Theoretical and methodological aspects of assessing the security of cloud it components according to the criteria of existing standards.
Abstract
Computing of clouds provide the admittance to the collection of computational possessions like storage of network and services. These possessions can be resealed and prompt with the minor efforts of the management because they have a scalable and dynamic environment. As a service the cloud computing offers the computing infrastructure, development of the stage as well as software and web applications like the model of pay as you go for the customers. Services are measured as the infrastructures as services (IAAS), Platform as a Service (PAAS), and the service software (SAAS) in diligence. In the research, we deliberate the Assessing the Security of Cloud It Components according to the criterion of obtainable principles. Methodology. In the advancement of the cloud computing metrics hierarchy, we covenant with the cloud computing management security with the GQM methodology. The main intention of the hierarchy proposed is to develop index for the security which entirely explained the security level in an estimate computing cloud environment. On the stride of the index for the security, we compute the index for the security to compute the allocation index. This allocation index will help in the management of the priorities set with a strong security prejudice. In this, we elucidate the slant for computingcloud management by use of security as a standard. Scientific review. The most enviable prerequisite of the computing of the cloud is to shun waste the underused possessions and mount the point of the response rate in the shortage of resources. In the latest literature in the administration field prioritization provision of the resources, we noticed that algorithm is preferred for the energy proficient management of the computing cloud environments. The metrics for the security use as instrument to provide the status about the information of security. Conclusion. In this editorial, we projected a management method for the computingcloud by using the criteria for the security. We accessible the 2 approaches to resource management. These strategies pact with the granularity and scalability in the computing cloud system. The security index covey the level of the security in the cloud computing environment in the modeled with metrics hierarchy. The biggest gain of using this approach is that it ropes the hierarchical decomposition that makes the model more scalable and disseminated.
References
2. Daylami, N. (2015). The origin and construct of cloud computing. International Journal of the Academic Business World, 9(2), 39-45.
3. Foster, I., & Gannon, D. B. (2017). Cloud Computing for Science and Engineering. MIT Press.
4. Gashi, L. (2016). Cloud Computing and Enterprise Data Reliability. In University for Business and Technology International Conference. University for Business and Technology
5. Kaur, M., & Singh, H. (2015). A Review of Cloud Computing Security Issues. International Journal of Education and Management Engineering, 5(5), 32–41
6. Kaur, M., & Singh, H. (2015). A review of cloud computing security issues. International Journal of Advances in Engineering & Technology, 8(3), 397
7. Lingham, G., Mackey, D. A., Lucas, R., & Yazar, S. (2019). How does spending time outdoors protect against myopia? A review. British Journal of Ophthalmology, 104(5), 593–599.
8. Malik, M. I. (2018). Cloud computing-technologies. International Journal of Advanced Research in Computer Science, 9(2), 379–384.
9. Monsalve, J., Landwehr, A., & Taufer, M. (2015). Dynamic CPU Resource Allocation in Containerized Cloud Environments. In 2015 IEEE International Conference on Cluster Computing (CLUSTER). IEEE.
10. Odun-Ayo, I., Ananya, M., Agono, F., & Goddy-Worlu, R. (2018). Cloud Computing Architecture: A Critical Analysis. In 2018 18th International Conference on Computational Science and Applications (ICCSA). IEEE.
11. Pendleton, M., Garcia-Lebron, R., Cho, J. H., & Xu, S. (2016). A survey on systems security metrics. ACM Computing Surveys (CSUR), 49(4), 1-35.
12. Polk, T., Souppaya, M., & Barker, W. C. (2017). Mitigating IoT-Based Automated Distributed Threats.
13. Rao, T. V. N., Naveena, K., David, R., & Narayana, M. S. (2015). A new computing environment using hybrid cloud. Journal of Information Sciences and Computing Technologies, 3(1), 180-185.
14. Son, J., & Buyya, R. (2018). A taxonomy of software-defined networking (SDN)-enabled cloud computing. ACM computing surveys (CSUR), 51(3), 1-36. https://doi.org/10.1145/3190617
15. Srivastava, P., & Khan, R. (2018). A Review Paper on Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17.
16. Wulf, F., Lindner, T., Westner, M., & Strahringer, S. (2021). IaaS, PaaS, or SaaS? The Why of Cloud Computing Delivery Model Selection – Vignettes on the Post-Adoption of Cloud Computing. In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences.
17. Chaabane, M., Bouassida Rodriguez, I., Colomo-Palacios, R., Gaaloul, W., & Jmaiel, M. (2019). A modeling approach for Systems-of-Systems by adapting ISO/IEC/IEEE 42010 Standard evaluated by Goal-Question-Metric. Science of Computer Programming, 184, 102305
18. Yahya, F., Walters, R. J., & Wills, G. B. (2017). Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage. In Enterprise Security (pp. 223–240). Springer International Publishing.
19. Jathanna, R., & Jagli, D. (2017). Cloud computing and security issues. International Journal of Engineering Research and Applications, 7(6), 31-38.
20. Rahulamathavan, Y., Rajarajan, M., Rana, O. F., Awan, M. S., Burnap, P., & Das, S. K. (2015). Assessing Data Breach Risk in Cloud Systems. In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE.
Abstract views: 0 PDF Downloads: 0