itu t focus group cloud computing l.
Skip this Video
Loading SlideShow in 5 Seconds..
ITU-T Focus Group Cloud Computing PowerPoint Presentation
Download Presentation
ITU-T Focus Group Cloud Computing

Loading in 2 Seconds...

play fullscreen
1 / 10

ITU-T Focus Group Cloud Computing - PowerPoint PPT Presentation

Download Presentation
ITU-T Focus Group Cloud Computing
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. ITU-T Focus Group Cloud Computing Victor Kutukov Chair December 7 2010

  2. Management & Structure • Management team • Chairman: Victor Kutukov (Russia) • Vice-Chairman: Jamil Chawki (France Telecom Orange, France) • Vice-Chairman: Kangchan Lee (ETRI, Korea) • Vice-Chairman: Mingdong Li (ZTE, China) • Vice-Chairman: Monique Morrow (Cisco Systems, USA) • Vice-Chairman: Koji Nakao (KDDI, Japan) • Structure: Two Working Groups covering several Working Areas • WG1: Cloud computing benefits & requirementsWA 1-1 Cloud Definition, Ecosystem & TaxonomyWA 1-2 Uses cases Requirements & ArchitectureWA 1-3 Cloud securityWA 1-4 Infrastructure & Network enabled CloudWA 1-5 Cloud Services & Resource Management, Platforms and MiddlewareWA 1-6 Cloud computing benefits & Requirements from ICT perspectives • WG2: Gap Analysis and Roadmap on Cloud Standards development in ITU-TWA 2-1 Overview of cloud computing SDOs activitiesWA 2-2 Gap analysis & Action plan for development of relevant ITU-T Cloud Standard

  3. Threats for Cloud Users Lack of trusting cloud provider's security level Lack of Information/Asset Management Data loss and leakage Loss of Account/Service management

  4. Threats for Cloud Service Providers Abuse and Nefarious Use of Cloud Computing Insecure interfaces and APIs Malicious insider Impact of compromising the provisioning service Isolation management / data multi-tenancy Storage controller (Single point of failure / compromise) Exposure of data to foreign governments Application multi-tenancy Reliance on hypervisors Process isolation / Application sandboxes Additional risk when integrated with customer applications Needs certification and accreditation as a separate application Software code updates Virtual zoning with application mobility

  5. Status from Meeting 3 • We received 35 contributions with focus in orchestration; cloud management; cloud security; cloud broker functionality and cloud benefits • These contributions were towards the five output documents produced in the second meeting • A clear process and work plan for the FG Cloud activities and deliverables was defined in order to prepare the first FG Cloud report to be submitted to the next TSAG meeting of Feb 2011

  6. Output Documents • Introduction to the cloud ecosystem: definitions, taxonomies, use cases, high level requirements and capabilities. The scope of this deliverable is to provide an introduction to the Cloud ecosystems, focusing on integration and support of Cloud Computing model and technologies in telecommunication ecosystems. The major changes include the addition of the value proposition, requirements and capabilities clauses. • Functional requirements and reference architecture. The scope of this deliverable is to define the functional requirement and reference architecture of cloud computing, which includes the functional architecture, functional entities and reference points. • Overview of SDOs involved in cloud computing. The scope of this document is to provide an overview of SDOs; to map the FG cloud working group and output documents to these SDOs ; and , to be as a base to produce a gap analysis that will result in a unique areas that can be under the ITU-T purview, specifically from telecom perspective. • Cloud security, threat & requirements: Security Cloud has started to be discussed from reviews of other SDOs which are related Cloud Security activities in CSA, DMTF, CloudAudit, NIST, GICTF, etc. After the observation of the existing activities, the FG Cloud tentatively identify security threats from view points of Cloud user and Cloud service provider. Considering the identified security threats, the FG Cloud also studied security requirements to be considered for Cloud Computing Technology. • Infrastructure and network enabled cloud. Position existing network infrastructure capability is a unique opportunity for service providers to provide bundled offers combining Network and IT resources. In addition, service providers can leverage their network asset to address network availability and performance for secure end to end cloud services. Another opportunity for service providers is to evolve network resource allocation and control to more dynamic in order to meet the needs to provision on-demand cloud services.

  7. Work Plan

  8. Meeting 4 • Dates: Jan 10 - 13 2011 • Place: Nanjing, PRC • Important topics: • Draft cloud benefits from Telecom perspectives • Draft for review of Cloud networking and Security documents • TSAG Report (Feb 2011 meeting)

  9. Cloud Services Middleware Platform ITU-T Positioning Cloud ”Portal” Inter Cloud W3C, IETF GICTF-ITU-T DMTF, SNIA E-1 E-3 E-2 BSS/OSS PaaS IaaS & NaaS CaaS SaaS TMF CSA DMTF OGF TMF CRM & Billing Security Service provisioning I-1 IETF, ITU-T ? DMTF-OVF SNIA? I-4 I-2 I-3 Virtualization Layer Compute Monitoring & system management Storage Networks Physical Resources General Requirements & Enabling Technologies ISO, OMG, Open Source..

  10. Thank you for your attention