Page 493 - Cloud computing: From paradigm to operation
P. 493

Cloud Computing management                                          2


            •       It is recommended that the cloud computing platform supports workload portability and related
                    management capabilities (e.g., control, operation and monitoring) amongst cloud service providers,
                    supporting various cloud deployment models [ITU-T Y.3500], in a cost effective way.


            8       Cloud resource management for emergency telecommunications
            Emergency telecommunications (ET) [b-ITU-T Y.2205] are any emergency related service that requires special
            handling  relative  to  other  services  (i.e.,  priority  access  for  authorized  users  and  priority  treatment  to
            emergency traffic).

            While  not  always  required,  if  the  resources  of  the  CSP  are  used  to  support  the  emergency
            telecommunications  service  (ETS)  [b-ITU-T  E.107],  appropriate  resource  management  functions  will  be
            needed to allow priority treatment in the use of the cloud computing resources by authorized users. The
            requirements in [b-ITU-T Y.1271] are relevant.
            NOTE – Requirements in [b-ITU-T Y.1271] apply across multiple layers of the cloud computing reference architecture
            [ITU-T Y.3502].

            9       Security considerations

            The security framework from cloud computing [ITU-T X.1601], analyses security threats and challenges in the
            cloud  computing  environment  and  describes  security  capabilities  that  could  mitigate  these  threats  and
            address security challenges. The single cloud and multi-cloud resource management framework described in
            this Recommendation is based on the interconnections within a single cloud service provider or between two
            or more cloud computing systems operated by different service providers. Thus, secure interconnection
            within and across the systems should be considered. Protection of internal management system interfaces
            and information against unauthorized access, internally or by an external interconnected entity, should also
            be considered. Exposed internal and external management interfaces should also be security protected. It is
            recommended  that  the  applicable  X,  Y  and  M  series  of  ITU-T  security  Recommendations  be  taken  into
            consideration, including access control, authentication, data confidentiality, communications security, data
            integrity, availability and privacy.











































                                                                                                         485
   488   489   490   491   492   493   494   495   496   497   498