Page 165 - Big data - Concept and application for telecommunications
P. 165

Big data - Concept and application for telecommunications                       4


            9.8     Information protection

            The security mechanisms should be deployed to protect and to prevent un-authorized access and disclosure
            of information and, in particular, any information relating to an identified or identifiable natural person.

            9.9     Resistance to fake data
            Resistance  to  fake  data  is  required  to  ensure  data  authenticity  and  to  ensure  that  data  provenance  is
            consistent with the smart device.

            9.10    Secure data acquisition

            Secure data acquisition is required to ensure secure data collection from a variety of smart devices and data
            transmission in mobile networks from eavesdropping, man-in-middle attacks, and data tampering, etc. These
            security measures should extend to data handled and stored at pre-processing stages, if applicable.

            9.11    Secure audit

            Secure audit is required to audit the entity's behaviour when analysing and using big data in mobile Internet
            services.  Secure  audit  collects  and  makes  available  the  necessary  evidential  information  related  to  the
            analysis and use of any big data set/analysis results in mobile Internet services.

            9.12    Secure data storage

            Secure data storage is required to ensure the secure aggregation and storage of multiple-structure data from
            different smart devices and mobile applications.

            9.13    User consent
            User consent to the use of related data in big data analysis is required to be obtained from the user of mobile
            Internet services. The key point is that certain mobile Internet services that need to collect user data should
            inform, remind, display and briefly explain to the users that data may be collected and used for big data
            analysis, and obtain their consent in this regard.


            10      Relationship between security requirements and security threats
            Each security requirement is a countermeasure against certain security threats. The relationship between
            security requirements and security threats is shown in Table 2.
            In Table 2, the letter "Y" (Yes) in each cell indicates that the security requirement is related to a particular
            security threat.






























                                                                   Security, privacy and data protection   157
   160   161   162   163   164   165   166   167   168   169   170