Cloud computing and Big data infrastructure security
(Continuation of Q8/17)
Cloud computing is a model for enabling service user’s ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services), that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud computing model is defined by five essential characteristics (on-demand, delivery over a broad network access, resource pooling, rapid elasticity, self and measured services), five cloud computing service categories, i.e., Software as a Service (SaaS), Communication as a Service (CaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Network as a Service (NaaS), and different deployment models (public, private, hybrid…). The advent of the cloud computing approach as the preferred vehicle for discovering, externalizing, composing, service re-use within workflows, applications, communication enabled applications places new emphasis on the need for security.
Forecasted benefits of cloud computing include flexible and dynamic resource provisioning, and simpler and automated administration of IT infrastructure. Virtualization makes possible to share of nearly unlimited resources, with scalability improvements and massive cost reductions for infrastructure management. However, open systems and shared resources of cloud computing raise many concerns about security, which is perhaps the most important barrier to the adoption of cloud computing. Moving to the cloud implies to shifting from safe, traditional, in-house IT systems to unsafe, “cloudified”, open infrastructures. It thus requires in-depth rethinking of security.
Cloud computing was considered for several years as service-centric IT and controlled by Internet players. However, telecommunication players have an important role to play in the emerging cloud computing market and ecosystem. As cloud services are delivered through telecommunication networks, telecommunication players should guarantee a high assurance level. Strong but flexible security protection will be a key enabler for the whole cloud market and eco-system.
In addition, the flexible use of rich resources in cloud computing environments will enable new security services that the current premise defences cannot provide (e.g. anti-malware services as a cloud service).
Big Data is considered as the technologies, the set of tools, the data and the analytics used in processing large amount of data. Furthermore, as data grow exponentially and become a key asset of telecommunication/ICT networks, massive datasets are analysed with the support of cloud computing to reveal patterns and relationships that would otherwise remain hidden. The core processes of big data such as data collection, storage, analysis, management and visualization are achieved on the basis of cloud computing, without which big data cannot be rapidly transferred and analysed using traditional technologies (e.g. Big Data as a Service). Thus, there is need to examine what kind of security measures cloud computing can offer in the near future.
Recommendations ITU-T X.1601, X.1602, and X.1631 provide a set of Recommendations on security service for cloud security overview, architecture and framework, cross-layers cloud security and specific security of network services. Currently there is a strong need for securing cloud computing enabled critical voice, multi-media, identity based services, information assurance services, identity and data services, and emergency based services. This Question is intended to develop new Recommendations based on the Focus Group Cloud Technical Report Part 5 for:
- best practices and guidelines development to guide on how to provide security in a cloud computing based environment;
- responsibility clarification, and security requirements and threats definition for the main actors and related roles in the cloud computing ecosystem;
- security architecture based on the reference architecture provided by Q18/13;
- security management and audit technologies for the trust management.
Question 8/17 will collaborate with related Questions such as 2/17, 3/17, 4/17, 7/17, 10/17 and 11/17 to develop Recommendations on cloud computing security.
Recommendations under responsibility of this Question as of 19 September 2018: X.1601, X.1602, X.1603, X.1631, X.1641 and X.1642.
Texts under development: X.GSBDaaS, X.sgBDIP, X.sgcc, X.sgtBD, X.SRCaaS, X.SRIaaS and X.SRNaaS.
Study items to be considered include, but are not limited to:
a) What new Recommendations or other type of documents should be developed for main actors like service providers, service users and services partners, and other key industry stakeholders to advance cloud computing security?
b) What new Recommendations should be developed for security architecture and security functionalities organization in line with the reference architecture?
c) What new Recommendations should be developed for assurance mechanisms, audit technologies, and associated risks assessment to establish trust among different actors?
d) What new Recommendations should be developed for security solutions, best practices or guidelines to big data platform and infrastructure security?
e) What collaboration is necessary to minimize duplication of efforts with other Questions, study groups, and SDOs?
f) How security as a service should be developed to protect telecommunication/ICT systems?
Tasks include, but are not limited to:
a) Developing Recommendations or other type of documents to advance cloud computing security.
b) Developing Recommendations to identify security requirements and threats to secure cloud computing services based on the general requirements of cloud computing specified by ITU-T Study Group 13.
c) Developing Recommendations to define security architecture and to organize security functions based on the reference architecture specified by ITU-T Study Group 13.
d) Developing Recommendations to define a strong, flexible and elastic security architecture and implementation for cloud computing systems.
e) Developing Recommendations to identify assurance mechanisms, audit technologies, risk assessment with the objective of achieving trustworthy relationships within the cloud computing ecosystem.
f) Study and develop big data platform and infrastructure security Recommendations aligned with reference architecture specified by ITU-T Study Group 13.
g) Taking charge of all the Study Group 17 activities on cloud computing security and big data platform and infrastructure security.
h) Representing the work of Study Group 17 related to cloud computing security in the Joint Coordination Activity on cloud computing.
• Y-series Recommendations on cloud computing.
• ITU-T Qs 1/17, 2/17, 3/17, 4/17, 7/17, 10/17 and 11/17.
• ITU-T SGs 2, 13 16 and 20.
• Internet Engineering Task Force (IETF); ISO/IEC JTC 1/SCs 27 and SC 38; Organization for the Advancement of Structured Information Standards (OASIS); and other relevant bodies as identified.
• Cloud Security Alliance (CSA); Distributed Management Task Force (DMTF).