Security Aspects in Utility Computing

Utility computing is a need of today’s cyber world and so the importance of its security is an important issue. Concerns for utility computer networks’ security and dependability are growing quickly because of increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Various types of issues and its solutions regarding security in utility computing have been explained in this chapter.

[1]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[2]  Javier Jiménez,et al.  Network virtualization: a view from the bottom , 2009, VISA '09.

[3]  Farrukh Shahzad,et al.  State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.

[4]  John Soldatos,et al.  Convergence of Utility Computing with the Internet-of-Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[5]  John Darlington,et al.  An Architecture for a Next-Generation Internet Based on Web Services and Utility Computing , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).

[6]  Craig E. Wills,et al.  Agility in Virtualized Utility Computing , 2007, Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC '07).

[7]  G.J. Minden,et al.  A survey of active network research , 1997, IEEE Communications Magazine.

[8]  H. Madsen,et al.  Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[9]  Olav Lysne,et al.  Interconnection Networks: Architectural Challenges for Utility Computing Data Centers , 2008, Computer.