Page 200 - Trust in ICT 2017
P. 200
3 Trust in ICT
Table 10-1 – Summary of use cases (end)
No Use case Purpose Method Actors
4 Device selection Selecting trustful Trust level between devices − User A
for data device for D2D Selecting appropriate device for − A’s device
transmission communication transmission
− User B
− B’s device
− Trust mgmt. platform
5 Trustworthy car Promoting Trustworthy data about a − User A
sharing service trustworthy car shared car and users’ data − A’ device
sharing Providing an information of
− Sensor attached in sharing car
shared car and its user
− Service platform
− Service provider
6 Trustworthy used Mediating Trustworthy data about a used − Seller (User A)
car transaction transparent used car car Providing transparent − Seller’s car
service transaction car history information
− Service broker
− Trust mgmt. platform
− Buyer (User B)
11 Strategies for future standardization on trust
Until now, a number of standards focusing on network security and cybersecurity technologies have been
developed in various standardization bodies including Internet Engineering Task Force (IETF). The scope of
these standards needs to be expanded to take into consideration trust issues in future ICT infrastructures.
There are a few preliminary activities taking place, for instance in Online Trust Alliance (OTA) and Trusted
Computing Group (TCG). However, as existing research and standardization activities on trust are still limited
to social trust between humans, trust relationships between humans and objects as well as across domains
of social-cyber-physical domains should also be taken into account for trustworthy autonomous networking
and services.
Based on this, we need to first find various use cases considering user confidence, usability and reliability in
ICT ecosystems for new business models which reflect sharing economy. Then, a framework for trust
provisioning including requirements and architectures should be urgently specified in relation to the relevant
standards. In addition, global collaborations with related SDOs are required to further stimulate trust
standardization activities.
More specifically, the following key items are identified as future work for standardization on trust.
• Overview of trust in ICT
It aims to provide a clear understanding of trust from different perspectives and identify key differentiations
compared to security and privacy. It also highlights the importance of trust in future ICT infrastructures
towards knowledge societies.
• Service scenarios and capabilities
From various use cases analysis, considering sharing economy, it is necessary to develop service scenarios
for trust provisioning and define required capabilities to support trust in ICT.
• Requirements for trust provisioning
From key challenges and technical issues, it is necessary to specify detailed requirements in terms of different
viewpoints and various stakeholders.
• Architectural framework and functional architectures
It targets to identify core functions for future trusted ICT infrastructures and develop architectural models,
including detailed functional architectures. Relevant trust models should be based on key concepts of trust
domains, levels of trust, TLA and trust index, taking into account social, cyber and physical domains.
192