Information-centric trust management for big data-enabled IoT

Information-centric trust management for big data-enabled IoT

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Big Data-Enabled Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Trust management (TM) plays a significant role in big data-enabled Internet of Things (IoT) for trustworthy data mining and fusion operations. It helps to deal with uncertainty and risk when users engage in an increased consumption of IoT services and applications. However, big data-enabled IoT has introduced newer challenges for TM. These challenges are due to the information-centric nature of the IoT rather than the trivial device-centric nature of legacy networks. Given the heterogeneous nature of IoT systems, this has initiated a new debate on ways to manage trust for big data-enabled IoT in a holistic context-dependent way with greater interoperability. From a user's perspective, a fully acceptable IoT-based analytics must be a trustworthy system that offers a range of competent context-aware services, along with effective security and privacy for its personalized data. Focused on this discussion, this chapter first tends to offer the reader with a general understanding of definitions, objectives and necessity of trust. Then it aims to identify the trust requirements of big data-enabled IoT systems such as interoperability, security, privacy, identity and policy requirements. Afterwards, along with an overview of information-centric trusted systems, it discusses the state-of-the-art frameworks, models and methods for information-centric TM in big data-enabled IoT systems and also tries to identify the future trends and open challenges in these areas.

Chapter Contents:

  • 19.1 Introduction
  • 19.2 Overview of trust management
  • 19.2.1 Definitions of trust
  • Trust in social psychology
  • Trust in philosophy
  • 19.2.2 Semantics of trust
  • 19.2.3 Elements of trust
  • 19.3 Trust-management systems
  • 19.3.1 Overview
  • 19.3.2 Trust sources
  • 19.3.3 Trust methods
  • 19.4 Trust management for big data-enabled IoT
  • 19.4.1 Information-centric trust-management systems
  • 19.4.2 Challenges of information-centric trust
  • Data processing
  • Security and privacy
  • Interoperability
  • 19.4.3 Requirements for trust in big data-enabled IoT
  • 19.5 Recent advancements in information-centric trust management in big data-enabled IoT
  • 19.5.1 Trusted data processing
  • Data sensing and collection
  • Data fusion and mining
  • Data transmission and communication
  • 19.5.2 Security and privacy-enabled trust management
  • 19.5.3 Trust frameworks for interoperability
  • 19.6 Discussion and future research
  • 19.6.1 Anticipated challenges and research trends
  • 19.7 Conclusion
  • References

Inspec keywords: trusted computing; Big Data; Internet of Things; data mining

Other keywords: fusion operations; trivial device-centric nature; information-centric trusted systems; interoperability; information-centric nature; big data-enabled IoT systems; fully acceptable IoT-based analytics; big data-enabled Internet; information-centric TM; information-centric trust management; context-aware services; personalized data; trustworthy data mining

Subjects: Knowledge engineering techniques; Ubiquitous and pervasive computing; Data security

Preview this chapter:
Zoom in

Information-centric trust management for big data-enabled IoT, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc025e/PBPC025E_ch19-1.gif /docserver/preview/fulltext/books/pc/pbpc025e/PBPC025E_ch19-2.gif

Related content

This is a required field
Please enter a valid email address