Page 28 - Big data - Concept and application for telecommunications
P. 28

1                                Big data - Concept and application for telecommunications



            –       Analysis algorithm adaptation, which offers the capabilities to apply algorithms of classification,
                    regression, clustering, association rules, ranking, etc. to process the datasets according to the CSC
                    demands;
            –       Distributed processing, which offers the capabilities to distribute the processing tasks to a cluster of
                    computing nodes;
            –       Data application, which offers the capabilities to support applications or application plug-ins to use
                    the analysis results of datasets.


            9.5     Data visualization capabilities
            Data visualization capabilities include:
            –       Data visualization, which offers the capabilities to create, configure, deliver and customize the visual
                    representation of data analysis results.
            –       Data reporting, which offers the capabilities to make reports of summary, key elements and analysis
                    results of datasets.

            9.6     Data management capabilities

            Data management capabilities include:
            –       Data provenance, which offers the capabilities to manage information pertaining to any source of
                    data including the party or parties involved in generation and introduction processes for data;
            –       Data  preservation,  which  offers  the  capabilities  to  manage  the  series  of  activities  necessary  to
                    ensure continued access to data according to relevant policy;

            –       Data ownership, which offers the capabilities to manage property rights of data possession and
                    disposition according to the change of data status (e.g., after data integration);
            –       Processes monitoring, which offers the information related to data processing;

                    NOTE – This capability can include information such as the success of the job and task, running time,
                    resource utilization, etc.

            –       Metadata management, which offers the capabilities of creating, defining, attributing, controlling
                    and updating metadata information.

            9.7     Data security and protection capabilities

            Data security and protection capabilities include:
            –       Access control, which offers the capabilities to manage the rights of parties to control or influence
                    the information related to them;
            –       Policy control, which offers the capabilities to control policies of data protection and security;
            –       Data security, which offers the capabilities to apply the storage, network and service related security
                    mechanisms, including administrative, operational and maintenance issues.


            10      Security considerations
            Security aspects for consideration within cloud computing environments, including cloud infrastructure, IaaS,
            NaaS,  DaaS  are  addressed  by  security  challenges  for  CSPs,  as  described  in  [ITU-T  X.1601].  In  particular,
            [ITU-T X.1601]  analyses  security  threats  and  challenges,  and  describes  security  capabilities  that  could
            mitigate these threats and meet security challenges.

            Relevant security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and applicable X, Y and M series of
            ITU-T Recommendations need to be taken into consideration, including access control, authentication, data
            confidentiality, data retention policy, network security, data integrity, availability and privacy.






            20       Basics of Big data
   23   24   25   26   27   28   29   30   31   32   33