Page 22 - Trust in ICT 2017
P. 22

1                                                    Trust in ICT


            In a specific context, for instance in IoT, trust is reliance on the integrity, ability or character of an entity.
            Trust can be further explained in terms of confidence in the truth or worth of an entity. For example, EU
            uTRUSTit  project  defined  that  trust  is  the  user’s  confidence  in  an  entity’s  reliability,  including  user's
            acceptance of vulnerability in a potentially risky situation [8].

            4.4.1   Knowledge and Trust

            To  understand  trust,  it  is  required  to  analyse  the  collected  data  from  entities,  extract  the  necessary
            information for trust; understand the information and then create the trust-related knowledge for the trust
            computation.


















                                                                          1
                                              Figure 1 – Knowledge and Trust

            The social and economic value of data is mainly reaped during two moments: first when data is transformed
            into knowledge (gaining insights) and then when it is used for decision making (taking action). The knowledge
            is  accumulated  by  individuals  or  systems  through  data  analytics  over  time.  So  far  data  processing,
            management and interpretation for awareness and understanding have been considered as fundamental
            processes for obtaining the knowledge. As shown in Figure 1, trust is positioned as belief between knowledge
            (i.e.,  awareness  and  understanding)  and  action.  It  means  that  expectation  process  for  trust  should  be
            additionally considered before decision making.

            4.4.2   Relationships with security and privacy

            Definition of security and privacy:
            Security  concerns  the  confidentiality,  availability  and  integrity of  data or  information.  Security may  also
            include authentication and non-repudiation.
            Privacy concerns the expression of or adherence to various legal and non-legal norms. In the certain contexts
            this is often understood as compliance with data protection regarding the right to private life. Although it
            would be highly complex to map into personal data protection, the globally accepted privacy principles give
            a  useful  frame:  consent,  purpose  restriction,  legitimacy,  transparency,  data  security  and  data  subject
            participation.
            As shown in Figure 4, trust can be interpreted as 3 different views:
            •       Trust has intersections with security and privacy (Left hand side of Figure 4);

            •       Trust has more broad scope covering security and other aspects such as reliability, dependability
                    and ability (Middle of Figure 4);
            •       Trust  has  independent  area  compared  to  privacy  and  security.  Trust  mainly  concerns  beliefs,
                    credentials, delegation, recommendation and reputation (Right hand side of Figure 4).





            1  Illustration compiled from trust pyramid - http://www.johnhaydon.com/how-make-people-trust-your-nonprofit/


            14
   17   18   19   20   21   22   23   24   25   26   27