Page 529 - Cloud computing: From paradigm to operation
P. 529

Cloud Computing management                                          2


            1)      The CSP designs and creates the NaaS service operational policy data model on NPAP.

            2)      The NPAP requests the NPIP to store the newly created NaaS service operational policy data model.
            3)      The NPIP sends an acknowledgement to the NPAP.
            4)      The NPIP stores the newly created NaaS service operational policy data model in the repository.
            5)      The NPDP requests the NaaS service operational policy data model from the NPIP for decision.
            6)      The NPIP sends an acknowledgement to the NPDP.
            7)      The NPDP decides how to deal with the NaaS service operational policy data model.

            8)      The  NPDP  distributes  the  NaaS  service  operational  policy  data  model  to  the  NPEP  which
                    subscribed it.
            9)      The NPEP sends an acknowledgement to the NPDP.

            10)     The NPEP enforces the NaaS service operational policy data model once it is triggered.


            10      Security considerations
            Security aspects for consideration within the cloud computing environment, including inter-cloud computing,
            are addressed by security challenges for CSPs as described in [ITU-T X.1601]. [ITU-T X.1601] analyses security
            threats and challenges, and describes security capabilities that could mitigate these threats and meet the
            security challenges. This Recommendation does not introduce any new security issues.

























































                                                                                                         521
   524   525   526   527   528   529   530   531   532   533   534