Page 859 - Cloud computing: From paradigm to operation
P. 859

Intercloud and interoperability                                     5


            It is required that a CSP avoids unauthorised use or modifications of a CSC’s VM state, service data or CSC
            data by other CSCs.


            8       Security considerations
            Security aspects for consideration within the cloud computing environment, including inter-cloud computing,
            are  described  in  [ITU-T  X.1601]  which  analyses  security  threats  and  challenges,  and  describes  security
            capabilities that could mitigate these threats and meet these security challenges.















































































                                                                                                         851
   854   855   856   857   858   859   860   861   862   863   864