ATIS 1000075-2016 Cloud Services Impacts on Lawful Interception Study.pdf
《ATIS 1000075-2016 Cloud Services Impacts on Lawful Interception Study.pdf》由会员分享,可在线阅读,更多相关《ATIS 1000075-2016 Cloud Services Impacts on Lawful Interception Study.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-1000075 ATIS Standard on - Cloud Services Impacts on Lawful Interception Study As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings together the top global ICT companies to advance the industrys most pressing busin
2、ess priorities. ATIS nearly 200 member companies are currently working to address the All-IP transition, 5G, network functions virtualization, big data analytics, cloud services, device solutions, emergency services, M2M, cyber security, network evolution, quality of service, billing support, operat
3、ions, and much more. These priorities follow a fast-track development lifecycle from design and innovation through standards, specifications, requirements, business use cases, software toolkits, open source solutions, and interoperability testing. ATIS is accredited by the American National Standard
4、s Institute (ANSI). The organization is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of the oneM2M global initiative, a member of and major U.S. contributor to the International Telecommunication Union (ITU), as well as a member of t
5、he Inter-American Telecommunication Commission (CITEL). For more information, visit www.atis.org. Notice of Disclaimer ATIS-0700005-2010a, Supplement A for Lawfully Authorized Electronic Surveillance (LAES) for 3GPP IMS-based VoIP and other Multimedia Services.3025-B J-STD-025-B, Lawfully Authorized
6、 Electronic Surveillance.4500-292 NIST Special Publication 500-292, NIST Cloud Computing Reference Architecture, Recommendations of the National Institute of Standards and Technology, September 2011.5800-145 NIST Special Publication 800-145, The NIST Definition of Cloud Computing, Recommendations of
7、 the National Institute of Standards and Technology, September 2011.5042 ATIS-1000042, Support for Lawfully Authorized Electronic Surveillance (LAES) of Advanced Voice over Packet (VoP) Conferencing.63 Definitions, Acronyms, it uses terminology from the networking and LI environments and assumes the
8、 reader has a basic understanding of both. 4.2 Cloud Services WiFi Hot Spots shopping malls, airports; Mobile access HSPA, LTE, etc. Location perspective: Users may access the service at different locations: home, shopping mall, train, bus, airplane, another country, etc. Protocol perspective: Diffe
9、rent protocols may be used in providing/granting the service to the users: Session Initiation Protocol (SIP), Extensible Markup Language (XML), Hypertext Transfer Protocol (HTTP), or Diameter, RADIUS, etc. Service perspective: Users may access a variety of cloud-based services: playing online games,
10、 chat during a game, watching a video stream, downloading a book, web-based conferencing, web-based chat which may include text, audio, or video, etc. In some situations, LI may only apply to a Telecommunications Service Provider (TSP) that leases the infrastructure; for example, from a cloud servic
11、e provider. For simplicity of argument, the cloud can be divided into two layers, as illustrated in Figure 5.1. The top layer is the User Service Provider (USP), the entity that owns the subscriber relationship, and the bottom is the XaaS Provider (XaaSP), which provides the cloud service to the USP
12、. A Cloud Service Provider (CSP) can be one of many varieties of XaaSP. The USP can provision any number of services on the XaaSP infrastructure, such as telecom, email, or a number of LI modules. The XaaSP is contracted by the USP to physically instantiate the services that the top layer sells to i
13、ndividual users. Figure 5.1 Representation of two layer division within a cloud environment In cloud language, the services are referred to as “Something as a Service”. For example, they can be: Communication as a Service (CaaS) Data as a Service (DaaS) Infrastructure as a Service (IaaS) Network as
14、a Service (NaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Virtual Desktop as a Service (VaaS), etc. User User Service XaaS Provider Subscriber Relationship SLA type B2B agreement ATIS-1000075 8 . 5.2 Intercept Subject In a non-cloud environment, an Intercept Subject is identified in
15、 a number of ways, for example: Telephone Number. SIP/TEL Uniform Resource Identifier (URI). Media Access Control (MAC) Address, International Mobile Station Equipment Identity (IMEI). International Mobile Subscriber Identity (IMSI). Static IP Address. For some LI cases, even a network resource may
16、be identified as the Intercept Subject (e.g., Conference URI). In a cloud environment, an Intercept Subject may have to be identified for lawful interception purposes through the identities used by the Intercept Subject to log in to the cloud-based service. In most situations, this could be a user I
17、D. In some situations, it can also be the telephone number or SIP/TEL URI or even the IP address. 5.3 Distribution of LI Implementation In a cloud environment, there is no single manner in which LI capability is provided, and in fact what is sometimes necessary is the involvement of multiple parties
18、. This will be illustrated with four diagrams in the following Figure 5.2. UserXaaS ProviderUSP UserXaaS ProviderUSP TTPUser USPUser USPXaaS(a)(c)(d)(b)IAPs IAPsDFLEADFLEAXaaS ProviderXaaS ProviderXaaSProviderIAPs DFLEAUSPXaaSProviderIAPs TTPDFLEAATIS-1000075 9 Figure 5.2 Distribution of LI Implemen
19、tation In each of these figures, the USP is the provider of a cloud service to some user that is the potential target of a lawful intercept. The USP is therefore the entity responsible for the execution of a lawful intercept. In Figure 5.2(a), the USP carries out the lawful intercept entirely on its
20、 own. The Delivery Function (DF) box represents the delivery function (of the interception to a law enforcement collection function). Note that in this situation there are three basic ways of implementing the interception: 1. The USP can implement, entirely in its application, the LI capability. 2.
21、The USP can attach certain interfaces within itself to probes, and the probes implement the LI capability. Note that in a virtual environment, this requires some type of “virtual tap”. These points are denoted as IAPs (intercept access points). 3. The USP can implement, in its application, proprieta
22、ry LI interfaces and Application Program Interface (API) which are attached to an LI mediation system within the USP. These interfaces and API are also denoted as IAPs. Any and all information about the presence of the intercept, the intercepts configuration data, and the actual intercepted informat
23、ion for a subject shall not be accessible to any provider or agent not lawfully authorized to participate in this interception and/or delivery. In Figure 5.2(b), the USP uses a separate cloud service to provide at least part of the LI function. The most common situation is the service of a Trusted T
24、hird Party (TTP). In this model, the DF is shown within the TTP. The TTP needs interfaces into the USP (to the IAPs), and these can be of types 2 and 3 above (i.e., passive probe interfaces or active mediation APIs and interfaces). In Figure 5.2(b), the TTP service is most likely running in the same
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS10000752016CLOUDSERVICESIMPACTSONLAWFULINTERCEPTIONSTUDYPDF

链接地址:http://www.mydoc123.com/p-541482.html