Home // ICDS 2014, The Eighth International Conference on Digital Society // View article


Trust Blueprints and Use Cases

Authors:
Deepak Vij
Ishita Majumdar
Naveen Dhar
George Vanecek

Keywords: Trust Management; Internet of Things; Cloud Computing; Device Mobility; Authentication; XACML; Authorization; Intercloud; Context-Awareness; Evidence-based Trust.

Abstract:
As the scope of current distributed computing model envisioned by the contemporary cloud computing environment enlarges to future federated Intercloud and ubiquitous and pervasive computing models such as Internet of Things (IoT), many difficult problems and challenges arise. Security is one of the most important concerns of such a computing environment. Current security mechanisms are very static, inflexible and not granular enough to make efficient and informed decisions in the Service Provider based computing environment. The conventional trust mechanisms in place are inadequate at addressing granular level trust issues in the highly distributed open environments. In this paper, we explore various Trust Management schemes and blueprints for enabling a framework that interested parties can use to determine the trustworthiness of disparate and heterogeneous computing entities. The paper also enumerates various business use case scenarios articulating how such a Trust Management framework would be invaluable for addressing the current as well as future computing environments needs.

Pages: 93 to 101

Copyright: Copyright (c) IARIA, 2014

Publication date: March 23, 2014

Published in: conference

ISSN: 2308-3956

ISBN: 978-1-61208-324-7

Location: Barcelona, Spain

Dates: from March 23, 2014 to March 27, 2014