Page 179 - Big data - Concept and application for telecommunications
P. 179

Big data - Concept and application for telecommunications                       4


            PII     Personally Identifiable Information

            SaaS    Software as a Service


            5       Conventions
            None.


            6       Overview


            6.1     Specification of the data in this Recommendation
            CSC data includes private data of customers stored on a cloud platform and related data through cloud
            services for CSC, such as account information, login record and operation log.
            The difference between the terms CSC (see clause 3.1.4) and CSU (see clause 3.1.8) is further distinguished
            as follows.
            The CSC is the person or organization that enters into the legal relationship with the CSP. So the CSC could
            be an enterprise, a subsidiary, a government department or an individual consumer.
            The CSU is the person, device or application that uses the cloud service that has been contracted for. The
            CSU could be a government employee, an application running on a smartphone, an individual consumer or a
            member of a household, such as a child. The CSC usually nominates some CSUs to act as administrators and
            manage the relationship between the CSC and the CSP. A CSU always acts on behalf of a CSC. Most employee
            CSUs need to have little or no visibility of what or how the CSP operates, or the services that the CSC has
            contracted for, unless the CSC decides they need to know (e.g. administrators and internal auditors).
            A CSC can include multiple cloud tenants. A tenant can include multiple CSUs.

            6.2     Data security threats for cloud service customers

            As the cloud service environment is typically multi-tenant, loss or leakage of data is a serious threat to the
            CSC.  The  lack  of  appropriate  management  of  cryptographic  information,  such  as  encryption  keys,
            authentication codes and access privilege, could lead to significant damage, such as data loss and unexpected
            data leakage. For example, insufficient authentication, authorization and audit controls; inconsistent use of
            encryption or authentication keys; operational failures; disposal problems; jurisdiction and political issues;
            data centre reliability and disaster recovery, can be recognized as major sources of this threat and may be
            associated with the challenges.

            As for the security of storage data, since all CSC data is actually stored in the equipment of CSPs, and the
            storage resources is shared by different CSCs, it may face several risks, including:
            1)      CSP insiders with privileges can gain unauthorized access resulting in leakage of CSC data;

            2)      malicious users or hackers can also gain unauthorized access resulting in leakage of CSC data;
            3)      cross-border data flow can lead to data leakage, especially for sensitive data;
            4)      software and hardware failures, power outages and natural disasters can result in data loss.
            Data  security  also  lies  in  the  process  of  transmission.  Data  can  be  stolen  or  tampered  with  during
            transmission, thus lead to confidentiality leakage, if the data is not encrypted properly. If CSCs have not
            adopted adequate encryption, CSPs should verify the integrity of the data and take corresponding encryption
            measures.

            Another threat is the leakage of residual data. When a CSC unsubscribes its service, its data is cleared and
            the storage space released or reallocated to other CSCs. It is the responsibility of the CSP to ensure that the
            residual data of one CSC or tenant cannot be recovered by another.







                                                                   Security, privacy and data protection   171
   174   175   176   177   178   179   180   181   182   183   184