Page 196 - Trust in ICT 2017
P. 196

3                                                    Trust in ICT



                   Trust Knowledge Gathering Interface: This module is used to gather related trust knowledge
                    regarding on object’s trust aspects from related service domains via the Trust Service Broker.
                   Trust Data Repository: The trust data including operations of objects and the history of
                    interactions between objects can be maintained in the trust data repository. For trust evaluation,
                    the necessary data will be loaded from this repository to the computation module.
                   Trust Computation: This module is used for data processing for trust evaluation. Trust
                    computation happens when the state of an object is changed or an interaction occurs between
                    objects. To process a large amount of data related to trust evaluation, it can adopt data analytics
                    and cloud computing technologies for calculation of the trust level of objects according to the
                    change of the trust state of objects based on direct observation.
            8.2.3   Trust Service Enabler (TSE)

            TSE  is  used  to  provide  trust  knowledge  of  social-cyber-physical  objects  for  a  service  based  on  the  ICT
            infrastructure. It also provides trust-adapting capabilities to enable effective and efficient adaptation of trust
            knowledge to services.
                   Trust Linking: Trust linking is a module capable of creating a link between social-cyber-physical
                    objects based on trust metrics.
                   Trust IdM: The identity management (IdM) can be used to manage digital
                    identification/authentication of social-cyber-physical objects. Trust IdM assures the identity of
                    trustworthy objects and support trust-based services.
                   Trust-based Recommendation: This module provides recommendations to other objects. This
                    module aims at providing a recommendation for selecting a suitable object that meets the
                    required level of trust.

            8.2.4   Trust Service Broker (TSB)
            An object has a number of trust aspects which are related to other service domains in general. For instance,
            a human may have different trust levels at home, office, bank, social communities, etc. Each service domain
            has an effective trust evaluation mechanism specialized to analyse the domain-specific trust-related data.
            TSB provides a brokering service to share and disseminate domain-specific trust knowledge across service
            domains. TSB also provides a brokering service from trust governance information through trust API. When
            various kinds of trust aspects of a certain object are needed to investigate and judge their multifaceted
            trustworthiness,  TAMP  can  gather  an  object’s  trust  knowledge  of  other  service  domains  from  TSB  and
            evaluate the whole trust knowledge to determine the object’s multifaceted trustworthiness.


            9       Trust based ICT Service Models

            Today, it is known that almost everything can get hacked. If someone is going to get our data, tools like
            encryption  and  tokenization  of  that  data  become  important  defence  methods.  Any  users  including
            enterprises  needs  to  follow  some  simple  best  practices  to  protect  themselves  online.  Therefore,  many
            business opportunities may exist if we further consider trust.
            Trust based new ICT service models are a good positioning that builds trust with ICT service users by enabling
            them to control and leverage their own personal data. In doing so, trust based ICT service models give ICT
            service providers a sustainable business strategy for disrupting current ICT “Big Data primes” as well as
            delivering a permission-based personal data pipeline and services. A trust based ICT service model is a “game-
            changing” disruptive strategy that enables firms using big data to provide incremental trust improvements
            to existing big data deployment. To exploit customer data more comprehensively, businesses must develop
            a much greater level of trust with their customers. The primary concern is to overcome the gap between the
            personal controllability of privacy and business benefits of ICT services in terms of human and service related
            trust.







            188
   191   192   193   194   195   196   197   198   199   200   201