Page 26 - Trust in ICT 2017
P. 26

1                                                    Trust in ICT


            Access Control Policy and Mapping manager: to map each trust level (of each device) to a specific access
            control policy.

            5.1.3.3    Pre-condition
            Trust Platform periodically collects trust-related data from nodes in the networks.

            5.1.3.4    Triggers
            Once a device want to use/access a resource, it will request for the access control.

            5.1.3.5    High Level Illustration






























                              Figure 3 – High level illustration of trust based access control [112]

            5.2     Use Case of Services and Applications in IoT

            In IoT environment, not only personal data, devices in house, office, and transport means will have much
            sensitive data to be collected. User interfaces on devices will shrink or disappear, making it more difficult for
            consumers to know when data is being collected, or to exercise any control. Data from the IoT will feed new
            kinds  of  algorithmic  decision-making  and  the  burgeoning  data  analytics  industry.  And  securing  many
            inexpensive  connected  devices,  as  well  as  the  data  they  generate,  may  present  both  technological  and
            economic challenges.

            The European Commission’s July 2014 Communication stated that consumers must “have sufficient trust in
            the technology, the behaviours of providers, and the rules governing them” in order for the IoT to reach its
            full potential. Similarly, the Article 29 Working Party noted last September that the IoT “must also respect
            the many privacy and security challenges.”
            IoT  relies  on  the  principle  of  the  extensive  processing  of  data  through  sensors  that  are  designed  to
            communicate unobtrusively and exchange data in a seamless way. The exponential volume of data that can
            be collected, and its further combination, its storage in   and the use of predictive analytics tools cannot
            transform data into something useful but also allow companies - and potentially malware - to have very
            detailed profiles of individuals; and the sharing and combination of data through cloud services will increase
            the locations and jurisdictions where personal data resides. In order to reach the full IoT potential, services
            and applications must make use of big data analytics which depend on collecting data from many different
            sources and using it for purposes that may be different from those for which it was collected. Therefore, it is
            needed to ensure that companies are accountable for using all of this data in a way that is consistent with
            consumers’ expectations.



            18
   21   22   23   24   25   26   27   28   29   30   31