Trending Bestseller

Journal of Ict Standardization 2-1; Special Issue on Cloud Security and Standardization

Monique J. Morrow

No reviews yet Write a Review
Paperback / softback
31 July 2014
$64.00
In Stock: Ships in 4-6 Working Days
In Stock: Ships in 7-9 Days
Hurry up! Current stock:
The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and virtualization on mobile networks and its services? What is the status of standards activities related to cloud security and these scenarios? Authors were inviteded to submit papers, on these topics for the special issue.Today's Cloud services are deployed by Cloud Service Providers (CSP) via tech- nologies and business architectures at various places in the network and consumed by customers ranging from large enterprises to consumers. Implicit is the notion of federation amongst CSPs to solve use cases such as disaster recovery, burst demands and geographical coverage, as well as federation between provider and customer, also known as hybrid cloud. Current hybrid-cloud offerings are based on static configura- tions and static business relationships between a network and a provider or a series of providers. Intercloud will add flexibility to these relationships so that cloud providers could discover services across multiple providers, agree on a common Service Level agreement or create an auction between CSPs to get the lowest price.Intercloud defines the inter-provider interface (or NNI) between CSPs. In this sense, it is complementary to OpenStack, which focuses on the user-provider in- terface (or UNI). In order to enable cloud interconnection, a complete architecture is under study, which includes a set of available technologies that will be re-used and some new technologies that are under development. The main enablers for a viable inter-cloud architecture are: the development of a service discovery mechanism amongst multiple providers and customers, enabling multiple cloud provider meta- data instantiation, an identity management mechanism between CSPs and real time billing exchange mechanisms. For the industry, as the constructs evolve to hybid and intercloud implementattions, security AND privacy capabilities will contine to be strategic. Concerns articllated in the industry include loss of control and visibility; ser- vice disruption; data security; enterprise isolation and compliance. Cryptography is a fundamental underpinning of nearly all cloud security implementations e.g. emerging homomorphic encryption. Certainly identity management across multiple clouds will also be piovotal.Various standards bodies have been focusing efforts in the development of cloud security architecture e.g• NIST, http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf;• ITU-T, http://www.itu.int/ITU-T/newslog/New+ITU+Standards+On+Cloud+Computing+Security+And+Digital+Object+Architecture.aspx; • IEEE, http://cloudcomputing.ieee.org; and so on.It is with great pleasure that we feature two articles in this special edition:1. Proposed Identity and Access Management in Future Internet (IAMFI): A Be- havioral Modeling Approach by Nancy Ambritta P., Poonam Railkar, Parik- shit N. Mahalle, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Pune, India2. Traffic Offload Guideline and Required Year of the 50% Traffic Offloading, by Shozo Komaki, Naoki Ohshima and Hassan Keshavartz. Malaysia-Japan Inter- national Institute of Technology, Universiti Teknologi Malaysia, that addresses wireless cloud and implicit security implications.One can conclude that there is quite a bit of work to do in the cloud security space We will certainly re-visit this topic with best practice guidelines.

This product hasn't received any reviews yet. Be the first to review this product!

$64.00
In Stock: Ships in 4-6 Working Days
In Stock: Ships in 7-9 Days
Hurry up! Current stock:

Journal of Ict Standardization 2-1; Special Issue on Cloud Security and Standardization

$64.00

Description

The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and virtualization on mobile networks and its services? What is the status of standards activities related to cloud security and these scenarios? Authors were inviteded to submit papers, on these topics for the special issue.Today's Cloud services are deployed by Cloud Service Providers (CSP) via tech- nologies and business architectures at various places in the network and consumed by customers ranging from large enterprises to consumers. Implicit is the notion of federation amongst CSPs to solve use cases such as disaster recovery, burst demands and geographical coverage, as well as federation between provider and customer, also known as hybrid cloud. Current hybrid-cloud offerings are based on static configura- tions and static business relationships between a network and a provider or a series of providers. Intercloud will add flexibility to these relationships so that cloud providers could discover services across multiple providers, agree on a common Service Level agreement or create an auction between CSPs to get the lowest price.Intercloud defines the inter-provider interface (or NNI) between CSPs. In this sense, it is complementary to OpenStack, which focuses on the user-provider in- terface (or UNI). In order to enable cloud interconnection, a complete architecture is under study, which includes a set of available technologies that will be re-used and some new technologies that are under development. The main enablers for a viable inter-cloud architecture are: the development of a service discovery mechanism amongst multiple providers and customers, enabling multiple cloud provider meta- data instantiation, an identity management mechanism between CSPs and real time billing exchange mechanisms. For the industry, as the constructs evolve to hybid and intercloud implementattions, security AND privacy capabilities will contine to be strategic. Concerns articllated in the industry include loss of control and visibility; ser- vice disruption; data security; enterprise isolation and compliance. Cryptography is a fundamental underpinning of nearly all cloud security implementations e.g. emerging homomorphic encryption. Certainly identity management across multiple clouds will also be piovotal.Various standards bodies have been focusing efforts in the development of cloud security architecture e.g• NIST, http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf;• ITU-T, http://www.itu.int/ITU-T/newslog/New+ITU+Standards+On+Cloud+Computing+Security+And+Digital+Object+Architecture.aspx; • IEEE, http://cloudcomputing.ieee.org; and so on.It is with great pleasure that we feature two articles in this special edition:1. Proposed Identity and Access Management in Future Internet (IAMFI): A Be- havioral Modeling Approach by Nancy Ambritta P., Poonam Railkar, Parik- shit N. Mahalle, Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Pune, India2. Traffic Offload Guideline and Required Year of the 50% Traffic Offloading, by Shozo Komaki, Naoki Ohshima and Hassan Keshavartz. Malaysia-Japan Inter- national Institute of Technology, Universiti Teknologi Malaysia, that addresses wireless cloud and implicit security implications.One can conclude that there is quite a bit of work to do in the cloud security space We will certainly re-visit this topic with best practice guidelines.

Customers Also Viewed

Buy Books Online at BookLoop

Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,

Shop Trending Books and New Releases

Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.

Shop Best Books By Collection

Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.