Page 120 - Big data - Concept and application for telecommunications
P. 120
3 Big data - Concept and application for telecommunications
– (equivalent function for process steps) It is recommended that BDSP provides an equivalent
function mapping for reusing provenance information coming from a different system;
NOTE 2 – For the equivalent function mapping, the name of the function, the format and structure
of input and output data of this function, the frequency of analysis functions and the relationship
among them can be used.
NOTE 3 – The results of the equivalent function mapping can be the same function with different
names or a combination of functions that provide the same output.
– (adaptability of computational environment) It is recommended that BDSP provides diagnose
computational environment to reuse provenance information which came from the different
system.
8.3 Monitoring requirements
Monitoring requirements include:
– (monitoring computational environment) It is required that BDSP monitors the change of
computational environment;
– (monitoring responsible party) It is required that BDSP monitors the change of responsible party;
– (applying the monitoring result) It is required that BDSP reflects the monitoring results to the
recorded provenance unit.
NOTE – The monitoring results include the change of computational environment and responsible
party.
8.4 Policy management requirements
Policy management requirements include:
– (verifying PII) It is required that BDSP provides verifying PII in a data instance when recording a
provenance unit;
NOTE 1 – Verification of PII follows BDSP's policy on PII.
NOTE 2 – In a provenance unit, data instance information (BD_DataInstance) includes information
about whether PII is contained or not (see clause 7.2).
– (protecting PII) It is required that BDSP provides a protection mechanism for a PII in data;
NOTE 3 – When a PII is included in data sources, BDSP decide omit it or not based on the user's
access authority.
– (simplifying provenance information) It is recommended that BDSP supports simplifying
provenance information based on a sharing policy;
NOTE 4 – Methods of provenance information simplification include multiple level of detail and
encoding formats, etc.
– (sharing level of provenance) It is required that BDSP supports sharing policy according to the
different levels of provenance.
NOTE 5 – The provenance level decides traceability of data, and it is determined by the sharing
policy. Provenance information contains process step with the applied functions, intermediate data,
and responsible party information. For the transfer the provenance information, the provenance
information can be simplified according to the sharing policy.
9 Security considerations
Relevant security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and applicable X, Y and M series of ITU-T
Recommendations need to be taken into consideration, including access control, authentication, data
confidentiality, data retention policy, network security, data integrity, availability and protection of personal
information.
112 Static data – Data provenance, data formats and trust