Page 273 - Big data - Concept and application for telecommunications
P. 273

Big data - Concept and application for telecommunications                       5


            (12)    It  is  recommended  that  CSP:SFP  support  access  to  the  secured  storage  interface  for  DSF  local
                    storage.
            (13)    It is required that CSP:SFP provide the storage operation for DSF local storage.
                    NOTE 10 – Storage operation for DSF local storage includes create, delete, scaling, partitioning and
                    checking volume, etc.).
            (14)    It is required that CSP:SFP provide scaling of single virtual volume on CSC:CSU demand.

            8.4     Metadata and policy management requirements

            (1)     It is recommended that CSP:SFP provide a configuration of a single virtual volume by data storage
                    policy for CSC:CSU.

            (2)     It is recommended that CSP:SFP provide default data storage policies when policy is not configured.
                    NOTE 1 – Default data policy is reconfigured by customer's requests.
            (3)     It is recommended that CSP:DMP provide a transformation of DSF data by data manipulation policy.
                    NOTE  2  –  Data  manipulation  policy  for  transformation  of  DSF  data  includes  the  policies  of
                    fragmentation, encryption, compression, de-duplication, etc.
            (4)     It is recommended that CSP:DMP provide a default data manipulation policy.
            (5)     It is required that CSP:SFP provide a global registry for customer data access.
            (6)     It is required that CSP:SFP provide high-speed access of global registry.

            (7)     It  is  required  that  CSP:DMP  provide  management  of  data  operation  metadata  automatically
                    according to execution of data operation.
            (8)     It is required that CSP:SFP provide storage management metadata to communicate with DSF local
                    storage.


            9       Security considerations

            It  is  recommended  that  the  security  framework  for  cloud  computing  described  in  [b-ITU-T  X.1601]  be
            considered for data storage federation. [b-ITU-T X.1601] analyses security threats and challenges in the cloud
            computing  environment  and  describes  security  capabilities  that  could  mitigate  these  threats  and  meet
            security challenges.
            [b-ITU-T  X.1631]  provides guidelines  supporting  the implementation  of  information security controls  for
            cloud service customers and cloud service providers. Many of the guidelines guide the cloud service providers
            to assist the cloud service customers in implementing the controls and guide the cloud service customers to
            implement such controls. Selection of appropriate information security controls and the application of the
            implementation  guidance  provided,  will  depend  on  a  risk  assessment  as  well  as  any  legal,  contractual,
            regulatory or other cloud-sector specific information security requirements.
            It is also recommended that the guidelines for cloud service customer data security described in [b- ITU-T
            X.1641] be considered. It provides generic security guidelines for the cloud service customer (CSC) data in
            cloud computing, analyses the CSC data security lifecycle and proposes security requirements at each stage
            of the data lifecycle.


















                                                                           Network and infrastructure    265
   268   269   270   271   272   273   274   275   276   277   278