Kubernetes for Cloud-Native Computing: A Comprehensive Analysis of Scalability, Security, and Performance Challenges

Authors

  • Harinath Vaggu Cloud architect, India. Author

DOI:

https://doi.org/10.63282/3050-9416.IJAIBDCMS-V6I2P104

Keywords:

Kubernetes, Cloud-native Computing, Container Orchestration, Scalability, Security, Performance, Microservices, DevOps

Abstract

Containerization and microservices are the core concepts that enabled cloud- native computing as a new way of delivering applications. Kubernetes is an open-source tool that can be considered as a platform for container orchestration and it is widely used currently. In this paper, a summary of scalability, security and performance concerns of Kubernetes are discussed in detail. The strength and limitation of Kubernetes are explored based on studies, and theoretical and experimental work is done in the large-scale cloud environment. This paper identifies several priorities and weighs potential solutions if Kubernetes is to be used in large scale contexts. It is also worthwhile to provide an experimental analysis of Kubernetes scaling and performance increase in focused scenarios. Possible directions and further improvements are also considered and proposed for future studies as well as the security improvement concerns

References

[1] Shamim, M. S. I., Bhuiyan, F. A., &Rahman, A. (2020). Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices. 2020 IEEE Secure Development (SecDev), 58-64.

[2] Minna, F., Blaise, A., Rebecchi, F., Chandrasekaran, B., &Massacci, F. (2021). Understanding the security implications of kubernetes networking. IEEE Security & Privacy, 19(5), 46-56.

[3] Revuelta Martinez, Á. (2023). Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities.

[4] Vayghan, L. A., Saied, M. A., Toeroe, M., &Khendek, F. (2019). Kubernetes as an availability manager for microservice applications. arXiv preprint arXiv:1901.04946.

[5] Patan, L. (2024). Leveraging cloud-native architecture for scalable and resilient enterprise applications: A comprehensive analysis. International Journal of Computer Engineering And Technology (IJCET), 15(5), 583-591.

[6] Nascimento, B., Santos, R., Henriques, J., Bernardo, M. V., &Caldeira, F. (2024). Availability, scalability, and security in the migration from container-based to cloud-native applications. Computers, 13(8), 192.

[7] Burns, B., Beda, J., Hightower, K., &Evenson, L. (2022). Kubernetes: up and running: dive into the future of infrastructure. “O’Reilly Media, Inc.".

[8] Beltre, A. M., Saha, P., Govindaraju, M., Younge, A., & Grant, R. E. (2019, November). Enabling HPC workloads on cloud infrastructure using Kubernetes container orchestration mechanisms. In 2019 IEEE/ACM International Workshop on Containers and New Orchestration Paradigms for Isolated Environments in HPC (CANOPIE-HPC) (pp. 11-20). IEEE.

[9] Senjab, K., Abbas, S., Ahmed, N., & Khan, A. U. R. (2023). A survey of Kubernetes scheduling algorithms. Journal of Cloud Computing, 12(1), 87.

[10] Kampa, S. (2024). Navigating the Landscape of Kubernetes Security Threats and Challenges. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 3(4), 274-281.

[11] Curtis, J. A., &Eisty, N. U. (2024). The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions. arXiv preprint arXiv:2409.04647.

[12] Rahman, A., Shamim, S. I., Bose, D. B., &Pandita, R. (2023). Security misconfigurations in open source kubernetes manifests: An empirical study. ACM Transactions on Software Engineering and Methodology, 32(4), 1-36.

[13] Nocentino, A. E., Weissman, B., Nocentino, A. E., &Weissman, B. (2021). Kubernetes architecture. SQL Server on Kubernetes: Designing and Building a Modern Data Platform, 53-70.

[14] Chen, C. C., Hung, M. H., Lai, K. C., & Lin, Y. C. (2021). Docker and Kubernetes. Industry 4.1: Intelligent Manufacturing with Zero Defects, 169-213.

[15] Lu, X., Ma, R., Wang, C., & Yao, W. (2016). Performance analysis of a lunar based solar thermal power system with regolith thermal storage. Energy, 107, 227-233.

[16] Mendecka, B., Cozzolino, R., Leveni, M., & Bella, G. (2019). Energetic and exergetic performance evaluation of a solar cooling and heating system assisted with thermal storage. Energy, 176, 816-829.

[17] Kumar, R., &Trivedi, M. C. (2021). Networking analysis and performance comparison of Kubernetes CNI plugins. In Advances in Computer, Communication and Computational Sciences: Proceedings of IC4S 2019 (pp. 99-109). Springer Singapore.

[18] Sasturkar, A., Yang, P., Stoller, S. D., &Ramakrishnan, C. R. (2011). Policy analysis for administrative role-based access control. Theoretical Computer Science, 412(44), 6208-6234.

[19] Stoller, S. D., Yang, P., Ramakrishnan, C. R., &Gofman, M. I. (2007, October). Efficient policy analysis for administrative role based access control. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 445-455).

[20] Li, N., &Tripunitara, M. V. (2006). Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC), 9(4), 391-420.

[21] Nazerian, F., Motameni, H., &Nematzadeh, H. (2019). Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy. Journal of information security and applications, 45, 131-142.

Downloads

Published

2025-06-30

Issue

Section

Articles

How to Cite

1.
Vaggu H. Kubernetes for Cloud-Native Computing: A Comprehensive Analysis of Scalability, Security, and Performance Challenges. IJAIBDCMS [Internet]. 2025 Jun. 30 [cited 2025 Sep. 14];6(2):30-9. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/142