Home // ICDS 2014, The Eighth International Conference on Digital Society // View article
Trust Blueprints and Use Cases
Authors:
Deepak Vij
Ishita Majumdar
Naveen Dhar
George Vanecek
Keywords: Trust Management; Internet of Things; Cloud Computing; Device Mobility; Authentication; XACML; Authorization; Intercloud; Context-Awareness; Evidence-based Trust.
Abstract:
As the scope of current distributed computing model envisioned by the contemporary cloud computing environment enlarges to future federated Intercloud and ubiquitous and pervasive computing models such as Internet of Things (IoT), many difficult problems and challenges arise. Security is one of the most important concerns of such a computing environment. Current security mechanisms are very static, inflexible and not granular enough to make efficient and informed decisions in the Service Provider based computing environment. The conventional trust mechanisms in place are inadequate at addressing granular level trust issues in the highly distributed open environments. In this paper, we explore various Trust Management schemes and blueprints for enabling a framework that interested parties can use to determine the trustworthiness of disparate and heterogeneous computing entities. The paper also enumerates various business use case scenarios articulating how such a Trust Management framework would be invaluable for addressing the current as well as future computing environments needs.
Pages: 93 to 101
Copyright: Copyright (c) IARIA, 2014
Publication date: March 23, 2014
Published in: conference
ISSN: 2308-3956
ISBN: 978-1-61208-324-7
Location: Barcelona, Spain
Dates: from March 23, 2014 to March 27, 2014