Trust Management Model and its importance for IoT
The aim of the project is to address the issues implementing the Trust Management Model. In order to address the issue, the appropriate existing pieces of literature will be reviewed along with discussing a proper methodology.
The Trust Management Model is basically considered as a viable solution by which the IoT issues are addressed. By optimizing the protection, as well as process of the support decision making, the concerned model identifies the untrusted behaviour, installation of the untrusted objects and redirecting the functionality for trusted zones (Malik et al. 2019). According to the Trust Management model a system is proposed through which the trust management system can be implemented for cloud computing. As a result, secured data access is assured by the cloud service provider. Herein the method of trust evaluation gets proposed to weight the trust factors for calculating the multiple attributes.
In terms of research problem the issue of abstract notion of the non-measurable variables will be taken into account. Considering this fact the concept of Trust Management Model will be concerned as a viable solution for resolving the IOT issues. As such the issues will be focused on identifying the areas of support for the decision making process, optimisation of protection, and identification of untrusted behaviour. Herein the components of the Trust Management Model will be discussed.
In terms of expected outcomes, it can be stated that the research will address the way through which the issues are addressed by the Trust Management Model.
In terms of benefits, it can be stated that the study is significant because it will review appropriate pieces of the existing literature. As the data will be gathered from the already published research, therefore authentic data will be presented by the concerned research.
Issues in current Trust Management Model: In current Trust Management Model it is seen that the concerned model fails to optimise the protection along with supporting the decision making process. As a result, the trust management system got failed to be implemented for the cloud computing. The issues in trust evaluation method weighted the trust factors to be calculated considering the several attributes.
How to resolve the issues: In order to resolve the said issue, the cloud security standard will be established. As such, the SOC 2 standard will be demonstrating the policies, controls and procedures of the firm in order to meet the trust management principles such as Availability, Security, Processing Integrity, Privacy and Confidentiality.
What is the Problem?
The issues of abstract notions of non-measurable variables has been considered in terms of the problem. In light of this, the Trust Management Model idea will be considered as a feasible approach for tackling IoT concerns (Kochovski et al. 2019). As a result, the concerns will be focused on identifying the areas of support decision-making process, protection optimization, and recognising untrustworthy behaviour. The Trust Management Model’s components will be explained in this section.
How do you break it down to smaller (sub-) problems?
In order to break down the main problems into the sub problems, establishment of the sub problems will be done for distinguishing their characters. Herein it is worth to mention that in order to identify the key problems, the sub problems will be considered as a researchable as well as the complete unit (Rehiman and Veni 2017). As such the sub problem will be clearly linked with the data interpretation.
Issues in current Trust Management Model
In order to identify the each sub problem, all the sub problems will be identified as a complete resealable unit. Herein, the sub problems will be strongly linked with the data interpretation. It is worth mentioning here that the sub problems need to be added up to the total of the issue. Herein the sub problems will be established based on the aim of the research.
How do you put everything together to solve your big problem?
In order to solve the big problem of the research, the main problem will be differentiated from the opinion fact. As such specifying the underlying issues, the alternative solutions are expected to be generated on that note. Apart from that by selecting as well as evaluating the alternative, the target standard will be relatively linked.
Theme 1: Understanding the concept of Trust management in IoT:
In relation to the IoT, the concept of trust management has appeared as a vital solution for trust issues. Some previous research has stated that the concerned model helps to optimize the protection along with supporting the decision making process. As such by identifying the untrusted behaviour, it can isolate the untrusted objects along with redirecting the functionality associated with the trusted zones. Based on this concern theme, it can be stated that the hierchical trust management model focuses on inverted tree structure focusing on which the root causes are analysed. On the other hand, as believed by Li, Varadharajan and Nepal (2019) as the root considered as the starting point of a trust, therefore the top down arts enhance the leaf node of the user.
Theme 2: Trust Management Model as a Public infrastructure:
Trust Management Model has been identified as a collection of rules through which the application is informed regarding deciding the legitimacy of the digital certificate. The research by Isirova and Potii (2018) revealed that fundamentally the trust management model provides the positive environment whether to trust on a particular organization or needs to depend on the certificate issued by the hierarchical department of the organization. Herein, in order to address the issues most of the organizations opt for the peer to peer architecture due to its well defined structure of the organization as well as discovering the complex validation.
Theme 3: Effective distribution of the trust management model for IoT:
The Internet of Things (IoT) is a worldwide architecture for the digital age that connects physical or digital things with current interoperability technological tools under development to deliver improved services. It is indeed interesting to note that the explosion in the number of cell phones and internet connections has created a new industry with nearly limitless possibilities. Every day, 5.5 million things are connected throughout the globe in 2016. By 2020, the population might be in the billions (Maddar, Kammoun and Youssef 2018). According to Gartner, 26 billion items will be deployed by 2020. On the other hand, in order to address the issue, In comparison to the above theme, it can be stated that in order to address the issue, the categorization process is rather different. The clustering approach can be represented on a computer as an inversion tree, but the web-of-trust is more directly tied to how people evaluate trustworthiness in their personal interactions. Customers can define how much trust they have in a certificate by choosing the number of independent signatories that must be present for it to be considered valid (Tran, Lu and Weber 2018). This technique works well for small groups with well-established relationships, but it does not scale well for big groups or where security consistency is critical, such as the amount of verification required before issuing a certificate.
Introducing and discussing the results/outcomes that have achieved:
Solutions to the identified issues
In terms of achieving the outcomes, it can be stated that the concerned study has identified several themes identifying the existing pieces of literature. Herein as identified from the selected themes, in the context of the Internet of Things, the notion of trust management has emerged as a viable solution to trust challenges. According to prior study, the concerned model aids in the optimization of protection as well as the decision-making process. As a result, it may segregate untrusted objects while diverting functionality associated with trusted zones by recognising untrustworthy behaviour (Mehraj and Banday 2020). According to this common concept, the hierchical trust management model relies on an inverted tree structure in which the root causes are identified. On the other hand, because the root is thought to be the starting point of a trust, top down arts are used to enrich the sub users. The abstract idea of non-measurable variables has been considered in terms of the research challenge. Given this, the Trust Management Model idea will be seen as a feasible approach for overcoming IoT concerns. As a result, the concern has been focused on identifying the areas of support decision-making process, protection optimization, and untrustworthy behaviour identification (Awan et al. 2019). The Trust Management Model’s components will be explored in this article. In terms of predicted outcomes, the study has been looked into how the Trust Management Model deals with challenges.
In terms of future solutions, it can be stated that in the forthcoming days, the Block chain based trust management model is required to be used (Qureshi et al. 2020). As such the trust related issues can be attacked by producing the malicious users through utilizing the techniques of classification. Decentralization of the online social network is another area to be concerned for the future solutions.
What is to be done in the rest weeks?
Activities during research |
1st Week |
2nd Week |
3rd Week |
4th Week |
5th Week |
6th Week |
7th Week |
Selection of research topic |
ü |
||||||
Composition of the literature review |
ü |
||||||
Methodology followed in the research |
ü |
||||||
Collection of secondary data for the research |
ü |
ü |
|||||
Data analysis and interpretation |
ü |
ü |
|||||
Findings |
ü |
||||||
Conclusion and Recommendation for the research study |
ü |
||||||
Final submission of the research report |
ü |
(Source: Self-Creation)
Conclusion and Future Outlook
What problems have you addressed?
It can be concluded that The Trust Management Model is widely recognised as a viable approach to dealing with IoT issues. By optimizing the protection and support decision-making processes, the concerned model recognises untrustworthy behaviour, isolates untrustworthy objects, and diverts functionality to trusted zones. A way for establishing a trust management system for cloud computing is described by the Trust Management Model. As a result, the cloud service provider ensures that data is accessible in a secure manner. In this research, a trust evaluation approach is presented for computing a variety of attributes by weighing the trust components.
What results have you achieved and what is the significance of the results?
The result that has been achieved from the study is that In terms of accomplishing the desired goals, it can be claimed that the research project has found various topics through analysing existing literature. As a result of the chosen topics, the following is presented. The concept of trust management has evolved as a feasible solution to trust concerns in the context of the Internet of Things. The concerned model, according to previous research, contributes in the optimization of protection as well as the decision-making process. As a consequence, by recognising untrustworthy behaviour, it may be able to isolate untrusted objects while redirecting functionality associated with trusted zones.
What problems would need to be addressed in future?
In terms of problems to be addressed in future, it can be claimed that the block chain-based trust management model will be necessary in the near future. As a result, trust-related issues may be targeted by creating fraudulent users and employing categorization algorithms. Another area to consider for future solutions is decentralization of online social networks.
References
Awan, K.A., Din, I.U., Almogren, A., Guizani, M., Altameem, A. and Jadoon, S.U., 2019. Robusttrust–a pro-privacy robust distributed trust management mechanism for the internet of things. IEEE Access, 7, pp.62095-62106.
Kochovski, P., Gec, S., Stankovski, V., Bajec, M. and Drobintsev, P.D., 2019. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems, 101, pp.747-759.
Maddar, H., Kammoun, W. and Youssef, H., 2018. Effective distributed trust management model for Internet of Things. Procedia Computer Science, 126, pp.321-334.
Qureshi, K.N., Iftikhar, A., Bhatti, S.N., Piccialli, F., Giampaolo, F. and Jeon, G., 2020. Trust management and evaluation for edge intelligence in the Internet of Things. Engineering Applications of Artificial Intelligence, 94, p.103756.
Rehiman, K.R. and Veni, S., 2017, February. A trust management model for sensor enabled mobile devices in IoT. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 807-810). IEEE.
Isirova, K. and Potii, O., 2018, May. Decentralized public key infrastructure development principles. In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 305-310). IEEE.
Tran, A.B., Lu, Q. and Weber, I., 2018, September. Lorikeet: A Model-Driven Engineering Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM (Dissertation/Demos/Industry) (pp. 56-60).
Li, N., Varadharajan, V. and Nepal, S., 2019, July. Context-aware trust management system for iot applications with multiple domains. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1138-1148).
Malik, S., Dedeoglu, V., Kanhere, S.S. and Jurdak, R., 2019, July. Trustchain: Trust management in blockchain and iot supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 184-193). IEEE.
Mehraj, S. and Banday, M.T., 2020, January. Establishing a zero trust strategy in the cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.