Page 810 - Cloud computing: From paradigm to operation
P. 810

5                                            Intercloud and interoperability


            Trusted  inter-cloud  resiliency  is  a  set  of  technical  procedures  (rely  on  shifting  control  and  security
            mechanisms) to:
            –       monitor CSC or CSP's environment and collect relevant data;
            –       analyse monitored data;

            –       predict faults and;
            –       mitigate or restore the cloud service parameters after service failure (related to certain equipment
                    or software functionality, laws and regulations, local policies, service contracts, etc.) and availability
                    (related to technical systems functionality).

            Complementary to trusted inter-cloud resiliency is the reliability of trusted inter-cloud. This means the ability
            of the trusted inter-cloud environment to perform and maintain under stated conditions as required for a
            specified period of time.

            6.4     Security and confidentiality of trusted inter-cloud
            The  security  and  confidentiality  of  trusted  inter-cloud  is  the  main  challenge  of  integrating  multiple  CSP
            platforms. This is necessary to provide self-service, self-managed and end-to-end security services for the
            CSC, and for the CSP to guarantee a level of confidentiality, integrity, as well as availability of services and
            resources hosted on CSP's cloud computing environments. To establish and specify trust between different
            cloud  computing  environments  as  well  as  trust  between  CSC  and  CSPs,  a  dedicated  security  and
            confidentiality terminology, together with a master service agreement (MSA) is needed.
            The security and confidentiality of trusted inter-cloud is based on distributed cloud management. It enables
            the primary CSP to provide end-to-end dynamic deployment, configuration and unified control of security
            and confidentiality of cloud services across multiple CSPs. In implementation, distributed cloud management
            supported trust can be realised by combining specialised protocol design with smart interaction with the
            underlying cloud network fabric (e.g., using software-defined networking (SDN) traffic engineering and cloud-
            tailored smart queue management).
            To  increase  security  and  confidentiality  of  trusted  inter-cloud  computing,  it  is  necessary  to  define  a
            terminology  (language)  to  annotate  (or  tag)  workloads  and  data  with  security  requirements  (such  as
            permissible storage locations). These annotations will be processed by the system during scheduling and
            migration to ensure that workload constraints are maintained. Additionally, annotation of workloads allows
            the use of appropriate network data plane mechanisms (e.g., SDN) for strong security protection and traffic
            isolation in order to ensure that the above constraints are reached when workloads are practically placed,
            executed (data accessed and stored) and migrated. Such annotation of workloads and data sets might be
            based on standards for data categorisation.
            The security and confidentiality of trusted inter-cloud is realized based on a two dimensional (vertical and
            horizontal)  model  as  follows.  The  vertical  axis  is  based  on  the  layers  of  the  cloud  computing  reference
            architecture [ITU-T Y.3502]:
            –       in  the  higher  layers  focussed  on  user-centric  security  and  confidentiality  through  a  unified
                    distribution layer for cloud resources (independently from their type and from underlying CSP), such
                    as user identity management, authentication and authorization;
            –       in the lower layers focused on provider-independent control, security and confidentiality over the
                    whole distributed inter-cloud infrastructure, such as disk and network encryption.

            The  horizontal  axis  is  based  on  the  interconnection  of  CSPs  based  on  the  inter-cloud  framework
            [ITU-T Y.3511].

            Consequently, security  and  confidentiality  of  trusted  inter-cloud  are  based  on  satisfying  both  horizontal
            (cross-provider) and vertical (cross-layer) dimensions.









            802
   805   806   807   808   809   810   811   812   813   814   815