Page 200 - Trust in ICT 2017
P. 200

3                                                    Trust in ICT



                                          Table 10-1 – Summary of use cases (end)

               No       Use case         Purpose               Method                       Actors
               4     Device selection   Selecting trustful   Trust level between devices    −  User A
                     for data       device for D2D     Selecting appropriate device for   −  A’s device
                     transmission   communication      transmission
                                                                                −  User B
                                                                                −  B’s device
                                                                                −  Trust mgmt. platform
               5     Trustworthy car   Promoting       Trustworthy data about a   −  User A
                     sharing service   trustworthy car   shared car and users’ data    −  A’ device
                                    sharing            Providing an information of
                                                                                −  Sensor attached in sharing car
                                                       shared car and its user
                                                                                −  Service platform
                                                                                −  Service provider
               6     Trustworthy used   Mediating      Trustworthy data about a used   −  Seller (User A)
                     car transaction   transparent used car   car  Providing transparent   −  Seller’s car
                     service        transaction        car history information
                                                                                −  Service broker
                                                                                −  Trust mgmt. platform
                                                                                −  Buyer (User B)


            11      Strategies for future standardization on trust
            Until now, a number of standards focusing on network security and cybersecurity technologies have been
            developed in various standardization bodies including Internet Engineering Task Force (IETF). The scope of
            these standards needs to be expanded to take into consideration trust issues in future ICT infrastructures.
            There are a few preliminary activities taking place, for instance in Online Trust Alliance (OTA) and Trusted
            Computing Group (TCG). However, as existing research and standardization activities on trust are still limited
            to social trust between humans, trust relationships between humans and objects as well as across domains
            of social-cyber-physical domains should also be taken into account for trustworthy autonomous networking
            and services.

            Based on this, we need to first find various use cases considering user confidence, usability and reliability in
            ICT  ecosystems  for  new  business  models  which  reflect  sharing  economy.  Then,  a  framework  for  trust
            provisioning including requirements and architectures should be urgently specified in relation to the relevant
            standards.  In  addition,  global  collaborations  with  related  SDOs  are  required  to  further  stimulate  trust
            standardization activities.
            More specifically, the following key items are identified as future work for standardization on trust.
            •       Overview of trust in ICT

            It aims to provide a clear understanding of trust from different perspectives and identify key differentiations
            compared to security and privacy. It also highlights the importance of trust in future ICT infrastructures
            towards knowledge societies.
            •       Service scenarios and capabilities

            From various use cases analysis, considering sharing economy, it is necessary to develop service scenarios
            for trust provisioning and define required capabilities to support trust in ICT.
            •       Requirements for trust provisioning

            From key challenges and technical issues, it is necessary to specify detailed requirements in terms of different
            viewpoints and various stakeholders.

            •       Architectural framework and functional architectures
            It targets to identify core functions for future trusted ICT infrastructures and develop architectural models,
            including detailed functional architectures. Relevant trust models should be based on key concepts of trust
            domains, levels of trust, TLA and trust index, taking into account social, cyber and physical domains.




            192
   195   196   197   198   199   200   201   202   203   204   205