Page 196 - Trust in ICT 2017
P. 196
3 Trust in ICT
Trust Knowledge Gathering Interface: This module is used to gather related trust knowledge
regarding on object’s trust aspects from related service domains via the Trust Service Broker.
Trust Data Repository: The trust data including operations of objects and the history of
interactions between objects can be maintained in the trust data repository. For trust evaluation,
the necessary data will be loaded from this repository to the computation module.
Trust Computation: This module is used for data processing for trust evaluation. Trust
computation happens when the state of an object is changed or an interaction occurs between
objects. To process a large amount of data related to trust evaluation, it can adopt data analytics
and cloud computing technologies for calculation of the trust level of objects according to the
change of the trust state of objects based on direct observation.
8.2.3 Trust Service Enabler (TSE)
TSE is used to provide trust knowledge of social-cyber-physical objects for a service based on the ICT
infrastructure. It also provides trust-adapting capabilities to enable effective and efficient adaptation of trust
knowledge to services.
Trust Linking: Trust linking is a module capable of creating a link between social-cyber-physical
objects based on trust metrics.
Trust IdM: The identity management (IdM) can be used to manage digital
identification/authentication of social-cyber-physical objects. Trust IdM assures the identity of
trustworthy objects and support trust-based services.
Trust-based Recommendation: This module provides recommendations to other objects. This
module aims at providing a recommendation for selecting a suitable object that meets the
required level of trust.
8.2.4 Trust Service Broker (TSB)
An object has a number of trust aspects which are related to other service domains in general. For instance,
a human may have different trust levels at home, office, bank, social communities, etc. Each service domain
has an effective trust evaluation mechanism specialized to analyse the domain-specific trust-related data.
TSB provides a brokering service to share and disseminate domain-specific trust knowledge across service
domains. TSB also provides a brokering service from trust governance information through trust API. When
various kinds of trust aspects of a certain object are needed to investigate and judge their multifaceted
trustworthiness, TAMP can gather an object’s trust knowledge of other service domains from TSB and
evaluate the whole trust knowledge to determine the object’s multifaceted trustworthiness.
9 Trust based ICT Service Models
Today, it is known that almost everything can get hacked. If someone is going to get our data, tools like
encryption and tokenization of that data become important defence methods. Any users including
enterprises needs to follow some simple best practices to protect themselves online. Therefore, many
business opportunities may exist if we further consider trust.
Trust based new ICT service models are a good positioning that builds trust with ICT service users by enabling
them to control and leverage their own personal data. In doing so, trust based ICT service models give ICT
service providers a sustainable business strategy for disrupting current ICT “Big Data primes” as well as
delivering a permission-based personal data pipeline and services. A trust based ICT service model is a “game-
changing” disruptive strategy that enables firms using big data to provide incremental trust improvements
to existing big data deployment. To exploit customer data more comprehensively, businesses must develop
a much greater level of trust with their customers. The primary concern is to overcome the gap between the
personal controllability of privacy and business benefits of ICT services in terms of human and service related
trust.
188