Page 137 - Big data - Concept and application for telecommunications
P. 137

Big data - Concept and application for telecommunications                       4


            1       Scope

            This Recommendation analyses security threats and challenges in the cloud computing environment, and
            describes security capabilities that could mitigate these threats and address security challenges. A framework
            methodology is provided for determining which of these security capabilities will require specification for
            mitigating security threats and addressing security challenges for cloud computing.


            2       References

            None.


            3       Definitions

            3.1     Terms defined elsewhere
            This Recommendation uses the following terms defined elsewhere:

            3.1.1   authentication [b-NIST-SP-800-53]: Verification of the identity of a user, process, or device, often as
            a prerequisite to allowing access to resources in an information system.

            3.1.2   capability [b-ISO/IEC 19440]: Quality of being able to perform a given activity.
            3.1.3   cloud computing [b-ITU-T Y.3500]: Paradigm for enabling network access to a scalable and elastic
            pool of shareable physical or virtual resources with self-service provisioning and administration on demand.
            NOTE – Examples of resources include servers, operating systems, networks, software, applications, and
            storage equipment.
            3.1.4   cloud service [b-ITU-T Y.3500]: One or more capabilities offered via cloud computing (3.1.3) invoked
            using a defined interface.
            3.1.5   cloud service customer [b-ITU-T Y.3500]: Party (3.1.17) which is in a business relationship for the
            purpose of using cloud services (3.1.4).
            NOTE – A business relationship does not necessarily imply financial agreements.

            3.1.6   cloud service partner [b-ITU-T Y.3500]: Party (3.1.17) which is engaged in support of, or auxiliary to,
            activities of either the cloud service provider (3.1.7) or the cloud service customer (3.1.5), or both.

            3.1.7   cloud service provider [b-ITU-T Y.3500]: Party (3.1.17) which makes cloud services (3.1.4) available.
            3.1.8   cloud service user [b-ITU-T Y.3500]: Natural person, or entity acting on their behalf, associated with
            a cloud service customer (3.1.5) that uses cloud services (3.1.4).
            NOTE – Examples of such entities include devices and applications.

            3.1.9   Communications as a Service (CaaS) [b-ITU-T Y.3500]: Cloud service category in which the capability
            provided to the cloud service customer (3.1.5) is real time interaction and collaboration.
            NOTE – CaaS can provide both application capabilities type and platform capabilities type.

            3.1.10  community  cloud  [b-ITU-T  Y.3500]:  Cloud  deployment  model  where  cloud  services  (3.1.4)
            exclusively support and are shared by a specific collection of cloud service customers (3.1.5) who have shared
            requirements  and  a  relationship  with  one  another,  and  where  resources  are  controlled  by  at  least  one
            member of this collection.
            3.1.11  data controller [b-key definition]: A person who (either alone or jointly or in common with other
            persons) determines the purposes for which and the manner in which any personal data are, or are to be,
            processed.
            3.1.12  data processor [b-key definition]: In relation to personal data, this means any person (other than an
            employee of the data controller) who processes the data on behalf of the data controller.





                                                                   Security, privacy and data protection   129
   132   133   134   135   136   137   138   139   140   141   142