ITU Big Data Standard
ITU Big Data Standard
ITU-T Y.3600
TELECOMMUNICATION (11/2015)
STANDARDIZATION SECTOR
OF ITU
Summary
Recommendation ITU-T Y.3600 provides requirements, capabilities and use cases of cloud
computing based big data as well as its system context. Cloud computing based big data provides the
capabilities to collect, store, analyse, visualize and manage varieties of large volume datasets, which
cannot be rapidly transferred and analysed using traditional technologies.
History
Edition Recommendation Approval Study Group Unique ID*
1.0 ITU-T Y.3600 2015-11-06 13 11.1002/1000/12584
Keywords
Big data, big data ecosystem, cloud computing, data analytics, data storage, real-time analysis.
* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/11
830-en.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some
other obligatory language such as "must" and the negative equivalents are used to express requirements. The
use of such words does not suggest that compliance with the Recommendation is required of any party.
ITU 2015
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the
prior written permission of ITU.
1 Scope
This Recommendation provides an approach to use cloud computing to meet existing challenges in
the use of big data. This Recommendation addresses the following subjects:
• Overview of big data;
– Introduction to big data;
– Big data ecosystem and roles;
– Relationship between cloud computing and big data;
• Cloud computing based big data system context and benefits;
• Cloud computing based big data requirements;
• Cloud computing based big data capabilities.
Note that use cases of cloud computing based big data are provided in Appendix I and II.
2 References
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the
currently valid ITU-T Recommendations is regularly published. The reference to a document within
this Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
[ITU-T X.1601] Recommendation ITU-T X.1601 (2015), Security framework for cloud
computing.
[ITU-T Y.3500] Recommendation ITU-T Y.3500 (2014) | ISO/IEC 17788:2014, Information
technology – Cloud computing – Overview and vocabulary.
[ITU-T Y.3502] Recommendation ITU-T Y.3502 (2014) | ISO/IEC 17789:2014, Information
technology – Cloud computing – Reference architecture.
3 Definitions
5 Conventions
The keywords "is required to" indicate a requirement which must be strictly followed and from
which no deviation is permitted if conformance to this document is to be claimed.
The keywords "is recommended" indicate a requirement which is recommended but which is not
absolutely required. Thus this requirement need not be present to claim conformance.
The keywords "can optionally" indicate an optional requirement which is permissible, without
implying any sense of being recommended. This term is not intended to imply that the vendor's
implementation must provide the option and the feature can be optionally enabled by the network
operator/service provider. Rather, it means the vendor may optionally provide the feature and still
claim conformance with the specification.
In the body of this document and its annexes, the words shall, shall not, should, and may sometimes
appear, in which case they are to be interpreted, respectively, as is required to, is prohibited from, is
recommended, and can optionally. The appearance of such phrases or keywords in an appendix or
in material explicitly marked as informative are to be interpreted as having no normative intent.
Positive resolving of the above challenges opens new opportunities to discover new data
relationships, hidden patterns or unknown dependencies.
Publish
Find
metadata
Table 7-1 – Mapping table between big data ecosystem roles and
cloud computing based big data system context sub-roles
Big data ecosystem roles Cloud computing based big data system context sub-roles
Data provider CSN:data provider
Big data service provider CSP:big data infrastructure provider, CSP:big data application provider
Big data service customer CSC:big data service user
Figure 7-1 illustrates the cloud computing sub-roles for big data. Figure 7-1 also identifies activities
specific for big data and assigns them to cloud computing sub-roles. Arrows used in Figure 7-1
show the data and service flows within a cloud computing based big data system context.
Figure 7-2 illustrates, as an example scenario, how cloud computing supports big data services from
the viewpoints of CSP: Big data application providers (BDAPs) and CSP:Big data infrastructure
providers (BDIPs). A cloud based big data service, which is provided by a CSP:BDAP or a
CSP:BDIP, utilizes other sub-roles of the cloud service provider.
The CSP provides services of application and platform capability types such as software as a
service and platform as a service and these services can be used by the CSP:BDAP to perform data
analysis, visualization and other big data applications. In addition, the CSP:BDIP can use the cloud
services of cloud infrastructure capability types such as compute as a service, data storage as a
service, infrastructure as a service and network as a service to perform big data services for data
collection, data processing, data management, etc.
Description There are lots of network devices such as laptop computers, smart phones, smart
pads, PDAs, health equipment, etc. Owners of these devices can access Internet and
support network services in order to get some information, to buy something, to see
movies, etc. Each activity might be logged such as network access information,
records of visiting a website as well as usage of a service category in network service
providers. This data volume can be of a tremendous size due to so many devices
accessing Internet at same time. Consequently, data processing can become a big data
problem. More meaningful information can however be extracted from big data.
In this scenario, the CSP:BDIP should have capabilities to collect data and store said
data, and the CSP:BDAP should have capabilities to analyse data which are related to
the web service user's activities. The CSP:BDAP also has the task of providing the
results of analysis to the CSC:BDSU.
CSP:BDIP can store relevant information of the web service user's activities in the big
data storage and provides this data to the CSP:BDAP. The CSP:BDAP can receive
requests for operations with data and get some other information (e.g., weather
information, season, holiday information, etc.) from external data sources which are
supported by the CSN:DP.
The CSP:BDAP may know the patterns or preferences of the user through analysis of
the user's activities and pre-stored information. The CSP:BDAP can then provide the
user's pattern information and the user's preferences to the CSC:BDSU. Such
information is very helpful in enabling the CSC:BDSU to advertise to or support the
web service users.
Roles/sub-roles – CSP:BDIP
– CSP:BDAP
– CSN:DP
– CSC:BDSU
Pre-conditions – The CSP:BDIP can recognize the source and destination of the packet from the
(optional) user under permission using personal user information
Post-conditions
(optional)
Derived – Data collection (refer to clause 8.1, requirements 1, 2)
requirements – Data preprocessing (refer to clause 8.2, requirements 1, 4)
– Data storage (refer to clause 8.3, requirement 1, clause 8.7, requirement 3)
– Data analysis (refer to clause 8.4, requirement 1, 12)
– Data application (refer to clause 8.5, requirement 6, clause 8.1, requirement 4)
– Data management (refer to clause 8.6, requirements 2, 4)
Description In this use case, the cloud service provider should support the CSP:BDIP provider to
collect, process and transmit the massive multimedia data using cloud services. In
addition, the CSP should support the CSP:BDAP to provide massive multimedia
related application services. The CSP:BDAP can provide the multimedia analysis and
visualization to the user and provide the multimedia collection (transmission),
processing and storage to the user or the CSP:BDAP.
Roles/sub-roles – CSP
– CSP:BDIP
– CSP:BDAP
– CSC:BDSU
Figure
Pre-conditions
(optional)
Post-conditions
(optional)
Derived – Acceleration processing (refer to clause 8.2, requirement 2)
requirements – Network monitoring (refer to clause 8.6, requirement 5)
Pre-conditions – The CSN:DP can provide user consumption behaviour data such as shopping
frequency, often purchased items, payment capacity, etc.
Post-conditions – The CSP:BDAP can have responsibility for providing analysis result of user
consumption behaviour data such as prediction information and user behaviour
analysis.
– The CSC:BDSU gives accurate and personalized sales and promotions such as
product recommendations, sales volume prediction and user behaviour analysis.
Derived – Data collection (refer to clause 8.1, requirements, 3, 6)
requirements – Data analysis (refer to clause 8.4, requirements 8, 9, 12)
– Data management (refer to clause 8.7, requirement 5)
Pre-conditions – The CSN:DP can provide the raw data reflecting the behaviours of the SNS users.
Post-conditions – The CSP:BDAP can have responsibility for providing analysis results of network
user behaviour to the CSC:BDSU. It can have responsibility for providing the co-
relationships between the users of an SNS. The CSP:BDAP should follow the
privacy rules, if applicable.
– The CSC:BDSU utilizes data of co-relationships between the users of an SNS to give
recommendations of new services or new friends in an SNS, etc., following privacy
rules, if applicable.
Derived – Data storage (refer to clause 8.3, requirements 1, 2, 5, clause 8.7, requirement 1)
requirements – Data analysis (refer to clause 8.4, requirements 6, 7)
Pre-conditions – The CSN:DP can provide the raw data which reflects mobile network users'
behaviour.
Post-conditions – The CSP:BDAP can have responsibility for providing analysis results of mobile
network user behaviour to the CSC:BDSU. The analysis results show the users'
habits of using network services, such as in which time slots the users may access
which websites or applications.
– The CSC:BDSU pushes and promotes the value added services, applications and
advertisements for suitable mobile network users.
Derived – Data collection (refer to clause 8.1, requirement 1)
requirements – Data storage (refer to clause 8.3, requirement 1)
– Data analysis (refer to clause 8.4, requirements 2, 7, 12 )
– Data application (refer to clause 8.4, requirement 13, clause 8.7, requirement 1)
Title Big data based mobile network (3G/4G) billing detail query
Description Telecom operators use big data application services to provide detailed billing
information of mobile network users. Telecom mobile network users use 3G/4G
networks to access mobile internet services using mobile devices such as mobile phones
and tablet computers .The access network devices, such as PDSN or combined GPRS
service node (SGSN/CGSN) devices, record all kinds of billing information of each of
the mobile network users into a standardized format, such as a charging detail record
(CDR). A charging gateway function (CGF) modular collects different charging records
and forwards these charging records to the billing system. The billing system keeps and
processes all the CDRs from different CGFs and finally generates the charging bill for
each mobile user. Telecom operators set up big data infrastructure and store huge
amounts of user billing detail information.
Mobile network users could quickly query the detailed billing information based on the
big data infrastructure and big data applications. A mobile network user could get the
statistics and analytics information for instance in terms of time, type of website and
applications accessed through a 3G/4G mobile network for his/her internet access
actions through 3G/4G mobile networks..
Privacy rules are followed, if applicable.
Roles/sub-roles – CSN:DP
– CSP:BDAP
– CSP:BDIP
– CSC:BDSU
Figure
Post-conditions – CSP:BDAP can have functionalities for providing analysis result of network users'
CDR data to the CSC:BDSU.
– CSC:BDSU could quickly query the detailed billing record for each internet access
based on the analysis result.
Pre-conditions – The speed sensors and high-resolution cameras are installed at intersections and key
points of roads in the city and outskirts.
– The traffic of vehicles and the status of roads data are collected in real time.
– The big data applications for intelligent transport systems are built upon the private
or public big data infrastructure.
Pre-conditions The game company has to plan the analytical solution to support application
(optional) development. The solution utilization can vary depending on the new products being
launched, so the investment in a solution may prove to be ineffective.
Post-conditions The game company can define analytical campaigns for each product and optimize
(optional) the analysis effectiveness. Only currently required capabilities are used from the
BDaaS solution in a pay-as-you-go model.
Derived – Data collection (clause 8.1, requirements 1, 3, 5)
requirements – Data pre-processing (clause 8.2, requirements 3, 4)
– Data storage (clause 8.3, requirements 1, 2, 3, 4, 6, 7)
– Data analysis (clause 8.4, requirements 5, 10, 11)
– Data visualization (clause 8.5, requirements 1, 3, 4, 5)
– Data security and protection (clause 8.7, requirement 4)
Pre-conditions – The CSC:BDSU has registered in the service platform of the CSP of the
(optional) virtual distributed cluster service.
– The CSC:BDSU has applied the cloud storage space for accepting the input
data and output data from the virtual distributed cluster service cluster.
Post-conditions – The CSC:BDSU could quickly create the specified cluster with the desired
(optional) number of virtual machines and software versions.
– The CSC:BDSU gets the processing results after a planned time period.
Derived requirement – Data storage (refer to clause 8.3, requirement 1)
– Data analysis (refer to clause 8.4, requirements 2, 4, 7)
– Data management (refer to clause 8.6, requirements 1, 2, 3, 4, 5, 6)
– Data security and protection (refer to clause 8.7, requirements 2, 3, 4)
Mapping of big data ecosystem roles into user view of ITU-T Y.3502
(This appendix does not form an integral part of this Recommendation.)
Table III.1 shows the results of mapping between the sub-role of the cloud computing reference
architecture (CCRA) user view and the performance of similar roles in the big data ecosystem. A
similar sub-role with a data supplier does not exist in CCRA. A big data service customer and a
CSC may be considered to perform similar activities. Similarly, a data broker and CSN: cloud
service broker may be considered in the same manner. If the CCRA is assumed to contain the big
data service area, the activities for the CSN: cloud service broker should be extended in the data
perspective. The big data service provider is related to all sub-roles of the CSP. This means that the
big data service provider could be treated with an implanted feature or an independent sub-role of
the CSP.
Table III.1 – Mapping of big data ecosystem roles and sub-roles of the CCRA user view
User view
Big data ecosystem of ITU-T Note
Y.3502
Data For the cloud computing based big data environment, the
CSN
supplier new sub-role of the CSN for the data provider is required.
For the cloud computing based big data environment:
Data (option 1) the extension of the activities of the CSN: Cloud
service broker is required.
provider
Data broker CSN (option 2) the new sub-role of the CSN for data brokerage
is required.
(option 3) adding the "brokerage" activity on the sub-role
which corresponds with the data supplier is required.
For the cloud-based big data service environment:
(option 1) using the CSC is required.
Big data service customer CSC
(option 2) the new role or sub-role of the CSC for the big
data service customer is required.
The big data service provider could be treated with an
implemented feature.
Big data service provider CSP Nevertheless, to clarify the cloud-based big data service, an
independent sub-role of the CSP for the big data service
provider is required.
Series E Overall network operation, telephone service, service operation and human factors
Series F Non-telephone telecommunication services
Series G Transmission systems and media, digital systems and networks
Printed in Switzerland
Geneva, 2015