Page 608 - Cloud computing: From paradigm to operation
P. 608
3 XaaS
9.5.6 Reference points within VDRM-FS
I_UAPM_OPM reference point between UAPM-F and OPM-F. CSU's account information is
communicated through this reference point.
I_UAPM_RAD reference point between UAPM-F and RAD-F. CSU'S account information is sent from
UAPM-F to RAD-F though this reference point.
I_OPM_PM reference point between OPM-F and PM-F. The PM-F delivers the power performance
to OPM-F to establish a policy through this reference point.
I_OPM_RAD reference point between OPM-F and RAD-F. Operational policy information is delivered
from the OPM-F to the RAD-F through this reference point.
I_OPM_MC reference point between OPM-F and MC-F. The MC-F sends resource states to the
OPM-F through this reference point.
I_RAD_MC reference point between RAD-F and MC-F. The MC-F sends resource usage to the RAD-F
through this reference point.
I_MC_HA reference point between MC-F and HA-F. The MC-F sends resource states to the HA-F
through this reference point.
I_MC_PM reference point between MC-F and PM-F. The MC-F sends monitoring information to the
PM-F through this reference point.
9.5.7 Reference points within VI-FS
I_IAM_RA reference point between IAM-F and RA-F. The resource allocation and distribution is
forwarded to the RA-F through this reference point.
I_PE_PV reference point between PE-F and PV-F. The configuration to enhance the performance
of virtualization platform is sent to the PV-F through this reference point.
I_RA_PV reference point between RA-F and PV-F. The resource assignment is sent to the PV-F
through this reference point.
I_IAM_PV reference point between IAM-F and PV-F. The monitoring information and controls are
transmitted through this reference point.
10 Security considerations
Security aspects for consideration within DaaS are addressed by security challenges for CSPs and CSCs, as
described in [ITU-T X.1601]. In particular, [ITU-T X.1601] analyses security threats and challenges, and
describes security capabilities that could mitigate these threats and meet security challenges.
It is recommended that relevant security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and applicable
ITU-T X-series, ITU-T Y-series and ITU-T M-series of Recommendations be taken into consideration, including
access control, authentication, data confidentiality, data retention policy, network security, data integrity,
availability and privacy.
600