as per the current banking requirements.
Downloads
References
Yang, L.; Elisa, N.; Eliot, N. Privacy and security aspects of E-government in smart cities. In Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2019; pp. 89–102. [Google Scholar]
Jadhav, B.; Patankar, A.B. A Novel Solution for Cloud Enabled E-Governance Using Openstack: Opportunities and Challenges. In Proceedings of the International Conference on Communication, Networks and Computing, Gwalior, India, 22–24 March 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 24–36. [Google Scholar]
Capra, C.F. The Smart City and its citizens: Governance and citizen participation in Amsterdam Smart City. Int. J. E-Plan. Res. 2016, 5, 20–38. [Google Scholar] [CrossRef]
Mora, L.; Bolici, R. How to become a smart city: Learning from Amsterdam. In Proceedings of the International Conference on Smart and Sustainable Planning for Cities and Regions, Bolzano, Italy, 19–20 November 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 251–266. [Google Scholar]
Anthopoulos, L.; Sirakoulis, K. E-Government portal updates’ evaluation: A comparative analysis. In Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2015; pp. 2046–2064. [Google Scholar]
Kolsaker, A.; Lee-Kelley, L. Citizens’ attitudes towards e-government and e-governance: A UK study. Int. J. Public Sect. Manag. 2008, 21, 723–738. [Google Scholar] [CrossRef]
Elisa, N. Usability, accessibility and web security assessment of e-government websites in tanzania. Int. J. Comput. Appl. 2017, 164, 42–48. [Google Scholar] [CrossRef]
Katsikas, S.K.; Zorkadis, V. E-Democracy–Privacy-Preserving, Secure, Intelligent E-Government Services: Seventh International Conference, E-Democracy 2017, Athens, Greece, December 14–15, 2017, Proceedings; Springer: Berlin/Heidelberg, Germany, 2017; Volume 792. [Google Scholar]
Layne, K.; Lee, J. Developing fully functional E-government: A four stage model. Gov. Inf. Q. 2001, 18, 122–136. [Google Scholar] [CrossRef]
Ojo, A.; Curry, E.; Janowski, T.; Dzhusupova, Z. Designing next generation smart city initiatives: The SCID framework. In Transforming City Governments for Successful Smart Cities; Springer: Berlin/Heidelberg, Germany, 2015; pp. 43–67.
Soltesz, S.; Pötzl, H.; Fiuczynski, M.E.; Bavier, A.; Peterson, L. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, Lisbon, Portugal, 21–23 March 2007; pp. 275–287. [Google Scholar]
Merkel, D. Docker: Lightweight linux containers for consistent development and deployment. Linux J. 2014, 2014, 2. [Google Scholar]
Felter, W.; Ferreira, A.; Rajamony, R.; Rubio, J. An updated performance comparison of virtual machines and linux containers. In Proceedings of the 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Philadelphia, PA, USA, 29–31 March 2015; pp. 171–172. [Google Scholar]
Li, Z.; Cheng, J.; Chen, Q.; Guan, E.; Bian, Z.; Tao, Y.; Zha, B.; Wang, Q.; Han, W.; Guo, M. RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing. In Proceedings of the 2022 USENIX Annual Technical Conference (USENIX ATC 22), Carlsbad, CA, USA, 11–13 July 2022; pp. 53–68. [Google Scholar]
Hong, C.H.; Varghese, B. Resource management in fog/edge computing: A survey on architectures, infrastructure, and algorithms. ACM Comput. Surv. (CSUR) 2019, 52, 1–37. [Google Scholar] [CrossRef]
National Vulnerability Database. CVE-2019-5736 Detail. 2019. Available online: https://nvd.nist.gov/vuln/detail/CVE-2019-5736 (accessed on 14 April 2021).
Walsh, D.J. Are Docker Containers Really Secure? 2014. Available online: https://opensource.com/business/14/7/docker-security-selinux (accessed on 23 March 2021).
Sultan, S.; Ahmad, I.; Dimitriou, T. Container security: Issues, challenges, and the road ahead. IEEE Access 2019, 7, 52976–52996. [Google Scholar] [CrossRef]
Agache, A.; Brooker, M.; Iordache, A.; Liguori, A.; Neugebauer, R.; Piwonka, P.; Popa, D.M. Firecracker: Lightweight virtualization for serverless applications. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), Santa Clara, CA, USA, 25–27 February 2020; pp. 419–434. [Google Scholar]
gVisor: Application Kernel for Containers. Available online: https://github.com/google/gvisor (accessed on 6 May 2021).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


