Page 94 - Trust in ICT 2017
P. 94
1 Trust in ICT
10 Conclusions and future work
This technical report first describes definitions, key characteristics and features on trust from different
perspectives for a clear understanding of trust as standardization activities for trusted information
infrastructure in ITU-T Correspondence Group on Trust (CG-Trust). Secondly, the report illustrates various
use cases for trust provisioning based on the technical report of ITU-T CG-Trust and materials from other
SDOs and related literature. In addition, this section also analyses these uses cases in terms of purpose,
method, actors and considerations for measuring trust.
In addition, the report proposes trust taxonomy in different domains in order to identify important issues for
trust provisioning in the ICT infrastructure and describe strategies for solving these issues, particularly
considering trust provisioning process.
For a specific technical solution, report provides the demonstration of feasible methods to implement
architecture for trust data analysis and a frame work for trust decision making for trustworthy IoT Eco-
system. Furthermore, it emphasizes key functionalities, requirements and standard interfaces for autonomic
decision making. And then, the report focuses on developing a generalized trust definition for all entities in
Social IoT in which trust can be formalized and produced within our platform in future. Supporting to our
goal, topics on trust provisioning strategies for services, applications and ICT infrastructure and ideas on trust
ontology has been discussed. Finally report elaboration the suggestions on a framework for autonomic trust
management based on Monitor, Analyse, Plan, Execute, and Knowledge feedback loop to evaluate the level
of trust in an IoT cloud ecosystem.
From standardization point of view, until now, a number of standards focusing on network security and
cybersecurity technologies have been developed in various standardization bodies including IETF. The scope
of these standards needs to be expanded to take into consideration trust issues in future ICT infrastructures.
There are a few preliminary activities taking place, for instance in OTA and TCG. However, as existing research
and standardization activities on trust are still limited to social trust between humans, trust relationships
between humans and objects as well as across domains of social-cyber-physical worlds should also be taken
into account for trustworthy autonomous networking and services.
Based on this, one needs to first find various use cases considering user confidence, usability and reliability
in ICT ecosystems for new business models which reflect a sharing economy. Then, a framework for trust
provisioning including requirements and architectures should be urgently specified in relation to the relevant
standards. In addition, global collaborations with related standardization bodies are required to further
stimulate trust standardization activities.
More specifically, the following key items are identified as future work for standardization on trust.
• Overview of trust in ICT
• Service scenarios and capabilities
• Requirements for trust provisioning
• Architectural framework
• Technical solutions for trust provisioning
• Trust provisioning in IoT
• Trust provisioning in data analytics
Additionally, there is a need to incorporate trust issue into related SGs’ activities in ITU-T.
• SG13: One of main roles of SG13 is to develop related Recommendations on ICT infrastructures. In
this regards, so far SG13 has played significant roles for dealing with future knowledge and trust ICT
infrastructures. Therefore, SG13 should take related work items on overall ICT infrastructures for
future standardization. Especially SG13 needs to focus on trusted networking technologies.
• SG20: As the recently established SG20 is targeting IoT applications, services and platforms as well
as smart cities infrastructure, SG20 should consider trust in IoT.
• SG17: As trust is tightly associated with security and privacy issues, a liaison with SG17 activities on
security matters is required.
86