Page 859 - Cloud computing: From paradigm to operation
P. 859
Intercloud and interoperability 5
It is required that a CSP avoids unauthorised use or modifications of a CSC’s VM state, service data or CSC
data by other CSCs.
8 Security considerations
Security aspects for consideration within the cloud computing environment, including inter-cloud computing,
are described in [ITU-T X.1601] which analyses security threats and challenges, and describes security
capabilities that could mitigate these threats and meet these security challenges.
851