Title :
Guaranteed Quality of Service in Cloud Ready Application
Author :
Sekhar, V. Muni ; Kumar, M. Rajendra ; Rao, K.V. ; Rao, N. Sambasiva
Author_Institution :
Dept. of IT, VCE, Hyderabad, India
Abstract :
Cloud computing is a grid based application which eases "On demand network access to a shared pool of computing recourses". This environment strives to be secure, scalable and customized with guaranteed Quality of Service (QoS). However, QoS is guaranteed through fulfillment of non-functional requirements like Security, Scalability, Mobility and Virtualization in Cloud computing System. In this paper we proposed "the Open Cloud Security Architecture (OCSA) algorithm" is an approach to fulfillment of our goal. To meet the computing demands of everyday operations like Nonfunctional requirements, here we have introduced OCSA to achieve that first security, the misuse case and Attack Tree analysis posed threat and Attack Surface of any Cloud, Second scalability to overcome network traffic congestion and Denial of Service (DoS) because of rapid growth of customers and Third, Storage and Service providing consequences arise and mitigated to achieve Mobility and Virtualization. The above unpredictable constraints can be modeled through DREAD analysis, So that above consequences partly annihilated and use of Cloud can be extended by adding more capacity on demand.
Keywords :
cloud computing; computer network security; grid computing; mobile computing; open systems; quality of service; trees (mathematics); virtualisation; DREAD analysis; DoS; OCSA algorithm; QoS; attack tree analysis; cloud computing system; cloud ready application; computing recourses; denial of service; grid based application; guaranteed quality of service; misuse case; mobility; network traffic congestion; nonfunctional requirements; on demand network access; open cloud security architecture algorithm; scalability; virtualization; Cloud computing; Quality of service; Scalability; Security; Servers; Virtualization; Attack analysis; Attack tree; Cloud computing; DREAD; Misuse case; Mitigation; Mobility; SDLC; Scalability; Security; Virtualization; misuse case;
Conference_Titel :
Computational and Business Intelligence (ISCBI), 2013 International Symposium on
Conference_Location :
New Delhi
Print_ISBN :
978-0-7695-5066-4
DOI :
10.1109/ISCBI.2013.13