Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of big data analysis in mobile Internet services     
 7     Threats in mobile Internet big data analysis services
        7.1     Analysis result overuse            
        7.2     Data analysis without user's consent 
        7.3     Data disclosure            
        7.4     Data forgery 
        7.5     Disclosure information             
        7.6     Disclosure of inferred information      
        7.7     Disclosure of user behaviour information        
        7.8     Inaccurate or mistaken analysis            
        7.9     Location information overuse
       7.10     Over analysis               
       7.11     Trojan and viruses    
       7.12     Unauthorized access
       7.13     Unauthorized analysis             
       7.14     Unauthorized analytical application   
 8     Relationship of security threats to entities  
 9     Security requirements         
        9.1     Analysis algorithm(s) check    
        9.2     Authentication            
        9.3     Authorization
        9.4     Data minimization      
        9.5     Data retention limits 
        9.6     Data source check      
        9.7     Incident response for malware             
        9.8     Information protection            
        9.9     Resistance to fake data            
       9.10     Secure data acquisition           
       9.11     Secure audit
       9.12     Secure data storage 
       9.13     User consent              
10     Relationship between security requirements and security threats   
11     Security functions for big data analytics in mobile Internet services
       11.1     Authorization             
       11.2     Authentication           
       11.3     Digital signature        
       11.4     Encipherment            
       11.5     Event detection         
       11.6     Key exchange             
       11.7     Security audit trail     
       11.8     Security recovery      
       11.9     User reminder            
      11.10     Relationship between security functions and security requirements 
Bibliography