Guidelines on security of big data as a service for big data service providers |
|
Big data as a service (BDaaS) is a cloud service category that provides cloud service customers with capabilities to collect, store, analyse, visualize and manage big data, as specified in Recommendation ITU-T Y.3600. With remarkable growth of data volumes and rapid development of big data business, big data infrastructure has become the central facility to provide BDaaS. Consequently, significant security issues arise for BDaaS. For example, open source big data software design sometimes fails to take security into consideration from the beginning. New technologies introduced by big data analytics can also result in failure of traditional security protection measures. Recommendation ITU-T X.1750 analyses security challenges BDaaS faces, identifies security roles and responsibilities for provision of BDaaS, as well as a security framework for a big data infrastructure. It also specifies security protection measures that should be satisfied for services and components related to BDaaS.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14266 |
Series title: |
X series: Data networks, open system communications and security X.1750-X.1799: Data security X.1750-X.1759: Big Data Security |
Approval date: |
2020-09-03 |
Provisional name: | X.GSBDaaS |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1750 (09/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security considerations for quantum key distribution networks
|
2020
|
here
|
|