Page 28 - Big data - Concept and application for telecommunications
P. 28
1 Big data - Concept and application for telecommunications
– Analysis algorithm adaptation, which offers the capabilities to apply algorithms of classification,
regression, clustering, association rules, ranking, etc. to process the datasets according to the CSC
demands;
– Distributed processing, which offers the capabilities to distribute the processing tasks to a cluster of
computing nodes;
– Data application, which offers the capabilities to support applications or application plug-ins to use
the analysis results of datasets.
9.5 Data visualization capabilities
Data visualization capabilities include:
– Data visualization, which offers the capabilities to create, configure, deliver and customize the visual
representation of data analysis results.
– Data reporting, which offers the capabilities to make reports of summary, key elements and analysis
results of datasets.
9.6 Data management capabilities
Data management capabilities include:
– Data provenance, which offers the capabilities to manage information pertaining to any source of
data including the party or parties involved in generation and introduction processes for data;
– Data preservation, which offers the capabilities to manage the series of activities necessary to
ensure continued access to data according to relevant policy;
– Data ownership, which offers the capabilities to manage property rights of data possession and
disposition according to the change of data status (e.g., after data integration);
– Processes monitoring, which offers the information related to data processing;
NOTE – This capability can include information such as the success of the job and task, running time,
resource utilization, etc.
– Metadata management, which offers the capabilities of creating, defining, attributing, controlling
and updating metadata information.
9.7 Data security and protection capabilities
Data security and protection capabilities include:
– Access control, which offers the capabilities to manage the rights of parties to control or influence
the information related to them;
– Policy control, which offers the capabilities to control policies of data protection and security;
– Data security, which offers the capabilities to apply the storage, network and service related security
mechanisms, including administrative, operational and maintenance issues.
10 Security considerations
Security aspects for consideration within cloud computing environments, including cloud infrastructure, IaaS,
NaaS, DaaS are addressed by security challenges for CSPs, as described in [ITU-T X.1601]. In particular,
[ITU-T X.1601] analyses security threats and challenges, and describes security capabilities that could
mitigate these threats and meet security challenges.
Relevant security requirements of [b-ITU-T Y.2201], [b-ITU-T Y.2701] and applicable X, Y and M series of
ITU-T Recommendations need to be taken into consideration, including access control, authentication, data
confidentiality, data retention policy, network security, data integrity, availability and privacy.
20 Basics of Big data