Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-X.1471 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2024-12-06 | ÃÑÆäÀÌÁö | 58 |
ÇѱÛÇ¥Áظí | ¿Â¶óÀÎ ºÐ¼® ¼ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ | ||
¿µ¹®Ç¥Áظí | Reference monitor for online analytics services | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºñÀΰ¡ ¶Ç´Â ÀǵµÇÏÁö ¾ÊÀº µ¥ÀÌÅÍ À¶ÇÕ ±×¸®°í ºÐ¼®À» ¹æÁöÇϱâ À§ÇÑ ÀϹÝÀû ÂüÁ¶ ¸ð´ÏÅ͸µ ¹× ¿î¿µ¿¡ ´ëÇÑ »ç¾çÀ» Á¦°øÇÑ´Ù. ±×¸®°í »óÈ£ ¿î¿ë¼ºÀ» À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍÀÇ ÀÛµ¿ ¹× ÇÁ·Î¼¼½º°¡ Æ÷ÇԵǸç, ´ÙÀ½ÀÇ ³»¿ëÀ» ´ã°í ÀÖ´Ù.
- ÂüÁ¶ ¸ð´ÏÅÍ °³¿ä - ÂüÁ¶ ¸ð´ÏÅÍ À§Çù°ú Á¶Ä¡ - ºÐ¼® ¼ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ - ºñµð¿À ¹× ¿Àµð¿À µ¥ÀÌÅÍÀÇ ºÐ¼® ¼ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ - °ü°è µ¥ÀÌÅÍ ºÐ¼® ¼ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ |
||
¿µ¹®³»¿ë¿ä¾à | Big data analysis service is based on the undefined unstructured data including user behaviour, purchase, payment, location and consuming of various internet contents. It can provide new insights not previously discovered and predicts future states. However, some un-authorized data can be used maliciously in the analysis process.
This Recommendation describes a reference monitor for big data analytics and operations to detect an un-authorized data use. The Recommendation analyses security threats and challenges in the big data analytics, and describes security considerations that could mitigate these threats and address security challenges with access control mechanisms. A reference monitor methodology based on access control is provided for determining which of these security capabilities are required for mitigating security threats and addressing security challenges for big data analytics. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-X.1471.pdf |