Page 858 - Cloud computing: From paradigm to operation
P. 858

5                                            Intercloud and interoperability


            The inter-cloud computing functional architecture [ITU-T Y.3516] identifies inter-cloud specific extensions to
            functional components that are part of integration, security systems, operations support systems (OSSs) and
            business support systems (BSSs). For trusted inter-cloud, it defines a function called trust management. The
            trust management functionalities (see clause 6.2 of [ITU-T Y.3514]) are supported by the "authorization and
            security policy management" functional component within the multi-layer functions of the cloud computing
            reference architecture [ITU-T Y.3502]. Inter-cloud trust management can be realized using above functional
            components and functionalities. Inter-cloud trust management is also supported by functional components
            for  managing  isolation  and  security  mechanisms,  these  functional  components  located  in  the
            "security systems" of the cloud computing reference architecture, as well.
            This Recommendation is based on the functions defined in [ITU-T Y.3502], [ITU-T Y.3516] and [ITU-T Y.3514].
            This  Recommendation  focuses  on  the  trust  management  model  and  requirements  in  an  inter-cloud
            environment based on the establishment of relationships (patterns) among multiple peer CSPs, including
            peering, federation and intermediary which are defined in [ITU-T Y.3511].


            7       Requirements for inter-cloud trust management

            This clause identifies requirements applicable to inter-cloud trust management.

            7.1     Inter-cloud trust policies and credentials
            It is recommended that a CSP provides specification of policies and credentials used for trust management.

            It is recommended that a CSP implements a trust management system to evaluate whether the provided
            credentials satisfy the specified policy.


            7.2     Inter-cloud reputation scoring
            It  is  recommended  that  a  CSP  uses  a  trust  scheme  to  evaluate  whether  other  CSPs  among  inter-cloud
            relationships fulfil trust management requirements.
            It is recommended that a CSP evaluate other CSPs among inter-cloud relationships to create and update
            reputation scoring of CSPs.

            7.3     Inter-cloud reputation-based trust evaluation
            It is recommended that a CSP has a trust evaluation system to manage other CSPs' reputations.

            It is recommended that a CSP supports query and compares reputation of other CSPs from a third- party trust
            evaluation system.

            7.4     SSO authentication
            It is recommended that a CSP supports an SSO mechanism to enable a CSC’s access to various services offered
            by different CSPs once it is successfully authenticated by inter-cloud.

            7.5     Periodical verification
            It is recommended that a CSP supports a periodical verification mechanism to check if a CSC still has the
            privilege of accessing the CSP's service.

            7.6     Control privilege for VM and data

            It is recommended that a CSP avoids inspection or analysis of a CSC's data and VM instances without explicit
            CSC consent.

            It  is  recommended  that  a  CSP  supports  fine-grained  CSC  control  over  protection  of  its  cloud  resources
            according to a given security SLA.







            850
   853   854   855   856   857   858   859   860   861   862   863