New Paper Accepted: Revisiting Trust Management in the Data Economy: A Road Map
Our paper entitled Revisiting Trust Management in the Data Economy: A Road Map has been accepted for publication in the journal IEEE Internet Computing.
In this paper, we define a roadmap to guide research on new-generation trust management systems, departing from user- and resource-based access controls towards more collaborative and flexible solutions.
Our roadmap is defined in terms of i) shortages, ii) challenges, iii) research directions organized in a iv) timeline. The table below summarizes the roadmap; an extended version can be found here. The shortages indicated in the table are: S1: static resource sharing, S2: Service profiles based on identity, attributes, and functional behavior, S3: Static trust establishment, and S4: Centralized model.
Research direction | Challenge | Shortage | Timeline | Related techniques |
---|---|---|---|---|
RD1: Requirements | C1.1: Multi-party data sharing | S1, S2 | Short, Medium, Long | Role-based access control, quality of service, identity management, authorization protocols, service selection and composition, SLAs, reputation, and certification |
C2.1: Trustworthiness | S2, S3 | Short | ||
C2.3: Derivation | S1, S2, S3 | Medium | ||
RD2: Protocol | C1.2: Non-binary outcome | S1 | Short | Partial and incremental trust, credentials management, SLAs, data governance and privacy, and risk-adaptive access control |
C3.1: Flexible execution | S4 | Short | ||
C3.2: Best-effort solution | S1 | Short | ||
RD3: History | C1.3: Decentralized environment | S4 | Medium, Long | Blockchain, Bayesian inference, version control, and behavior prediction |
C4.2: History-based trust | S3 | Medium, Long | ||
C4.3: Management of historical interactions | S3, S4 | Medium, Long | ||
RD4: Conflicts | C3.2: Best-effort solution | S1 | Short | MCDA, policy reconciliation, conflict resolution, version control, and consensus |
C3.3: Conflict resolution | S1, S3 | Medium, Long | ||
C4.1: Reliability | S3, S4 | Medium, Long | ||
RD5: Assurance | C2.2: Secure management | S1, S4 | Short, Medium, Long | Credential management, selective release, certification, and risk management |
C2.3: Derivation | S1, S2, S3 | Medium |
The authors of the paper are Claudio A. Ardagna, Nicola Bena (me), Nadia Bennani, Chirine Ghedira-Guegan, Nicolò Grecchi, and Genoveva Vargas-Solar. It is the first result of the collaboration between our research group at Università degli Studi di Milano and LIRIS Lab, INSA Lyon.
The abstract is below.
In the last two decades, multiple information and communications technology evolutions have boosted the ability to collect and analyze vast numbers of data (on the order of zettabytes). Collectively, they have paved the way for the so-called data economy, revolutionizing most sectors of our society, including health care, transportation, and grids. At the core of this revolution, distributed data-intensive applications compose services operated by multiple parties in the cloud-edge continuum; they process, manage, and exchange massive numbers of data at an unprecedented rate. However, data hold little value without adequate data protection. Traditional solutions, which aim to balance data quality and protection, are insufficient to address the peculiarities of the data economy, including trustworthy data sharing and management, composite service support, and multiparty data lifecycle. This article analyzes how trust management systems (TMSs) can regain the lead in supporting trustworthy data-intensive applications, discussing current challenges and proposing a road map for new-generation TMSs in the data economy.
The paper is open access, go read it!