Page 58 - Big data - Concept and application for telecommunications
P. 58
1 Big data - Concept and application for telecommunications
However, data redundancy should be minimized to improve storage space utilization, but in some cases, data
redundancy should also be increased appropriately. Data compression and de-duplication are two key
technologies to reduce data redundancy.
CSP: big data application provider (BDAP) and CSP: BDIP support reducing unnecessary redundant data and
increase useful data redundancy appropriately.
8.2 Performance
Referring to [ITU-T Y.3502], this Recommendation identifies additional performance metrics and indicators
relating to the operation of a big data service, such as:
– realtime performance metrics, such as automatic fault tolerance and database extensibility;
– elastic calculation performance indicators, such as connections per second and packets per second;
– storage performance indicators, such as bandwidth and input/output preferences per second;
– data disaster tolerance performance indicators including recovery point indicator.
9 Security considerations
Security aspects for consideration within the cloud computing environment, especially for BDaaS, are
addressed by security challenges for CSPs, as described in [b-ITU-T X.1601]. In particular, [b-ITU T X.1601]
analyses security threats and challenges, and describes security capabilities that could mitigate these threats
and meet the security challenges.
[b-ITU-T X.1631] provides guidelines supporting the implementation of information security controls for CSCs
and CSPs. Many of the guidelines guide the CSPs to assist the CSCs in implementing the controls, and guide
the CSCs to implement such controls. Selection of appropriate information security controls, and the
application of the implementation guidance provided, will depend on a risk assessment as well as any legal,
contractual, regulatory or other cloud-sector specific information security requirements.
It is also recommended that the guidelines for CSC data security described in [b-ITU-T X.1641] are considered.
It provides generic security guidelines for the CSC data in cloud computing, analyses the CSC data security
life-cycle and proposes security requirements at each stage of the data life-cycle.
50 Basics of Big data