1 Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of big data analysis in mobile Internet services
7 Threats in mobile Internet big data analysis services
7.1 Analysis result
overuse
7.2 Data analysis without
user's consent
7.3 Data disclosure
7.4 Data forgery
7.5 Disclosure information
7.6 Disclosure of inferred
information
7.7 Disclosure of user
behaviour information
7.8 Inaccurate or mistaken
analysis
7.9 Location information
overuse
7.10 Over analysis
7.11 Trojan and viruses
7.12 Unauthorized access
7.13 Unauthorized analysis
7.14 Unauthorized
analytical application
8 Relationship of security
threats to entities
9 Security requirements
9.1 Analysis algorithm(s)
check
9.2 Authentication
9.3 Authorization
9.4 Data minimization
9.5 Data retention limits
9.6 Data source check
9.7 Incident response for
malware
9.8 Information protection
9.9 Resistance to fake
data
9.10 Secure data
acquisition
9.11 Secure audit
9.12 Secure data storage
9.13 User consent
10 Relationship
between security requirements and security threats
11 Security functions for big data analytics in mobile Internet services
11.1 Authorization
11.2 Authentication
11.3 Digital signature
11.4 Encipherment
11.5 Event detection
11.6 Key exchange
11.7 Security audit trail
11.8 Security recovery
11.9 User reminder
11.10 Relationship between security functions and security requirements
Bibliography