Page 529 - Cloud computing: From paradigm to operation
P. 529
Cloud Computing management 2
1) The CSP designs and creates the NaaS service operational policy data model on NPAP.
2) The NPAP requests the NPIP to store the newly created NaaS service operational policy data model.
3) The NPIP sends an acknowledgement to the NPAP.
4) The NPIP stores the newly created NaaS service operational policy data model in the repository.
5) The NPDP requests the NaaS service operational policy data model from the NPIP for decision.
6) The NPIP sends an acknowledgement to the NPDP.
7) The NPDP decides how to deal with the NaaS service operational policy data model.
8) The NPDP distributes the NaaS service operational policy data model to the NPEP which
subscribed it.
9) The NPEP sends an acknowledgement to the NPDP.
10) The NPEP enforces the NaaS service operational policy data model once it is triggered.
10 Security considerations
Security aspects for consideration within the cloud computing environment, including inter-cloud computing,
are addressed by security challenges for CSPs as described in [ITU-T X.1601]. [ITU-T X.1601] analyses security
threats and challenges, and describes security capabilities that could mitigate these threats and meet the
security challenges. This Recommendation does not introduce any new security issues.
521