Page 33 - Trust in ICT 2017
P. 33

Trust in ICT                                                1


            Trusted data process and analysis

            Information which is processed by home gateway and service platform should be trustworthy. Collected data
            is processed and analysed in a gateway to decide extra actions depending on policies stored in the gateway.
            Also, the gateway can put additional data (e.g. location, time, etc.) to collected data for sending data to
            service platform. Service platform also can process and analyse data from the gateway to produce useful
            information to a user. Since the gateway and service platform manipulate collected data, the trustworthiness
            of information (i.e. processed and analysed data) is required to be maintained in each process.

            Trustworthy application
            Application (service provider) notifies processed information to user depending on their subscription profile.
            The trustworthiness of application is recommended to be maintained in each process.

            Privacy
            When  home  energy  management  system  notifies  energy  consumption  information  to  user,  providing
            displayable consumed energy-related information to the end-user/consumer terminals (PC, mobile phone,
            tablet, TV screen, etc.) may be unintentionally exposed. Application (or service provider) utilizes user’s data
            for big data process, and this may cause user privacy issue.

            5.2.5   Smart Office Service
            5.2.5.1    Description

            Trust based smart office service provides users with various office facilities based on the trust level of users.
            This  service  can  allow  different  type  of  permission  (or  access)  to  facilities  according  to  user’s  trust
            information. For example, it is assumed there are three kinds of trust level like high, middle and low trusted
            user. For the permission of cloud storage service, high trusted user can access with the authority of read,
            write, and middle trusted user can access with the authority of read only. Low trusted user has no right to
            access.  Figure  9  shows  an  example  of  smart office service  with  different  priority  of  users  and  different
            permission to office facilities.
            For  the  trust  management,  various  properties  like  social/business  relationship  and  membership  can  be
            considered to analyse user’s trust level.

























                               Figure 9 – Example of smart office service using trust information

            5.2.5.2    Actor list

            User
            Smart office
            Smart office provider


                                                                                                           25
   28   29   30   31   32   33   34   35   36   37   38