Security Aspects in Utility Computing

Security Aspects in Utility Computing

Mayank Swarnkar, Robin Singh Bhadoria
DOI: 10.4018/978-1-4666-8853-7.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Utility computing is a need of today's cyber world and so the importance of its security is an important issue. Concerns for utility computer networks' security and dependability are growing quickly because of increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Various types of issues and its solutions regarding security in utility computing have been explained in this chapter.
Chapter Preview
Top

Introduction

In the past days when computers as well as computer users were less, the use of these machines was limited and depends on the technology. Now a day’s technology is growing rapidly so the use of computers and its peripherals. Startup companies and organizations are not so self-sufficient to buy the entire required infrastructure at a time so they take help of utility computing.

Utility computing is defined as a service provided in which service provider avails computer resource as well as infrastructure management to the customers according to need and charge them for their specific usage in place of flat rates (Klvac, 2002).

Utility computing includes computation or processing devices, storage devices including hardware and software as a meter billing service as shown in Figure 1. This repackaging of computing services became the inspiration of the shift to “on demand” computing, code as a service and cloud computing models that more propagated the thought of computing, application and network as a service (Fox and Pallickara, 2013).

Complete Chapter List

Search this Book:
Reset