Page 102 - 2015 Security in Telecommunications and Information Technology
P. 102
3 Unleashing the potential of the Internet of Things
Requirement Requirement Requirement description Summary of
number category the requirement
DM1 Data The IoT is required to support Storing data of things
management storing data of things based on is required to be
predefined rules and policies. supported.
DM2 Data Data fusion and mining based on Processing data of
management predefined rules and policies are things is required to
required to be supported. be supported.
DM3 Data The IoT is required to provide Querying historical
management historical information about data of things is
things required to be
supported.
DM4 Data Access control of data by their Data access control by
management owner is required to be the data owners is
supported in IoT, so that IoT required.
users can have the ability to
control how their data are
exposed to other IoT users
DM5 Data The IoT is required to provide Data exchange with
management access to external data sources, entities outside the
e.g., health databases outside IoT is required to be
the IoT. supported.
DM6 Data The IoT is required to provide Integrity checking and
management integrity checking and life cycle life cycle management
management of data of things, of data of things is
so that the IoT is able to provide required.
high availability and reliability
of data of things.
DM7 Data Semantic annotation of data of Semantic annotation
management things is required. Semantic and semantic access to
access to data of things is data of things are
required, so that automatic required.
querying of things can be
supported.
DM8 Data Storage, transfer and aggregation Semantic storage,
management of data of things are required to transfer and
be performed automatically aggregation of data of
according to the requirements of things are required.
IoT users or applications.
SP1 Security and The IoT is required to support Communication
privacy secure, trusted and privacy security is required.
protection protected communication
capability.
SP2 Security and The IoT is required to provide Data management
privacy secure, trusted and privacy security is required.
protection protected data management
capability.
SP3 Security and The IoT is required to provide Service provision
privacy secure, trusted and privacy security is required.
protection protected service provision
capability.
88 Rec. ITU-T Y.4100/Y.2066 (06/2014)