

Identification of Security Requirements in Cloud Computing Models
Abstract
Cloud Computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common internet protocols and networking standards. The U.S National Institute of Standards and technology (NIST) defines Cloud Computing consisting of five important characteristics, three cloud service models and four deployment models. This paper analyses the security requirements in cloud computing models. It gives strategy to use service level agreements(SLA) which helps to prevent unwanted intrusion entering into cloud.SLA are common approach to specifying the exact conditions under which services are to be delivered and thus are a pre requisite for supporting the flexible trading of services.
Keywords
Cloud Computing, Deployment Models, SOA, SLA
References
U.S National Institute of standards and Technology(NIST)
(http://csrc.nist.gov/groups/sns/cloud-computing/cloud-def-v15.doc)
Cloud Security Alliance Guidance Version 2.1, 2009,
(http://www.cloudsecurityalliance.org/guidance/csaguide.pdf [3] http://www.cloudtweaks.com/tag/service-level-agreement/ [4] Service oriented Architecture http:/www.galorath.com/.../ service-oriented-archit.
W. Theilmann, R. Yahyapour, and J. Butler, Multi-level SLA Management forService-Oriented Infrastructures. Towards a Service-Based Internet (2008)324–335.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.