ETSI TR 103 304-2016 CYBER Personally Identifiable Information (PII) Protection in mobile and cloud services (V1 1 1)《网络 移动和云服务中的个人识别信息(PII)保护(V1 1 1)》.pdf
《ETSI TR 103 304-2016 CYBER Personally Identifiable Information (PII) Protection in mobile and cloud services (V1 1 1)《网络 移动和云服务中的个人识别信息(PII)保护(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 103 304-2016 CYBER Personally Identifiable Information (PII) Protection in mobile and cloud services (V1 1 1)《网络 移动和云服务中的个人识别信息(PII)保护(V1 1 1)》.pdf(23页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 103 304 V1.1.1 (2016-07) CYBER; Personally Identifiable Information (PII) Protection in mobile and cloud services TECHNICAL REPORT ETSI ETSI TR 103 304 V1.1.1 (2016-07) 2 Reference DTR/CYBER-0002 Keywords access control, privacy ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - F
2、RANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be
3、made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print,
4、 the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this
5、 and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduc
6、ed or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction e
7、xtend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Memb
8、ers and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 103 304 V1.1.1 (2016-07) 3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g3Executive summary 5g31 Scope 6g32 References 6g32.1
9、 Normative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 9g34 Overview 10g35 Threats to PII 10g35.1 Overview 10g35.2 Data fusion and re-identification 11g35.3 Data breaches . 11g35.4 Service termination/inaccessibility . 11g
10、35.5 Lock-in mechanisms. 11g35.6 Ransomware and Spyware . 11g35.7 Over-collection . 12g35.8 Mis-contextualization . 12g35.9 User Impersonation 12g35.10 Alteration of ownership or access rights 12g35.11 Alteration of persistence . 12g35.12 Synopsis . 13g36 Technical aspects 14g36.1 Principles from IS
11、O/IEC 29100 . 14g36.2 Degree of link-ability . 14g36.3 Trust . 15g36.4 Awareness of data transaction 15g36.5 Semantics . 16g36.6 Portability . 16g36.7 Access control 16g36.8 Log and auditing . 17g36.9 Embedded sensors and devices 17g36.10 Lawful interception 17g37 Use cases, actors and roles . 18g37
12、.1 Overview 18g37.2 Actors and roles 18g37.3 Use case UC1 . 19g37.4 Use case UC2 . 19g3Annex A: Scenarios 20g3A.1 Medical scenario 20g3A.2 Flight Passenger Name Record 20g3A.3 Bring Your Own Device (BYOD) 20g3A.4 Fake or untrusted access mobile networks . 21g3A.5 Untrusted app scenario . 21g3ETSI ET
13、SI TR 103 304 V1.1.1 (2016-07) 4 A.6 Social networking . 21g3A.7 In-car blackbox . 22g3A.8 Cloud unavailability . 22g3A.9 Self-quantifying 22g3History 23g3ETSI ETSI TR 103 304 V1.1.1 (2016-07) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have bee
14、n declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“,
15、 which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenc
16、ed in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Cyber Security (CYBER). Modal verbs terminology In the present document “should“, “s
17、hould not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Executive
18、 summary ICT is moving towards a genuinely distributed and virtualized environment characterized by a rich set of mobile and cloud services available to users. In this context, it may be difficult to have a priori knowledge of who may need access to data, when and where this may happen and whether t
19、hat data could be or contain Personally Identifiable Information (PII). The present document proposes a number of scenarios focusing on todays ICT and develops an analysis of possible threats related to PII in mobile and cloud based services. It also presents technical challenges and needs derived f
20、rom regulatory aspects (lawful interceptions). The aim is to consolidate a general framework, in line with regulation and international standards, on top of which technical solutions for PII protection can be developed. ETSI ETSI TR 103 304 V1.1.1 (2016-07) 6 1 Scope The present document proposes a
21、number of scenarios focusing on todays ICT and develops an analysis of possible threats to Personally Identifiable Information (PII) in mobile and cloud based services. It also presents technical challenges and needs derived from regulatory aspects (lawful interceptions). It consolidates a general f
22、ramework, in line with regulation and international standards, where technical solutions for PII protection can be plugged into. 2 References 2.1 Normative references Normative references are not applicable in the present document. 2.2 Informative references References are either specific (identifie
23、d by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this claus
24、e were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ISO/IEC 29100:2011: “Information technology
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1033042016CYBERPERSONALLYIDENTIFIABLEINFORMATIONPIIPROTECTIONINMOBILEANDCLOUDSERVICESV111 网络 移动

链接地址:http://www.mydoc123.com/p-736401.html