Page 146 - Big data - Concept and application for telecommunications
P. 146

4                                Big data - Concept and application for telecommunications



            9.1     Trust model

            A  common  trust  model  is  necessary  for  any  system  where  multiple  providers  cooperate  to  provide  a
            trustworthy service.
            Because of the highly distributed and multi-stakeholder nature of cloud computing, the cloud computing
            environment will need to incorporate an overall trust model. This trust model will enable the creation of
            islands and/or federations of trusted entities, such that disparate elements of the system will be able to
            authenticate the identity and authorized rights of other entities and components. Each island or federation
            of trust will be based on one or more trusted authorities (e.g., a public key infrastructure (PKI) certificate
            authority).

            Multiple trust models exist today for both cloud and non-cloud purposes. The specific trust model to be
            adopted is out of the scope of this Recommendation.


            9.2     Identity and access management (IAM), authentication, authorization and transaction
                    audit
            Multiple administrators and users are involved in cloud  computing services, and these cloud computing
            services are accessed and used internally (CSPs) and externally (CSCs). Identity management is needed, not
            only to protect identities, but also to facilitate the access management, authentication, authorization and
            transaction audit processes in such a dynamic and open cloud computing infrastructure.

            One or more common trust models (clause 9.1) are needed by IAM for the authentication of identities, and
            by developers, hypervisors and other system components for the authentication of system components such
            as downloaded software modules, applications or datasets.
            IAM contributes to the confidentiality, integrity and availability of services and resources, and thus becomes
            essential in cloud computing.

            Furthermore, IAM may enable the implementation of single sign-on and identity federation for clouds using
            different authentication mechanisms or distributed in different security domains.

            Transaction audit protects against repudiation, enables forensic analysis after a security incident, and acts as
            a deterrent to attacks (both intrusion and insider). Transaction audit implies more than simple logging, but
            also includes active monitoring to flag up suspicious activities.

            9.3     Physical security

            Physical  security  needs  to  be  achieved.  Access  to  premises  containing  CSP  equipment  is  restricted  to
            authorized persons and only to those areas directly necessary for their job functions; this is part of the IAM
            process. However, the extent of physical security will depend on the value of the data and the extent to
            which multiple customers are permitted access.

            9.4     Interface security

            This capability secures interfaces open to CSCs and/or other contracted CSPs through which various kinds of
            cloud computing services are delivered, and secures communications based on these interfaces. Mechanisms
            available  to  ensure  interface  security  include  but  are  not  limited  to:  unilateral/mutual  authentication,
            integrity checksum, end-to-end encryption, digital signature, etc.


            9.5     Computing virtualization security
            Computing virtualization security refers to the security of the whole computing virtualization environment.
            It protects the hypervisor from attacks, protects the host platform from threats originating in the computing
            virtualization  environment,  and  keeps  VMs  secure  throughout  the  life-cycle.  Specifically,  this  capability
            enables  VM  isolation,  and  protects  the  VM  images  and  suspended  VM  instances  in  storage  and  during
            migration.





            138      Security, privacy and data protection
   141   142   143   144   145   146   147   148   149   150   151