Page 165 - Big data - Concept and application for telecommunications
P. 165
Big data - Concept and application for telecommunications 4
9.8 Information protection
The security mechanisms should be deployed to protect and to prevent un-authorized access and disclosure
of information and, in particular, any information relating to an identified or identifiable natural person.
9.9 Resistance to fake data
Resistance to fake data is required to ensure data authenticity and to ensure that data provenance is
consistent with the smart device.
9.10 Secure data acquisition
Secure data acquisition is required to ensure secure data collection from a variety of smart devices and data
transmission in mobile networks from eavesdropping, man-in-middle attacks, and data tampering, etc. These
security measures should extend to data handled and stored at pre-processing stages, if applicable.
9.11 Secure audit
Secure audit is required to audit the entity's behaviour when analysing and using big data in mobile Internet
services. Secure audit collects and makes available the necessary evidential information related to the
analysis and use of any big data set/analysis results in mobile Internet services.
9.12 Secure data storage
Secure data storage is required to ensure the secure aggregation and storage of multiple-structure data from
different smart devices and mobile applications.
9.13 User consent
User consent to the use of related data in big data analysis is required to be obtained from the user of mobile
Internet services. The key point is that certain mobile Internet services that need to collect user data should
inform, remind, display and briefly explain to the users that data may be collected and used for big data
analysis, and obtain their consent in this regard.
10 Relationship between security requirements and security threats
Each security requirement is a countermeasure against certain security threats. The relationship between
security requirements and security threats is shown in Table 2.
In Table 2, the letter "Y" (Yes) in each cell indicates that the security requirement is related to a particular
security threat.
Security, privacy and data protection 157