Page 729 - Cloud computing: From paradigm to operation
P. 729

XaaS                                                     3


            8.2     Performance

            Referring to [ITU-T Y.3502], this Recommendation identifies additional performance metrics and indicators
            relating to the operation of a big data service, such as:
            –       realtime performance metrics, such as automatic fault tolerance and database extensibility;
            –       elastic calculation performance indicators, such as connections per second and packets per second;
            –       storage performance indicators, such as bandwidth and input/output preferences per second;
            –       data disaster tolerance performance indicators including recovery point indicator.


            9       Security considerations
            Security  aspects  for  consideration  within  the  cloud  computing  environment,  especially  for  BDaaS,  are
            addressed by security challenges for CSPs, as described in [b-ITU-T X.1601]. In particular, [b-ITU T X.1601]
            analyses security threats and challenges, and describes security capabilities that could mitigate these threats
            and meet the security challenges.
            [b-ITU-T X.1631] provides guidelines supporting the implementation of information security controls for CSCs
            and CSPs. Many of the guidelines guide the CSPs to assist the CSCs in implementing the controls, and guide
            the  CSCs  to  implement  such  controls.  Selection  of  appropriate  information  security  controls,  and  the
            application of the implementation guidance provided, will depend on a risk assessment as well as any legal,
            contractual, regulatory or other cloud-sector specific information security requirements.
            It is also recommended that the guidelines for CSC data security described in [b-ITU-T X.1641] are considered.
            It provides generic security guidelines for the CSC data in cloud computing, analyses the CSC data security
            life-cycle and proposes security requirements at each stage of the data life-cycle.



















































                                                                                                         721
   724   725   726   727   728   729   730   731   732   733   734