Page 177 - Big data - Concept and application for telecommunications
P. 177
Big data - Concept and application for telecommunications 4
1 Scope
This Recommendation provides guidelines for cloud service customer (CSC) data security in cloud computing,
for those cases where the cloud service provider (CSP) is responsible for ensuring that the data is handled
with proper security. This is not always the case, since for some cloud services the security of the data is the
responsibility of CSCs themselves. In other cases, the responsibility may be mixed.
For example, in some cases the CSP may be responsible for restricting access to the data, while the CSC
remains responsible for deciding which cloud service users (CSUs) should have access to it, and the behaviour
of any scripts or applications with which the CSU processes the data.
This Recommendation identifies security controls for CSC data that can be used in different stages of the full
data lifecycle. These security controls can differ when the security level of the CSC data changes. Therefore,
this Recommendation provides guidelines on when each control should be used for best security practice.
2 References
The following ITU-T Recommendations and other references contain provisions which, through reference in
this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
were valid. All Recommendations and other references are subject to revision; users of this Recommendation
are therefore encouraged to investigate the possibility of applying the most recent edition of the
Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
regularly published. The reference to a document within this Recommendation does not give it, as a stand-
alone document, the status of a Recommendation.
[ITU-T X.1601] Recommendation ITU-T X.1601 (2015), Security framework for cloud computing.
[ITU-T X.1631] Recommendation ITU-T X.1631 (2015) | ISO/IEC 27017:2015, Information technology
– Security techniques – Code of practice for information security controls based on
ISO/IEC 27002 for cloud services.
3 Definitions
3.1 Terms defined elsewhere
This Recommendation uses the following terms defined elsewhere:
3.1.1 authentication [b-NIST-SP-800-53]: Verifying the identity of a user, process, or device, often as a
prerequisite to allowing access to resources in an information system.
3.1.2 cloud computing [b-ITU-T Y.3500]: Paradigm for enabling network access to a scalable and elastic
pool of shareable physical or virtual resources with self-service provisioning and administration on-demand.
NOTE – Examples of resources include servers, operating systems, networks, software, applications, and
storage equipment.
3.1.3 cloud service [b-ITU-T Y.3500]: One or more capabilities offered via cloud computing invoked using
a defined interface.
3.1.4 cloud service customer [b-ITU-T Y.3500]: Party which is in a business relationship for the purpose of
using cloud services.
NOTE – A business relationship does not necessarily imply financial agreements.
3.1.5 cloud service customer data [b-ITU-T Y.3500]: Class of data objects under the control, by legal or
other reasons, of the cloud service customer that were input to the cloud service, or resulted from exercising
the capabilities of the cloud service by or on behalf of the cloud service customer via the published interface
of the cloud service.
NOTE 1 – An example of legal controls is copyright.
Security, privacy and data protection 169