Page 212 - Trust in ICT 2017
P. 212

3                                                    Trust in ICT



                                       Table IV.1 – Trust matrix for smart home service

                       To
                            Home Appliance   Home Gateway    Service Platform   Service Provider   User
              From
                                           Trusted data
              Home                -        collection and          -               -                -
              Appliance
                                           aggregation
                                                            Trusted data
                                                            collection and
                           Trusted data
              Home         collection and         -         aggregation            -                -
              Gateway                                       Trusted data
                           aggregation
                                                            process and
                                                            analysis
                                           Trusted data
              Service                                                       Trustworthy
              Platform            -        process and             -        application             -
                                           analysis
              Service                                       Trustworthy
              Provider            -               -         application            -         Privacy
                                                                            Privacy
              User                -               -         -                                       -


            1.5     Analysis

            –       Trusted data collection and aggregation
            Transmitted data should be trustworthy from devices (home appliances) to home gateway and gateway to
            service platform. In flow #2, data from devices is collected in a gateway and service platform. When data is
            produced and transmitted to other entities, trustworthiness of data is required.

            –       Trusted data process and analysis
            Information which is processed by home gateway and service platform should be trustworthy. In flow #3,
            collected data is processed and analysed in a gateway to decide extra actions depending on policies stored
            in the gateway. Also, the gateway can put additional data (e.g., location, time, etc.) to collected data in order
            for a service platform to get accurate conditions of each device at home. In flow #4, a service platform also
            can process and analyse data from the gateway to produce useful information to a user. Since the gateway
            and the service platform manipulate collected data, the trustworthiness of information (i.e., processed and
            analysed data) is required to be maintained in each process.
            –       Trustworthy application

            In  flow  #5,  application  (service  provider)  notifies  processed  information  to  user  depending  on  their
            subscription profile. The trustworthiness of application is recommended to be maintained in each process.
            –       Privacy

            In flow #5, when smart home management system notifies some information to user, providing displayable
            event or control information to the end-user/consumer terminals (e.g., PC, mobile phone, TV screen, etc.)
            may be unintentionally exposed. Application (or service provider) utilizes user’s data for big data process,
            and this may cause user privacy issue.


            2       Smart office service

            2.1     Description

            In a trust-based smart office service, usage rights on various office facilities depend on each users’ trust level.
            For example, it is assumed there are three kinds of user trust level - high, middle and low. For a user who has
            a high level of trust, he or she can read and write the cloud storage. However, a user who has middle level of
            trust can only read the documents in cloud storage. A user who has low level of trust has no right to access.
            Figure IV.3 shows an example of smart office service with different priority of users and different permission



            204
   207   208   209   210   211   212   213   214   215   216   217