Cloud computing

Available (315)

Showing 169 - 180 per page



Cloud Computing -Functional requirements of cloud service partner for multi-cloud

The purpose of this Recommendation is to describe the overview of multi-cloud and the functional requirements of cloud service partner for supporting multi-cloud by identifying the various use cases related with usage of multi-cloud in terms of cloud service customer, cloud service provider and cloud service partner. It also provides the cloud computing activities to support multi-cloud as sub-role of cloud service partner by identifying the relationships and interactions among cloud service customer, cloud service provider and other cloud service partner.

Y.mc-reqts

The framework and overview of cloud computing interoperability testing

Recommendation ITU-T Q.4040 describes the framework and provides an overview of cloud computing interoperability testing. According to the identified target areas of testing, this framework Recommendation includes an overview of cloud computing interoperability testing with common confirmed items, infrastructure capabilities type, platform capabilities type and application capabilities type interoperability testing. This Recommendation describes the overview target areas of testing for interoperability testing of cloud computing.

Q.4040

Cloud computing infrastructure capabilities interoperability testing – part 1: Interoperability testing between the CSC and CSP

Recommendation ITU-T Q.4041.1 specifies the cloud computing infrastructure capabilities type interoperability testing between the CSC and CSP, including interoperability testing of computing services, storage services, network services and related management functions, based on the functional requirements specified in Recommendation ITU-T Y.3513. The test cases of cloud computing infrastructure capabilities type interoperability testing between the CSC and CSP have also been introduced.

Q.4041.1

Cloud interoperability testing for web applications – part 1: Interoperability testing between the CSC and CSP

Cloud interoperability for web applications refers to the interaction between the cloud service customer (CSC) and the cloud service provider (CSP) to obtain predictable results, collaboration among different web applications and consistency and interoperability of a management interface across different web applications.
 
Recommendation ITU-T Q.4042.1, which is part 1, specifies the cloud interoperability test objectives for web applications between the CSC and CSP.
 
These test objectives are developed on the basis of cloud computing interoperability testing objectives specified in Recommendation ITU-T Q.4040. The test cases for cloud interoperability testing for web applications are also introduced in the appendices.

Q.4042.1

NIST Cloud Computing Security Reference Architecture

The purpose of this document is to define a NIST Cloud Computing Security Reference Architecture (NCC-SRA)--a framework that: i) identifies a core set of Security Components that can be implemented in a Cloud Ecosystem to secure the environment, the operations, and the data migrated to the cloud; ii) provides, for each Cloud Actor, the core set of Security Components that fall under their responsibilities depending on the deployment and service models; iii) defines a security-centric formal architectural model that adds a security layer to the current NIST SP 500-292, "NIST Cloud Computing Reference Architecture"; and iv) provides several approaches for analyzing the collected and aggregated data.

SP 500-299 (Draft)

Security and Privacy Controls for Federal Information Systems and Organizations

This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation from a diverse set of threats including hostile cyber attacks, natural disasters, structural failures, and human errors. The controls are customizable and implemented as part of an organization-wide process that manages information security and privacy risk. The controls address a diverse set of security and privacy requirements across the federal government and critical infrastructure, derived from legislation, Executive Orders, policies, directives, regulations, standards, and/or mission/business needs. The publication also describes how to develop specialized sets of controls, or overlays, tailored for specific types of missions/business functions, technologies, or environments of operation. Finally, the catalog of security controls addresses security from both a functionality perspective (the strength of security functions and mechanisms provided) and an assurance perspective (the measures of confidence in the implemented security capability). Addressing both security functionality and security assurance ensures that information technology products and the information systems built from those products using sound systems and security engineering principles are sufficiently trustworthy.

NIST Special Publication 800-53 Revision 4

Guide to Security for Full Virtualization Technologies

The purpose of the guide is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. All forms of virtualization other than server and desktop full virtualization are outside the scope of this document.
 
Most existing recommended security practices remain applicable in virtual environments. The practices described in this document build on and assume the implementation of practices described in other NIST publications.

NIST Special Publication 800-125

Cloud Computing Service Metrics Description

This document proposes a framework that identifies and characterizes the information and relationships needed to describe and measure properties of cloud services that are representative, accurate and reproducible. This information can be used in a variety of ways including, collection, comparison, gap analysis, and assessment or description of metrics at the technical or business levels. These metrics can connect information intended for decision-making, for the service agreements between provider and customer, for the runtime performance measurement and the underlying properties within the provider’s system.

NIST Special Publication 500-307

TOSCA Simple Profile in YAML Version 1.3

This document defines a simplified profile of the TOSCA version 1.0 specification in a YAML rendering which is intended to simplify the authoring of TOSCA service templates. This profile defines a less verbose and more human-readable YAML rendering, reduced level of indirection between different modeling artifacts as well as the assumption of a base type system.
 
The TOSCA Simple Profile in YAML specifies a rendering of TOSCA which aims to provide a more accessible syntax as well as a more concise and incremental expressiveness of the TOSCA DSL in order to minimize the learning curve and speed the adoption of the use of TOSCA to portably describe cloud applications.
 
This proposal describes a YAML rendering for TOSCA. YAML is a human friendly data serialization standard (http://yaml.org/) with a syntax much easier to read and edit than XML. As there are a number of DSLs encoded in YAML, a YAML encoding of the TOSCA DSL makes TOSCA more accessible by these communities.
 
This proposal prescribes an isomorphic rendering in YAML of a subset of the TOSCA v1.0 XML specification ensuring that TOSCA semantics are preserved and can be transformed from XML to YAML or from YAML to XML. Additionally, in order to streamline the expression of TOSCA semantics, the YAML rendering is sought to be more concise and compact through the use of the YAML syntax.

TOSCA-Simple-Profile-YAML-v1.3

Architecture for cloud storage in visual surveillance

Recommendation ITU-T H.626.2 defines a cloud storage architecture in visual surveillance. Cloud storage enables the service users to have ubiquitous, convenient and on-demand network access to a shared pool of the configurable storage resources, which can be rapidly provisioned and released with the minimal management effort or service-provider interaction. Cloud storage can realize flexible and reliable data storage for large-scale visual surveillance and its components are modularized and allocated dynamically based on the real usage. This Recommendation provides the architecture, entities, reference points and service control flow for cloud storage in visual surveillance.

ITU-T H.626.2

ISO/IEC 27017: Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services

Recommendation ITU-T X.1631 | ISO/IEC 27017 provides guidelines for information security controls applicable to the provision and use of cloud services by providing:

  • additional implementation guidance for relevant controls specified in ISO/IEC 27002;
  • additional controls with implementation guidance that specifically relate to cloud services.

This Recommendation | International Standard provides controls and implementation guidance for both cloud service providers and cloud service customers.

X.1631

Data security requirements for the monitoring service of cloud computing

Recommendation ITU-T X.1603 analyses data security requirements for the monitoring service of cloud computing which includes monitoring data scope requirements, monitoring data lifecycle, security requirements of monitoring data acquisition and security requirements of monitoring data storage. Monitoring data scope requirements include the necessary monitoring scope that cloud service providers (CSPs) should provide to maintain cloud security and the biggest monitoring scope of CSPs. Monitoring data lifecycle includes data creation, data store, data use, data migrate, data present, data destroy and data backup. Monitoring acquisition determines security requirements of the acquisition techniques of monitoring service. Monitoring data storage determines security requirements for CSPs to store the monitoring data.

X.1603