ETSI TR 101 567-2016 Lawful Interception (LI) Cloud Virtual Services for Lawful Interception (LI) and Retained Data (RD) (V1 1 1)《合法侦听(LI) 合法侦听(LI)的云虚拟服务和保留数据(RD)(V1 1 1)》.pdf
《ETSI TR 101 567-2016 Lawful Interception (LI) Cloud Virtual Services for Lawful Interception (LI) and Retained Data (RD) (V1 1 1)《合法侦听(LI) 合法侦听(LI)的云虚拟服务和保留数据(RD)(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 101 567-2016 Lawful Interception (LI) Cloud Virtual Services for Lawful Interception (LI) and Retained Data (RD) (V1 1 1)《合法侦听(LI) 合法侦听(LI)的云虚拟服务和保留数据(RD)(V1 1 1)》.pdf(103页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 101 567 V1.1.1 (2016-01) Lawful Interception (LI); Cloud/Virtual Services for Lawful Interception (LI) and Retained Data (RD) TECHNICAL REPORT ETSI ETSI TR 101 567 V1.1.1 (2016-01) 2 Reference DTR/LI-00084 Keywords cloud, lawful interception, virtual services, security, retained data ETSI 6
2、50 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/ww
3、w.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived diffe
4、rence in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or cha
5、nge of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx
6、Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI.
7、 The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks
8、of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 3 Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g31 Sco
9、pe 7g32 References 7g32.1 Normative references . 7g32.2 Informative references 7g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 12g34 Cloud Services Overview . 16g34.1 Introduction 16g34.2 Perspectives on Cloud services 16g34.2.1 Introduction. 16g34.2.2 General characte
10、ristics of Cloud services . 17g34.2.3 Service models for Cloud services 17g34.2.4 Deployment models for Cloud services 17g34.3 Cloud reference architectures and infrastructures 18g34.4 Resource management 21g34.5 Enabling Mobile Cloud 22g35 Network Virtual Services Overview 24g35.1 Introduction 24g3
11、5.2 NFV relationship to Cloud Services . 25g35.3 NFV standardization. 25g36 Lawful Interception 26g36.1 Introduction 26g36.2 LEA 26g36.2.1 Identify and communicate with the responsible service providers . 26g36.2.2 Facilitate access and delivery across different jurisdictions . 26g36.2.3 Existing te
12、lecommunications services implemented using Cloud/virtual capabilities 26g36.3 CSP / C(L)SP Provider Obligations . 27g36.3.1 Overview 27g36.3.2 Use of trusted third parties (TTP) . 27g36.4 LI implementation scenarios 28g36.5 Implementation Challenges 28g36.5.1 Introduction. 28g36.5.2 Encryption Chal
13、lenge . 29g36.5.3 Multiple copies of intercepted traffic 29g36.5.4 Integration of Partial Communication Segments 29g36.5.5 Nomadicity . 29g36.5.6 Location 29g36.5.7 Target Identification . 30g36.5.8 Correlation 31g36.5.9 Network Virtualization . 31g36.6 Mobile Networks 31g36.6.1 Introduction. 31g36.
14、6.2 Non-MNO transited Cloud Applications/Services 31g36.6.3 Cloud Applications/Services integral to MNO . 31g36.6.4 Cloud Applications/Services Transit MNO via Proxies . 32g36.6.5 Cloud Applications/Services Transit MNO via Policies . 34g36.7 Mobile Networks 34g36.7.1 General 34g36.7.2 Mobile Cloud
15、34g36.7.3 General 34g3ETSI ETSI TR 101 567 V1.1.1 (2016-01) 4 6.7.4 Proxy . 35g36.7.5 ANDSF . 35g37 Traditional LI models and methods applied to the Cloud environment . 36g37.1 Introduction 36g37.2 Traditional LI models . 36g37.3 Adaptation to the Cloud environment 36g37.4 Handover Interfaces for ne
16、w Cloud services 37g37.5 Handover interfaces for virtualized network elements . 37g37.6 Hybrid Services 37g37.6.1 Introduction. 37g37.6.2 Volte . 37g37.6.3 Peer to Peer Services. 37g37.7 Cloud Lawful Interception Function (CLIF) 38g38 Security of LI in a Cloud or Network Virtualized environment . 38
17、g38.1 Lawful Interception security. 38g38.2 Cloud services security . 39g38.3 Security Considerations in a Virtualized Network Environment . 39g39 LI - Cloud gaps and challenges 39g39.1 Generic Cloud LI interface specification gap . 39g39.2 Specific Cloud LI specification gaps 40g39.2.1 General 40g3
18、9.2.2 Scenario 2: Cloud Services that transit the network facilities via Proxy 40g39.2.3 Scenario 3: Cloud Services that transit the network facilities via Policies . 40g39.2.4 Target Identity expressions for Cloud LI 41g39.2.5 Application Identity expressions for Cloud LI 41g39.2.6 Virtual Observab
19、le (VO) expressions for Cloud LI 41g39.2.7 CLIF Specifications 41g310 LI - Network Virtualization gaps and challenges . 42g311 Conclusions and Recommendations . 42g3Annex A: Several Use cases . 43g3A.1 Telepresence use case 1: TSP offers Telepresence and all participants are subscribers of the TSP 4
20、3g3A.2 Telepresence use case 2: Telepresence is offered by a Third Party provider. Participants are subscribers of the same or different TSP(s) . 44g3A.3 Virtual Machine Image (VMI) Basic Use Case . 46g3A.4 In Memory File System or Database 47g3A.5 Distributed Application Communicating through IPC .
21、 47g3A.6 Mobile Portal or Dashboard using both Operator Provided and Enterprise Applications . 48g3A.7 Enterprise Cloud based or Dashboard using both Operator Provided and Enterprise Applications 50g3A.8 Use of VDI supporting Offline Operations 51g3A.9 Delayed Communication by Transferring a Cloud b
22、ased Virtual Machine Image (VMI) . 52g3A.10 Consumer based Files Sharing . 54g3A.11 Consumer based File Sharing 1 56g3A.12 Consumer based File Sharing 2 59g3A.13 Consumer based File Sharing 3 63g3A.14 Consumer based File Sharing 4 67g3A.15 Consumer based File Sharing 5 70g3A.16 Consumer based File S
23、haring 6 75g3ETSI ETSI TR 101 567 V1.1.1 (2016-01) 5 A.17 Consumer based File Sharing 7 80g3A.18 Consumer based File Sharing 8 84g3A.19 Access Network Discovery and Selection Function (ANDSF) Use Case 90g3Annex B: Cloud Virtualization Fora 93g3History 103g3ETSI ETSI TR 101 567 V1.1.1 (2016-01) 6 Int
24、ellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members and can be found in ETSI SR 000 314: “Intellectual Property Rig
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1015672016LAWFULINTERCEPTIONLICLOUDVIRTUALSERVICESFORLAWFULINTERCEPTIONLIANDRETAINEDDATARDV111

链接地址:http://www.mydoc123.com/p-735361.html