Page 305 - Cloud computing: From paradigm to operation
P. 305
Framework and requirements for cloud computing 1
occurs, the absolute controllability for a given primary CSP role, i.e., permission, is transferred to one of the
designated secondary CSPs. By transferring the responsibility of the primary CSP role with associated
management information, the service can continue even if the primary CSP's systems are seriously damaged,
e.g., due to a natural disaster or the CSP stops a service due to economic decisions (refer to use cases in
clauses I.4 and I.5). Activation of the primary CSP role delegation needs prior agreement of the CSC.
The primary CSP role delegation capability is required to:
– be activated only with the prior agreement of the CSC.
The primary CSP role delegation capability is recommended to:
– allow a CSP to discover peer CSPs that are capable of inheriting the primary CSP role, and enable the
CSP to negotiate with these peer CSPs as to whether they can accept the inheritance;
– allow a CSP to transfer its management information associated with the primary CSP role in a reliable
manner (e.g., periodically) to the peer CSPs that have accepted the permission transfer with that
CSP;
– allow the controllability of the information associated with the primary CSP role to be transferred
to the secondary CSPs with minimum interruptions;
– allow a CSP to cancel the permission transfer arrangements.
9.10 Inter-cloud service handling
The inter-cloud service handling capability deals with the primary CSP offering cloud services to its CSCs based
on the handling of services provided by the secondary CSPs. This capability can be used for inter-cloud
intermediary pattern.
The inter-cloud service handling capability is required to:
– support service intermediation, i.e., conditioning or enhancing the cloud service of a peer CSP;
– support service aggregation, i.e., providing the composition of a set of services provided by the CSPs;
– support service arbitrage, i.e., selecting one service offering from a group offered by the peer CSPs.
10 Security considerations
The security framework for cloud computing is described in [ITU-T X.1601] covering security challenges for
CSPs. In particular, [ITU-T X.1601] analyses security threats and challenges in the cloud computing
environment and describes security capabilities that could mitigate these threats and meet security
challenges.
Appendix IV identifies important aspects that should be considered when developing Recommendations
addressing inter-cloud security aspects.
297