Recommendation ITU-T Y.3601 provides a framework for data exchange in a big data ecosystem. Big data exchange covers multiple processes for data import and data export within a big data ecosystem. Big data exchange is used for exchanging data of multiple types and multiple formats from a data source to a data target.
This Recommendation specifies framework of big data driven networking. The scope of this recommendation includes the model architecture of big data driven networking (bDDN), the high-level capabilities of bDDN, the interface capabilities among different planes and layers.
Recommendation ITU-T X.1603 analyses data security requirements for the monitoring service of cloud computing which includes monitoring data scope requirements, monitoring data lifecycle, security requirements of monitoring data acquisition and security requirements of monitoring data storage. Monitoring data scope requirements include the necessary monitoring scope that cloud service providers (CSPs) should provide to maintain cloud security and the biggest monitoring scope of CSPs. Monitoring data lifecycle includes data creation, data store, data use, data migrate, data present, data destroy and data backup. Monitoring acquisition determines security requirements of the acquisition techniques of monitoring service. Monitoring data storage determines security requirements for CSPs to store the monitoring data.
Recommendation ITU-T X.1641 provides generic security guidelines for the cloud service customer (CSC) data in cloud computing. It analyses the CSC data security lifecycle and proposes security requirements at each stage of the data lifecycle. Furthermore, Recommendation ITU-T X.1641 provides guidelines on when each control should be used for best security practice.
Recommendation ITU-T X.1601 describes the security framework for cloud computing. The Recommendation analyses security threats and challenges in the cloud computing environment, and describes security capabilities that could mitigate these threats and address security challenges. A framework methodology is provided for determining which of these security capabilities will require specification for mitigating security threats and addressing security challenges for cloud computing. Appendix I provides a mapping table on how a particular security threat or challenge is addressed by one or more corresponding security capabilities.
Recommendation ITU-T Y.3522 provides an overview of end-to-end (E2E) cloud service lifecycle management by specifying cloud service lifecycle metadata, the cloud service lifecycle management framework, cloud service lifecycle management stages and the relationship with cloud computing reference architecture. This Recommendation also provides E2E cloud service lifecycle management functional requirements derived from the corresponding typical use cases.
Recommendation ITU-T Y.3514 specifies a framework of trusted inter-cloud computing and relevant use cases. It provides general requirements for trusted inter-cloud and specific ones related to governance, management, resiliency, security and confidentiality of trusted inter-cloud.
Corrigendum 1 replaces the definition of dependability.
Recommendation ITU-T Y.3512 describes the concept of Network as a Service (NaaS) and its functional requirements. It provides typical use cases of NaaS and specifies the functional requirements of three aspects, ranging from NaaS application, NaaS platform and NaaS connectivity which are based on the corresponding uses cases and cloud capabilities types.
Recommendation ITU-T X.1642 provides generic operational security guidelines for cloud computing from the perspective of cloud service providers (CSPs). It analyses the security requirements and metrics for the operation of cloud computing. A set of security measures and detailed security activities for the daily operation and maintenance are provided to help CSPs mitigate security risks and address security challenges for the operation of cloud computing.
Recommendation ITU-T Y.3519 describes the functional architecture for big data as a service (BDaaS). The functional architecture is defined on the basis of the analysis of requirements and activities of cloud computing-based big data described in Recommendation ITU-T Y.3600.
Following the methodology of Recommendation ITU-T Y.3502, the BDaaS functional architecture is described from a set of functional components and cross-cutting aspects. The specified functional components consist of sets of functions that are required to perform the BDaaS activities for the roles and sub-roles described in Recommendation ITU-T Y.3600.
Recommendation ITU-T M.3371 defines the general and functional management requirements that support service management in a cloud-aware telecommunication management system (see Recommendation ITU-T M.3070) and provides a functional framework for service management in a cloud-aware telecommunication management system.
Recommendation ITU-T M.3372 introduces a functional framework and functional requirements for resource management in cloud-aware telecommunication management systems. It provides the composition of the functional framework and the functions of each component in the framework. In this Recommendation, the general background and status of cloud computing management are also analysed. The benefit of introducing a functional framework and functional requirements for resource management in cloud-aware telecommunication management systems is also explained.