2 research outputs found

    Leverage a Trust Service Platform for Data Usage Control in Smart City

    Get PDF
    In the Internet of Thing, data is almost collected, aggregated and analyzed without human intervention by machine-to-machine communications resulting in raising serious challenges on access control. Particularly in Smart City ecosystems in which multi-modal data comes from heterogeneous sources, data owners cannot imagine how their data is used to extract sensitive information. Thus, there is a critical need for novel access control methods that minimize privacy risks while increase ability of personalized access control. Our solution is to build a trust-based usage control mechanism called TUCON that enables stakeholders to set access control policies based on their trust relationships with data consumers. In this study, we introduce two novel paradigms integrated in the Smart City shared platform: a Trust Service Platform and a Data Usage Control, then bring them together to establish the new mechanism. The conceptual model, the architecture, the formalization, and the practical development of TUCON is described in detail. We also show the roles and the interactions of TUCON components in the Smart City platform. Our contributions lie in a new trust model with a trust computation procedure based on semantic web technologies, a novel trust-based usage control conceptual model including a formalization, a practical expression and an architecture for Smart City systems. We believe this study provides better understanding on both trust and usage control in the Internet of Things and opens several important research directions in the future

    Evaluation of Trust in the Internet Of Things: Models, Mechanisms And Applications

    Get PDF
    In the blooming era of the Internet of Things (IoT), trust has become a vital factor for provisioning reliable smart services without human intervention by reducing risk in autonomous decision making. However, the merging of physical objects, cyber components and humans in the IoT infrastructure has introduced new concerns for the evaluation of trust. Consequently, a large number of trust-related challenges have been unsolved yet due to the ambiguity of the concept of trust and the variety of divergent trust models and management mechanisms in different IoT scenarios. In this PhD thesis, my ultimate goal is to propose an efficient and practical trust evaluation mechanisms for any two entities in the IoT. To achieve this goal, the first important objective is to augment the generic trust concept and provide a conceptual model of trust in order to come up with a comprehensive understanding of trust, influencing factors and possible Trust Indicators (TI) in the context of IoT. Following the catalyst, as the second objective, a trust model called REK comprised of the triad Reputation, Experience and Knowledge TIs is proposed which covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation, personal experiences to global opinions. The mathematical models and evaluation mechanisms for the three TIs in the REK trust model are proposed. Knowledge TI is as “direct trust” rendering a trustor’s understanding of a trustee in respective scenarios that can be obtained based on limited available information about characteristics of the trustee, environment and the trustor’s perspective using a variety of techniques. Experience and Reputation TIs are originated from social features and extracted based on previous interactions among entities in IoT. The mathematical models and calculation mechanisms for the Experience and Reputation TIs also proposed leveraging sociological behaviours of humans in the real-world; and being inspired by the Google PageRank in the web-ranking area, respectively. The REK Trust Model is also applied in variety of IoT scenarios such as Mobile Crowd-Sensing (MCS), Car Sharing service, Data Sharing and Exchange platform in Smart Cities and in Vehicular Networks; and for empowering Blockchain-based systems. The feasibility and effectiveness of the REK model and associated evaluation mechanisms are proved not only by the theoretical analysis but also by real-world applications deployed in our ongoing TII and Wise-IoT projects
    corecore