Page 1114 - Cloud computing: From paradigm to operation
P. 1114

8                                            Assisting developing countries


             Case study: Network connectivity at Tunisie Télécom's Carthage Data Centre

             In  order  to  ensure  performance,  security  and  availability  of  cloud  services,  Carthage  Data  Centre  is
             connected with two different high-speed fibre links to Tunisie Télécom's IP MPLS Backbone (10 Gbits/link).
             The two links are completely different in order to guarantee redundancy and access continuity without
             any interruption (different access points at the data centre level, different paths to the IP MPLS Backbone,
             different PoP's locations, etc.).
             Carthage Data Centre is also interconnected with the two other data centres of Tunisie Télécom (Kairouan
             Data Centre for disaster recovery, and Kasba Data Centre).
             Besides, Tunisie Telecom has deployed all means (VRF, VLAN, Firewalls, anti-DDos protection, etc.) and
             procedures to prohibit any fraudulent connection on the private networks of customers.


            8.6     Trust
            One of the issues affecting the implementation of cloud computing services in developing countries relates
            to the mistrust of cloud computing services, which in its nature generally puts a curtain wall between the CSP
            and the CSC. Potential users of cloud computing services will accept the "curtain wall" if there is strong
            evidence that the CSP on the other side of the "curtain" can be trusted. For that to happen there should be
            conditions which must be agreed upon and met by the CSP to assure the CSC that they can be trusted.
            The development of those conditions and the framework of meeting them can be complicated if left up to
            the CSP and CSC to handle. However, if the efforts of international standardization organizations such as ITU
            produces recommendations on trust, both the CSP and CSC are more likely to feel comfortable to work with
            such recommendations.

            The  current  cloud  computing  trust  and  security  issues  are  closely  related.  In  fact  the  uptake  of  cloud
            computing services in developing countries can suddenly increase by merely making stakeholders aware that
            issues of trust are different from those to do with security and show them how they are handled without
            confusing the two.
            The ITU has already developed Recommendations such as [ITU-T Y.3514], "Cloud Computing – Trusted inter-
            cloud computing framework and requirements". This Recommendation  specifies a framework of trusted
            inter-cloud computing and relevant use cases. It provides general requirements for trusted inter-cloud and
            specific ones related to governance, management, resiliency, security and confidentiality of trusted inter-
            clouds on security in the cloud. It is based on the framework of inter-cloud computing [ITU-T Y.3511].
            The scope of this Recommendation includes:

            –       overview of trusted inter-cloud computing;
            –       general requirements for trusted inter-cloud;
            –       requirements for governance of trusted inter-cloud;
            –       requirements for management of trusted inter-cloud;
            –       requirements for resiliency of trusted inter-cloud; and
            –       requirements for security and confidentiality of trusted inter-cloud.

            There are other closely related recommendations that ITU-T has developed which are very relevant to issues
            of trust of the cloud. These include:
            •       [ITU-T  Y-3051]  "The  basic principles  of  trusted  environment  in  information  and  communication
                    technology infrastructure" which is devoted to the issue of creating trusted environment in ICT
                    infrastructure providing information and communication services. The Recommendation provides
                    the definition, common requirements and the basic principles of creating trusted environment.
            •       [ITU-T  Y.3052]  "Overview  of  trust  provisioning  for  information  and  communication  technology
                    infrastructures and services" which provides an overview of trust provisioning in ICT infrastructures
                    and services. It introduces the necessity of trust to cope with potential risks due to lack of trust.



            1106
   1109   1110   1111   1112   1113   1114   1115   1116   1117   1118   1119