Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.867
Word version: 17.1.0
1…
5…
5
Use Cases and Architecture
6
Key issues
7
Potential solutions
8
Conclusions
A
Observations related to regulations
$
Change history
5
Use Cases and Architecture
p. 9
5.1
Use Cases
p. 9
5.1.1
Use Cases #1: UE Related Analytics of NWDAF
p. 9
5.1.1.1
Use Case details
p. 9
5.1.1.2
Individual Architecture
p. 9
5.1.2
Use Cases #2: UE Information Exposure for Mobile Edge Computing
p. 10
5.1.2.1
Use Case details
p. 10
5.1.2.2
Individual Architecture
p. 11
5.2
Common architecture
p. 11
6
Key issues
p. 12
6.1
Key Issue #1: User's consent for exposure of information to Edge Applications
p. 12
6.1.0
Use case mapping
p. 12
6.1.1
Key issue details
p. 12
6.1.2
Security threats
p. 12
6.1.3
Potential security requirements
p. 12
6.2
Key Issue #2 User consent for UE data collection
p. 13
6.2.1
Key issue details
p. 13
6.2.2
Security threats
p. 13
6.2.3
Potential security requirements
p. 13
6.3
Key Issue #3: Modification or revocation of user consent
p. 13
6.3.1
Key issue details
p. 13
6.3.2
Security threats
p. 13
6.3.3
Potential security requirements
p. 13
6.4
Key Issue #4: KI on relationship between the subscriber and the end-users
p. 14
6.4.1
Key issue details
p. 14
6.4.2
Security threats
p. 14
6.4.3
Potential security requirements
p. 14
6.5
Key issue #5: Unambiguous naming of purposes
p. 14
6.5.0
Use case mapping
p. 14
6.5.1
Key issue details
p. 14
6.5.2
Security threats
p. 14
6.5.3
Potential security requirements
p. 14
7
Potential solutions
p. 15
7.0
Mapping of solutions to key issues
p. 15
7.1
Solution #1: User Consent for Exposure of information to Edge Applications in Real Time
p. 15
7.1.1
Solution overview
p. 15
7.1.2
Solution details
p. 16
7.1.3
Solution evaluation
p. 16
7.2
Solution #2: User Consent for UE Related Analytics of NWDAF
p. 17
7.2.1
Solution overview
p. 17
7.2.2
Solution details
p. 17
7.2.2.1
NF Authorization based on User Consent
p. 17
7.2.2.2
User Consent Format
p. 18
7.2.2.3
Obtain of User Consent
p. 18
7.2.3
Solution evaluation
p. 18
7.3
Solution #3: User Consent for UE Related Analytics of NWDAF
p. 18
7.3.1
Solution overview
p. 18
7.3.2
Solution details
p. 19
7.3.2.1
NF Authorization based on User Consent
p. 19
7.3.2.2
User Consent Format
p. 19
7.3.2.3
Obtain of User Consent
p. 20
7.3.3
Solution evaluation
p. 20
7.4
Solution #4: Check of User Consent for 3GPP Service Exposure
p. 20
7.4.1
Solution overview
p. 20
7.4.2
Solution details
p. 21
7.4.2.1
Check of user consent on NEF/CAPIF
p. 21
7.4.2.2
User Consent Parameter
p. 22
7.4.3
Solution evaluation
p. 22
7.5
Solution #5: Privacy preservation of transmitted data
p. 22
7.5.1
Solution overview
p. 22
7.5.2
Solution details
p. 22
7.5.3
Solution evaluation
p. 23
7.6
Solution #6: Revocation for user consent
p. 23
7.6.1
Solution overview
p. 23
7.6.2
Solution details
p. 24
7.6.3
Solution evaluation
p. 25
7.7
Solution #7: Retrieving User's consent for exposure of information to the Edge Applications from UDM
p. 25
7.7.1
Solution overview
p. 25
7.7.2
Solution details
p. 25
7.7.3
Solution evaluation
p. 26
8
Conclusions
p. 26
8.1
Conclusion on KI #1: User's consent for exposure of information to Edge Applications
p. 26
8.2
Conclusion on KI #2: User consent for UE data collection
p. 27
8.3
Conclusion on KI #3: Modification or revocation of user consent
p. 27
8.4
Conclusion on KI #4: Relationship between the subscriber and the end-users
p. 27
8.5
Conclusion on KI #5: Unambiguous naming of purposes
p. 28
8.6
General Conclusions
p. 28
8.6.1
UDM Service for User Consent Check
p. 28
8.6.2
General Conclusion on Generic Requirement for the Procedures for User Consent Check
p. 28
8.6.3
UDM Service for User Consent Revocation
p. 28
8.6.4
Generic Requirement for the Procedures for User Consent Revocation
p. 29
A
Observations related to regulations
p. 30
$
Change history
p. 32