Page 160 - Cloud computing: From paradigm to operation
P. 160

1                                    Framework and requirements for cloud computing


            –       History of cloud service control status validation: It is recommended that a CSN: cloud service
                    broker manage history of validation results as well as required time for completing cloud service
                    controls.
            –       Notification of result for request of cloud service control: It is recommended that a CSN: cloud
                    service broker provide notification of the result of cloud service control to a CSC.
            –       Detection of failures to meet the terms of the SLA: It is required that a CSN: cloud service broker
                    detect failures to meet the terms of the SLA through monitoring and to verify the service level.

                    NOTE 8 – To detect failures to meet the terms of the SLA, monitoring includes one or more measurable
                    information such as storage speeds, memory capacity and performance, computing speeds, network speeds,
                    service response time, etc.
                    NOTE 9 – If a failure to meet the terms of the SLA is found in the integrated cloud service, a CSN: cloud service
                    broker identifies the cloud service that caused the failure.
            –       Prevention of service termination during migration: It is recommended that a CSN: cloud service
                    broker provide postponing of the termination of a running cloud service until the CSN: cloud service
                    broker verifies ready status of a new service to prevent loss of data during migration process.

            8       Security considerations

            Security  aspects  for  consideration  within  the  cloud  computing  environment,  are  addressed  by  security
            challenges for the CSPs as described in [ITU-T X.1601]. In particular, [ITU-T X.1601] analyses security threats
            and challenges and describes security capabilities that could mitigate these threats and meet the security
            challenges.





















































            152
   155   156   157   158   159   160   161   162   163   164   165