Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.867
Word version: 17.1.0
1…
5…
5
Use Cases and Architecture
6
Key issues
7
Potential solutions
8
Conclusions
A
Observations related to regulations
$
Change history
5
Use Cases and Architecture
Word‑p. 9
5.1
Use Cases
Word‑p. 9
5.1.1
Use Cases #1: UE Related Analytics of NWDAF
Word‑p. 9
5.1.1.1
Use Case details
Word‑p. 9
5.1.1.2
Individual Architecture
Word‑p. 9
5.1.2
Use Cases #2: UE Information Exposure for Mobile Edge Computing
Word‑p. 10
5.1.2.1
Use Case details
Word‑p. 10
5.1.2.2
Individual Architecture
Word‑p. 11
5.2
Common architecture
Word‑p. 11
6
Key issues
Word‑p. 12
6.1
Key Issue #1: User's consent for exposure of information to Edge Applications
Word‑p. 12
6.1.0
Use case mapping
Word‑p. 12
6.1.1
Key issue details
Word‑p. 12
6.1.2
Security threats
Word‑p. 12
6.1.3
Potential security requirements
Word‑p. 12
6.2
Key Issue #2 User consent for UE data collection
Word‑p. 13
6.2.1
Key issue details
Word‑p. 13
6.2.2
Security threats
Word‑p. 13
6.2.3
Potential security requirements
Word‑p. 13
6.3
Key Issue #3: Modification or revocation of user consent
Word‑p. 13
6.3.1
Key issue details
Word‑p. 13
6.3.2
Security threats
Word‑p. 13
6.3.3
Potential security requirements
Word‑p. 13
6.4
Key Issue #4: KI on relationship between the subscriber and the end-users
Word‑p. 14
6.4.1
Key issue details
Word‑p. 14
6.4.2
Security threats
Word‑p. 14
6.4.3
Potential security requirements
Word‑p. 14
6.5
Key issue #5: Unambiguous naming of purposes
Word‑p. 14
6.5.0
Use case mapping
Word‑p. 14
6.5.1
Key issue details
Word‑p. 14
6.5.2
Security threats
Word‑p. 14
6.5.3
Potential security requirements
Word‑p. 14
7
Potential solutions
Word‑p. 15
7.0
Mapping of solutions to key issues
Word‑p. 15
7.1
Solution #1: User Consent for Exposure of information to Edge Applications in Real Time
Word‑p. 15
7.1.1
Solution overview
Word‑p. 15
7.1.2
Solution details
Word‑p. 16
7.1.3
Solution evaluation
Word‑p. 16
7.2
Solution #2: User Consent for UE Related Analytics of NWDAF
Word‑p. 17
7.2.1
Solution overview
Word‑p. 17
7.2.2
Solution details
Word‑p. 17
7.2.2.1
NF Authorization based on User Consent
Word‑p. 17
7.2.2.2
User Consent Format
Word‑p. 18
7.2.2.3
Obtain of User Consent
Word‑p. 18
7.2.3
Solution evaluation
Word‑p. 18
7.3
Solution #3: User Consent for UE Related Analytics of NWDAF
Word‑p. 18
7.3.1
Solution overview
Word‑p. 18
7.3.2
Solution details
Word‑p. 19
7.3.2.1
NF Authorization based on User Consent
Word‑p. 19
7.3.2.2
User Consent Format
Word‑p. 19
7.3.2.3
Obtain of User Consent
Word‑p. 20
7.3.3
Solution evaluation
Word‑p. 20
7.4
Solution #4: Check of User Consent for 3GPP Service Exposure
Word‑p. 20
7.4.1
Solution overview
Word‑p. 20
7.4.2
Solution details
Word‑p. 21
7.4.2.1
Check of user consent on NEF/CAPIF
Word‑p. 21
7.4.2.2
User Consent Parameter
Word‑p. 22
7.4.3
Solution evaluation
Word‑p. 22
7.5
Solution #5: Privacy preservation of transmitted data
Word‑p. 22
7.5.1
Solution overview
Word‑p. 22
7.5.2
Solution details
Word‑p. 22
7.5.3
Solution evaluation
Word‑p. 23
7.6
Solution #6: Revocation for user consent
Word‑p. 23
7.6.1
Solution overview
Word‑p. 23
7.6.2
Solution details
Word‑p. 24
7.6.3
Solution evaluation
Word‑p. 25
7.7
Solution #7: Retrieving User's consent for exposure of information to the Edge Applications from UDM
Word‑p. 25
7.7.1
Solution overview
Word‑p. 25
7.7.2
Solution details
Word‑p. 25
7.7.3
Solution evaluation
Word‑p. 26
8
Conclusions
Word‑p. 26
8.1
Conclusion on KI #1: User's consent for exposure of information to Edge Applications
Word‑p. 26
8.2
Conclusion on KI #2: User consent for UE data collection
Word‑p. 27
8.3
Conclusion on KI #3: Modification or revocation of user consent
Word‑p. 27
8.4
Conclusion on KI #4: Relationship between the subscriber and the end-users
Word‑p. 27
8.5
Conclusion on KI #5: Unambiguous naming of purposes
Word‑p. 28
8.6
General Conclusions
Word‑p. 28
8.6.1
UDM Service for User Consent Check
Word‑p. 28
8.6.2
General Conclusion on Generic Requirement for the Procedures for User Consent Check
Word‑p. 28
8.6.3
UDM Service for User Consent Revocation
Word‑p. 28
8.6.4
Generic Requirement for the Procedures for User Consent Revocation
Word‑p. 29
A
Observations related to regulations
Word‑p. 30
$
Change history
Word‑p. 32