Page 215 - Trust in ICT 2017
P. 215

Trust in ICT                                                3


            2.5     Analysis

            –       Trusted data collection and aggregation
            Data should be trustworthy from smart office devices and facilities to smart office service provider and from
            trust management service provider to smart office service provider. In flow #2, smart office devices and
            facilities produce data, and smart office provider collects data from devices and facilities. When data is
            produced and transmitted to other entities, trustworthiness of data is required to be maintained.
            –       Trusted data process and analysis

            Information which is processed by trust management service provider should be trustworthy. In flow #4,
            collected  data  is  processed  and  analysed  in  a  trust  management  service  provider  to  decide  the
            trustworthiness of user, devices and facilities.
            –       Trustworthy application

            In flow #3 and #5, an office service provider provides smart office application to not only devices and facilities
            but also trust management service provider. Smart office application should be trustworthy.

            –       Privacy
            When  a  trust  management  service  provider  collects  and  analyses  data  and  information  for  deciding
            trustworthiness of user, the trust management service provider may access user privacy information and it
            may cause user privacy issues.


            3       Document sharing service


            3.1     Description
            This use case considers a social IoT [b-Atzori] environment with no centralized trusted authority. In the social
            IoT, each device has the subjective value based on the owner's social relationship as well as the Community
            of Interest (CoI) [b-Bao] of each device. This use case focuses on using the social trust when sharing the
            document between co-workers. Without the social IoT trust, a document owner takes the document from
            own  storage,  sends  the  document  to  receiver  and  notifies  a  guest  account  to  receiver.  However,  the
            document owner does not need to do anything with the social IoT trust. A trust management platform
            calculates the trust value using the collected social data from intermediate entity (e.g., smartphone) of co-
            workers and then, these trust value will be used to judge whether a receiver has enough authorization to get
            the document or not.

            3.2     Actors
            –       User: A user who takes the ownership of the things (e.g., wireless portable hard drive, smartphone,
                    etc.) and wants to share the documents in the wireless portable hard drive.
            –       Smartphone: A device which is an intermediate entity and is available to send its owner’s social
                    relationship information and its CoI information to wireless portable hard drive.
            –       Trust management platform: A trust management platform is mainly in charge of collecting the
                    social relationship and calculating the subjective trust value.
            –       Wireless portable hard drive: A device, which is mainly in charge of judging authorization to share
                    the document.
















                                                                                                         207
   210   211   212   213   214   215   216   217   218   219   220