Page 26 - Big data - Concept and application for telecommunications
P. 26
1 Big data - Concept and application for telecommunications
NOTE – User behaviour includes user-related information, collected users' behaviour in real-time,
environmental information and the analysed information from the cumulative users' information
on a CSP:BDIP's storage. Scope of behaviour analysis is based on the user's agreement in advance.
14) The CSP:BDAP can optionally perform analysis of different data types and formats in real-time.
8.5 Data visualization requirements
The data visualization requirements include:
1) It is required that the CSP:BDAP provides a flexible licensing policy for the reporting tool;
2) It is recommended that the CSP:BDAP supports different tools or plug-ins with multiple styles of
data visualization;
NOTE – Visualization styles include statistical graphics, forms, diagrams, charts, etc.
3) It is recommended that the CSP:BDAP supports customization of the reporting tools;
4) It is recommended that the CSP:BDAP supports integration of reporting tools with CSC reporting
systems;
5) It is recommended that the CSP:BDAP supports integration of reporting tools with CSC operational
systems;
6) It is recommended that the CSP:BDAP supports composed services which could combine two or
more big data services to the CSC:BDSU.
8.6 Data management requirements
The data management requirements include:
1) It is required for the CSP:BDIP to manage metadata information such as creating, controlling,
attributing, defining and updating;
NOTE – Metadata contains critical information such as persistent identification of the data, the fixity
and the access rights of the stored data.
2) It is required for the CSP:BDIP to track a data history which contains the source of data and the data
processing method;
3) It is required for the CSP:BDAP to support distributed cluster monitoring tools to monitor the health
and status of computing clusters;
4) It is required for the CSP:BDIP to support data preservation policy management rules;
NOTE – Provided rules include data retirement and refreshment methods.
5) It is recommended for the CSP:BDIP to support network resource monitoring;
6) It is recommended for the CSP:BDIP to support management of data lifecycle operations;
NOTE – Data lifecycle operations include data generation, transmission, storage, use and deletion.
8.7 Data security and protection requirements
The data security and protection requirements include:
1) It is required for the CSP:BDIP to protect data collection, data storage, data transmission and data
processing with security mechanisms;
2) It is required for the CSP:BDIP to support data protection;
3) It is required that the CSP deletes CSC related data and analytical results according to the lifetime
defined by the CSC or on the CSC's demand;
4) It is recommended that the CSP supports implementing the CSC's data protection and security
policies over data and analytical results;
5) It is recommended that the CSP:BDIP supports redundancy mechanisms and transaction logging.
18 Basics of Big data