Open Access Open Access  Restricted Access Subscription or Fee Access

Identification of Security Requirements in Cloud Computing Models

J. Anitha Ruth, A. Meenakshi

Abstract


Cloud Computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common internet protocols and networking standards. The U.S National Institute of Standards and technology (NIST) defines Cloud Computing consisting of five important characteristics, three cloud service models and four deployment models. This paper analyses the security requirements in cloud computing models. It gives strategy to use service level agreements(SLA) which helps to prevent unwanted intrusion entering into cloud.SLA are common approach to specifying the exact conditions under which services are to be delivered and thus are a pre requisite for supporting the flexible trading of services.

Keywords


Cloud Computing, Deployment Models, SOA, SLA

Full Text:

PDF

References


U.S National Institute of standards and Technology(NIST)

(http://csrc.nist.gov/groups/sns/cloud-computing/cloud-def-v15.doc)

Cloud Security Alliance Guidance Version 2.1, 2009,

(http://www.cloudsecurityalliance.org/guidance/csaguide.pdf [3] http://www.cloudtweaks.com/tag/service-level-agreement/ [4] Service oriented Architecture http:/www.galorath.com/.../ service-oriented-archit.

W. Theilmann, R. Yahyapour, and J. Butler, Multi-level SLA Management forService-Oriented Infrastructures. Towards a Service-Based Internet (2008)324–335.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.