Page 56 - Big data - Concept and application for telecommunications
P. 56
1 Big data - Concept and application for telecommunications
Figure 7-6 – Operational support systems functional components
extended for BDaaS
7.3.3.1 Data life-cycle monitoring functional component
The data life-cycle is a sequence of steps from the initial creation or capture of the data to the final archive
and/or deletion at the end of its useful life. The data life-cycle monitoring functional component is
responsible for monitoring data availability, preservation and usage frequency during the entire data life-
cycle from creating, storing, using, sharing, archiving, and destroying data.
This functional component is responsible for:
– monitoring data availability-related information such as expiration date, sensitivity level and sharing
right of data;
– monitoring data preservation-related information (e.g., created time) and operation (e.g., data
creation and data deletion). The monitoring results guide the data archive, deletion and recovery
based on data preservation policy. For example, if archived data have expired, it needs to be deleted;
– checking the frequency of data usage. According to the different frequency of data usage, data
processing and data management schemes are adjusted in the process of data life-cycle. For
example, in the data storage process, data that are accessed more frequently will be stored on
faster, but more expensive storage media, while less critical data will be stored on cheaper, but
slower media.
7.3.3.2 Data policy management functional component
The data policy management functional component is responsible for creating, modifying and deleting data
policies, such as data provenance sharing policy, data license policy and data preservation policy. The BDaaS
service provider applies data policies to the processes of data collection, data processing, data storage, etc.
This functional component provides:
– the ability to create data policies, such as the creation of data sharing policy, data license policy and
data price policy according to various usage requirements. For example, for the transmission of
sensitive data, an encrypted transmission policy is created;
NOTE 1 – Data sharing policy is used to determine whether the data source can be shared or not
according to the security level of the data.
48 Basics of Big data