Page 26 - Trust in ICT 2017
P. 26
1 Trust in ICT
Access Control Policy and Mapping manager: to map each trust level (of each device) to a specific access
control policy.
5.1.3.3 Pre-condition
Trust Platform periodically collects trust-related data from nodes in the networks.
5.1.3.4 Triggers
Once a device want to use/access a resource, it will request for the access control.
5.1.3.5 High Level Illustration
Figure 3 – High level illustration of trust based access control [112]
5.2 Use Case of Services and Applications in IoT
In IoT environment, not only personal data, devices in house, office, and transport means will have much
sensitive data to be collected. User interfaces on devices will shrink or disappear, making it more difficult for
consumers to know when data is being collected, or to exercise any control. Data from the IoT will feed new
kinds of algorithmic decision-making and the burgeoning data analytics industry. And securing many
inexpensive connected devices, as well as the data they generate, may present both technological and
economic challenges.
The European Commission’s July 2014 Communication stated that consumers must “have sufficient trust in
the technology, the behaviours of providers, and the rules governing them” in order for the IoT to reach its
full potential. Similarly, the Article 29 Working Party noted last September that the IoT “must also respect
the many privacy and security challenges.”
IoT relies on the principle of the extensive processing of data through sensors that are designed to
communicate unobtrusively and exchange data in a seamless way. The exponential volume of data that can
be collected, and its further combination, its storage in and the use of predictive analytics tools cannot
transform data into something useful but also allow companies - and potentially malware - to have very
detailed profiles of individuals; and the sharing and combination of data through cloud services will increase
the locations and jurisdictions where personal data resides. In order to reach the full IoT potential, services
and applications must make use of big data analytics which depend on collecting data from many different
sources and using it for purposes that may be different from those for which it was collected. Therefore, it is
needed to ensure that companies are accountable for using all of this data in a way that is consistent with
consumers’ expectations.
18