Page 275 - Cloud computing: From paradigm to operation
P. 275

Framework and requirements for cloud computing                              1


            The resources abstraction and control requirements include:

            •       It is recommended that abstracted resources can be accessed and provisioned in a unified manner.
            •       It is recommended that abstracted resources are discovered, used and released through unified
                    interfaces.

            •       It is recommended that abstracted resources are deployed and provisioned based on pre-defined
                    policies.
            •       It  is  required  to  provide  life-cycle  management  of  resource  templates  (e.g., resource  template
                    creation, publication, activation, revocation and deletion).
            •       A resource template can optionally be applied to a group of resources at the same time.

            •       It is required to support monitoring of all physical and virtual resources.
            •       It is recommended that resource monitoring is capable of detecting the failures of resources.


            11      Support of emergency telecommunications
            Under emergency telecommunications (ET) [b-ITU-T Y.2205], any emergency-related service is understood
            as requiring special handling relative to other services.
            If any component in the cloud infrastructure is used to support an emergency telecommunications service
            (ETS), the requirements in [b-ITU-T Y.1271] are relevant.


            12      Security considerations
            It is recommended that the security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and the applicable X,
            Y and M series of ITU-T security Recommendations be taken into consideration; this includes access control,
            authentication, data confidentiality, communications security, data integrity, availability and privacy.
            Security aspects for consideration within cloud computing environment are addressed by security challenges
            for CSPs, as described in [ITU-T X.1601]. In particular, [ITU-T X.1601] analyses security threats and challenges
            and describes security capabilities that could mitigate these threats and meet security challenges.











































                                                                                                         267
   270   271   272   273   274   275   276   277   278   279   280