Page 58 - Big data - Concept and application for telecommunications
P. 58

1                                Big data - Concept and application for telecommunications



            However, data redundancy should be minimized to improve storage space utilization, but in some cases, data
            redundancy  should  also  be  increased  appropriately.  Data  compression  and  de-duplication  are  two  key
            technologies to reduce data redundancy.
            CSP: big data application provider (BDAP) and CSP: BDIP support reducing unnecessary redundant data and
            increase useful data redundancy appropriately.

            8.2     Performance

            Referring to [ITU-T Y.3502], this Recommendation identifies additional performance metrics and indicators
            relating to the operation of a big data service, such as:
            –       realtime performance metrics, such as automatic fault tolerance and database extensibility;

            –       elastic calculation performance indicators, such as connections per second and packets per second;
            –       storage performance indicators, such as bandwidth and input/output preferences per second;
            –       data disaster tolerance performance indicators including recovery point indicator.


            9       Security considerations

            Security  aspects  for  consideration  within  the  cloud  computing  environment,  especially  for  BDaaS,  are
            addressed by security challenges for CSPs, as described in [b-ITU-T X.1601]. In particular, [b-ITU T X.1601]
            analyses security threats and challenges, and describes security capabilities that could mitigate these threats
            and meet the security challenges.

            [b-ITU-T X.1631] provides guidelines supporting the implementation of information security controls for CSCs
            and CSPs. Many of the guidelines guide the CSPs to assist the CSCs in implementing the controls, and guide
            the  CSCs  to  implement  such  controls.  Selection  of  appropriate  information  security  controls,  and  the
            application of the implementation guidance provided, will depend on a risk assessment as well as any legal,
            contractual, regulatory or other cloud-sector specific information security requirements.
            It is also recommended that the guidelines for CSC data security described in [b-ITU-T X.1641] are considered.
            It provides generic security guidelines for the CSC data in cloud computing, analyses the CSC data security
            life-cycle and proposes security requirements at each stage of the data life-cycle.








































            50       Basics of Big data
   53   54   55   56   57   58   59   60   61   62   63