Security requirements and framework for big data analytics in mobile Internet services |
 |
Mobile Internet services harvest data in their big data infrastructure from multiple sources and multiple data dimensions with characteristics including scale, diversity, speed and possibly others like credibility or business value. Big data analysis drives nearly every aspect of mobile Internet services to improve service quality and user experience. According to big data aggregation and analysis, service providers can analyse users’ interests more effectively and predict user’s expectation more accurately, thus, they can significantly improve and add value to their services. Consequently, big data analysis becomes a valuable business trend in the telecommunication domain.
As the new technology develops, big data analytics will bring new security issues comparing to previous data analytics in mobile Internet services domain. Without comprehensive security mechanism, the unsecure and spiteful big data analysis will do harm to mobile Internet service provider’s business security, and user’s data security. To ensure secure big data analysis in mobile Internet services, consequently, the security requirements need to be analyzed exhaustively and the overall security framework need to be established.
This Recommendation will analyse the security requirements of big data analytics in mobile Internet services and provide security framework.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13726 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1140-X.1149: Web security (I) |
Approval date: |
2018-11-13 |
Provisional name: | X.srfb |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1147 (11/2018)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|