SlideShare a Scribd company logo
ELEC6840A Final Year Project A
Answers:
Introduction
Project Aims
The aim of the project is to address the issues implementing the Trust Management Model.
In order to address the issue, the appropriate existing pieces of literature will be reviewed
along with discussing a proper methodology.
Background
The Trust Management Model is basically considered as a viable solution by which the IoT
issues are addressed. By optimizing the protection, as well as process of the support
decision making, the concerned model identifies the untrusted behaviour, installation of the
untrusted objects and redirecting the functionality for trusted zones (Malik et al. 2019).
According to the Trust Management model a system is proposed through which the trust
management system can be implemented for cloud computing. As a result, secured data
access is assured by the cloud service provider. Herein the method of trust evaluation gets
proposed to weight the trust factors for calculating the multiple attributes.
Research Problems And The Context
In terms of research problem the issue of abstract notion of the non-measurable variables
will be taken into account. Considering this fact the concept of Trust Management Model
will be concerned as a viable solution for resolving the IOT issues. As such the issues will be
focused on identifying the areas of support for the decision making process, optimisation of
protection, and identification of untrusted behaviour. Herein the components of the Trust
Management Model will be discussed.
Expected Outcomes
In terms of expected outcomes, it can be stated that the research will address the way
through which the issues are addressed by the Trust Management Model.
Benefits And Significance
In terms of benefits, it can be stated that the study is significant because it will review
appropriate pieces of the existing literature. As the data will be gathered from the already
published research, therefore authentic data will be presented by the concerned research.
Issues in current Trust Management Model: In current Trust Management Model it is seen
that the concerned model fails to optimise the protection along with supporting the decision
making process. As a result, the trust management system got failed to be implemented for
the cloud computing. The issues in trust evaluation method weighted the trust factors to be
calculated considering the several attributes.
How to resolve the issues: In order to resolve the said issue, the cloud security standard will
be established. As such, the SOC 2 standard will be demonstrating the policies, controls and
procedures of the firm in order to meet the trust management principles such as
Availability, Security, Processing Integrity, Privacy and Confidentiality.
Research Methodology
What is the Problem?
The issues of abstract notions of non-measurable variables has been considered in terms of
the problem. In light of this, the Trust Management Model idea will be considered as a
feasible approach for tackling IoT concerns (Kochovski et al. 2019). As a result, the concerns
will be focused on identifying the areas of support decision-making process, protection
optimization, and recognising untrustworthy behaviour. The Trust Management Model's
components will be explained in this section.
How do you break it down to smaller (sub-) problems?
In order to break down the main problems into the sub problems, establishment of the sub
problems will be done for distinguishing their characters. Herein it is worth to mention that
in order to identify the key problems, the sub problems will be considered as a researchable
as well as the complete unit (Rehiman and Veni 2017). As such the sub problem will be
clearly linked with the data interpretation.
How Do You Address Each Sub-Problem?
In order to identify the each sub problem, all the sub problems will be identified as a
complete resealable unit. Herein, the sub problems will be strongly linked with the data
interpretation. It is worth mentioning here that the sub problems need to be added up to
the total of the issue. Herein the sub problems will be established based on the aim of the
research.
How do you put everything together to solve your big problem?
In order to solve the big problem of the research, the main problem will be differentiated
from the opinion fact. As such specifying the underlying issues, the alternative solutions are
expected to be generated on that note. Apart from that by selecting as well as evaluating the
alternative, the target standard will be relatively linked.
Literature Review
Theme 1: Understanding the concept of Trust management in IoT:
In relation to the IoT, the concept of trust management has appeared as a vital solution for
trust issues. Some previous research has stated that the concerned model helps to optimize
the protection along with supporting the decision making process. As such by identifying
the untrusted behaviour, it can isolate the untrusted objects along with redirecting the
functionality associated with the trusted zones. Based on this concern theme, it can be
stated that the hierchical trust management model focuses on inverted tree structure
focusing on which the root causes are analysed. On the other hand, as believed by Li,
Varadharajan and Nepal (2019) as the root considered as the starting point of a trust,
therefore the top down arts enhance the leaf node of the user.
Theme 2: Trust Management Model as a Public infrastructure:
Trust Management Model has been identified as a collection of rules through which the
application is informed regarding deciding the legitimacy of the digital certificate. The
research by Isirova and Potii (2018) revealed that fundamentally the trust management
model provides the positive environment whether to trust on a particular organization or
needs to depend on the certificate issued by the hierarchical department of the
organization. Herein, in order to address the issues most of the organizations opt for the
peer to peer architecture due to its well defined structure of the organization as well as
discovering the complex validation.
Theme 3: Effective distribution of the trust management model for IoT:
The Internet of Things (IoT) is a worldwide architecture for the digital age that connects
physical or digital things with current interoperability technological tools under
development to deliver improved services. It is indeed interesting to note that the explosion
in the number of cell phones and internet connections has created a new industry with
nearly limitless possibilities. Every day, 5.5 million things are connected throughout the
globe in 2016. By 2020, the population might be in the billions (Maddar, Kammoun and
Youssef 2018). According to Gartner, 26 billion items will be deployed by 2020. On the
other hand, in order to address the issue, In comparison to the above theme, it can be stated
that in order to address the issue, the categorization process is rather different. The
clustering approach can be represented on a computer as an inversion tree, but the web-of-
trust is more directly tied to how people evaluate trustworthiness in their personal
interactions. Customers can define how much trust they have in a certificate by choosing the
number of independent signatories that must be present for it to be considered valid (Tran,
Lu and Weber 2018). This technique works well for small groups with well-established
relationships, but it does not scale well for big groups or where security consistency is
critical, such as the amount of verification required before issuing a certificate.
Results/Outcomes And Analysis/Discussion
Introducing and discussing the results/outcomes that have achieved:
In terms of achieving the outcomes, it can be stated that the concerned study has identified
several themes identifying the existing pieces of literature. Herein as identified from the
selected themes, in the context of the Internet of Things, the notion of trust management
has emerged as a viable solution to trust challenges. According to prior study, the concerned
model aids in the optimization of protection as well as the decision-making process. As a
result, it may segregate untrusted objects while diverting functionality associated with
trusted zones by recognising untrustworthy behaviour (Mehraj and Banday 2020).
According to this common concept, the hierchical trust management model relies on an
inverted tree structure in which the root causes are identified. On the other hand, because
the root is thought to be the starting point of a trust, top down arts are used to enrich the
sub users. The abstract idea of non-measurable variables has been considered in terms of
the research challenge. Given this, the Trust Management Model idea will be seen as a
feasible approach for overcoming IoT concerns. As a result, the concern has been focused on
identifying the areas of support decision-making process, protection optimization, and
untrustworthy behaviour identification (Awan et al. 2019). The Trust Management Model's
components will be explored in this article. In terms of predicted outcomes, the study has
been looked into how the Trust Management Model deals with challenges.
Suggestions For Future Solutions:
In terms of future solutions, it can be stated that in the forthcoming days, the Block chain
based trust management model is required to be used (Qureshi et al. 2020). As such the
trust related issues can be attacked by producing the malicious users through utilizing the
techniques of classification. Decentralization of the online social network is another area to
be concerned for the future solutions.
What is to be done in the rest weeks?
Activities during research
1st Week
2nd Week
3rd Week
4th Week
5th Week
6th Week
7th Week
Selection of research topic
ü
Composition of the literature review
ü
Methodology followed in the research
ü
Collection of secondary data for the research
ü
ü
Data analysis and interpretation
ü
ü
Findings
ü
Conclusion and Recommendation for the research study
ü
Final submission of the research report
ü
(Source: Self-Creation)
Conclusion And Future Outlook
What problems have you addressed?
It can be concluded that The Trust Management Model is widely recognised as a viable
approach to dealing with IoT issues. By optimizing the protection and support decision-
making processes, the concerned model recognises untrustworthy behaviour, isolates
untrustworthy objects, and diverts functionality to trusted zones. A way for establishing a
trust management system for cloud computing is described by the Trust Management
Model. As a result, the cloud service provider ensures that data is accessible in a secure
manner. In this research, a trust evaluation approach is presented for computing a variety
of attributes by weighing the trust components.
What results have you achieved and what is the significance of the results?
The result that has been achieved from the study is that In terms of accomplishing the
desired goals, it can be claimed that the research project has found various topics through
analysing existing literature. As a result of the chosen topics, the following is presented. The
concept of trust management has evolved as a feasible solution to trust concerns in the
context of the Internet of Things. The concerned model, according to previous research,
contributes in the optimization of protection as well as the decision-making process. As a
consequence, by recognising untrustworthy behaviour, it may be able to isolate untrusted
objects while redirecting functionality associated with trusted zones.
What problems would need to be addressed in future?
In terms of problems to be addressed in future, it can be claimed that the block chain-based
trust management model will be necessary in the near future. As a result, trust-related
issues may be targeted by creating fraudulent users and employing categorization
algorithms. Another area to consider for future solutions is decentralization of online social
networks.
References
Awan, K.A., Din, I.U., Almogren, A., Guizani, M., Altameem, A. and Jadoon, S.U., 2019.
Robusttrust–a pro-privacy robust distributed trust management mechanism for the
internet of things. IEEE Access, 7, pp.62095-62106.
Kochovski, P., Gec, S., Stankovski, V., Bajec, M. and Drobintsev, P.D., 2019. Trust management
in a blockchain based fog computing platform with trustless smart oracles. Future
Generation Computer Systems, 101, pp.747-759.
Maddar, H., Kammoun, W. and Youssef, H., 2018. Effective distributed trust management
model for Internet of Things. Procedia Computer Science, 126, pp.321-334.
Qureshi, K.N., Iftikhar, A., Bhatti, S.N., Piccialli, F., Giampaolo, F. and Jeon, G., 2020. Trust
management and evaluation for edge intelligence in the Internet of Things. Engineering
Applications of Artificial Intelligence, 94, p.103756.
Rehiman, K.R. and Veni, S., 2017, February. A trust management model for sensor enabled
mobile devices in IoT. In 2017 International Conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud)(I-SMAC) (pp. 807-810). IEEE.
Isirova, K. and Potii, O., 2018, May. Decentralized public key infrastructure development
principles. In 2018 IEEE 9th International Conference on Dependable Systems, Services and
Technologies (DESSERT) (pp. 305-310). IEEE.
Tran, A.B., Lu, Q. and Weber, I., 2018, September. Lorikeet: A Model-Driven Engineering
Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM
(Dissertation/Demos/Industry) (pp. 56-60).
Li, N., Varadharajan, V. and Nepal, S., 2019, July. Context-aware trust management system
for iot applications with multiple domains. In 2019 IEEE 39th International Conference on
Distributed Computing Systems (ICDCS) (pp. 1138-1148).
Malik, S., Dedeoglu, V., Kanhere, S.S. and Jurdak, R., 2019, July. Trustchain: Trust
management in blockchain and iot supported supply chains. In 2019 IEEE International
Conference on Blockchain (Blockchain) (pp. 184-193). IEEE.
Mehraj, S. and Banday, M.T., 2020, January. Establishing a zero trust strategy in the cloud
computing environment. In 2020 International Conference on Computer Communication
and Informatics (ICCCI) (pp. 1-6). IEEE.

More Related Content

Similar to ELEC6840A Final Year Project A.docx

Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
Are QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docxAre QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docx
siyoumnegash1
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
haifa rzem
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
blondellchancy
 
Predictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopiaPredictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopia
Hazelknight Media & Entertainment Pvt Ltd
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
IRJET Journal
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
jeanettehully
 
AI Trends.pdf
AI Trends.pdfAI Trends.pdf
AI Trends.pdf
RevaldiAnggara
 
Persuasive Essay Middle School Rubric
Persuasive Essay Middle School RubricPersuasive Essay Middle School Rubric
Persuasive Essay Middle School Rubric
Alicia Galindo
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
IRJET Journal
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
Antoinette Williams
 
The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...
Souad Kamoun Chouk
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Momo Scott
 
MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docx
annandleola
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
Hafiz Sanni
 
A System Approach For Defining Data Center Value Proposition.pdf
A System Approach For Defining Data Center Value Proposition.pdfA System Approach For Defining Data Center Value Proposition.pdf
A System Approach For Defining Data Center Value Proposition.pdf
Vernette Whiteside
 

Similar to ELEC6840A Final Year Project A.docx (19)

Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
Are QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docxAre QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
 
Predictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopiaPredictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopia
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
AI Trends.pdf
AI Trends.pdfAI Trends.pdf
AI Trends.pdf
 
Persuasive Essay Middle School Rubric
Persuasive Essay Middle School RubricPersuasive Essay Middle School Rubric
Persuasive Essay Middle School Rubric
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry
 
MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docx
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
 
A System Approach For Defining Data Center Value Proposition.pdf
A System Approach For Defining Data Center Value Proposition.pdfA System Approach For Defining Data Center Value Proposition.pdf
A System Approach For Defining Data Center Value Proposition.pdf
 

More from 4934bk

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
4934bk
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
4934bk
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
4934bk
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
4934bk
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
4934bk
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
4934bk
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
4934bk
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
4934bk
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
4934bk
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
4934bk
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
4934bk
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
4934bk
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
4934bk
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
4934bk
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
4934bk
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
4934bk
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
4934bk
 
What.docx
What.docxWhat.docx
What.docx
4934bk
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
4934bk
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
4934bk
 

More from 4934bk (20)

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
 
What.docx
What.docxWhat.docx
What.docx
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

ELEC6840A Final Year Project A.docx

  • 1. ELEC6840A Final Year Project A Answers: Introduction Project Aims The aim of the project is to address the issues implementing the Trust Management Model. In order to address the issue, the appropriate existing pieces of literature will be reviewed along with discussing a proper methodology. Background The Trust Management Model is basically considered as a viable solution by which the IoT issues are addressed. By optimizing the protection, as well as process of the support decision making, the concerned model identifies the untrusted behaviour, installation of the untrusted objects and redirecting the functionality for trusted zones (Malik et al. 2019). According to the Trust Management model a system is proposed through which the trust management system can be implemented for cloud computing. As a result, secured data access is assured by the cloud service provider. Herein the method of trust evaluation gets proposed to weight the trust factors for calculating the multiple attributes. Research Problems And The Context In terms of research problem the issue of abstract notion of the non-measurable variables will be taken into account. Considering this fact the concept of Trust Management Model will be concerned as a viable solution for resolving the IOT issues. As such the issues will be focused on identifying the areas of support for the decision making process, optimisation of protection, and identification of untrusted behaviour. Herein the components of the Trust Management Model will be discussed. Expected Outcomes In terms of expected outcomes, it can be stated that the research will address the way through which the issues are addressed by the Trust Management Model.
  • 2. Benefits And Significance In terms of benefits, it can be stated that the study is significant because it will review appropriate pieces of the existing literature. As the data will be gathered from the already published research, therefore authentic data will be presented by the concerned research. Issues in current Trust Management Model: In current Trust Management Model it is seen that the concerned model fails to optimise the protection along with supporting the decision making process. As a result, the trust management system got failed to be implemented for the cloud computing. The issues in trust evaluation method weighted the trust factors to be calculated considering the several attributes. How to resolve the issues: In order to resolve the said issue, the cloud security standard will be established. As such, the SOC 2 standard will be demonstrating the policies, controls and procedures of the firm in order to meet the trust management principles such as Availability, Security, Processing Integrity, Privacy and Confidentiality. Research Methodology What is the Problem? The issues of abstract notions of non-measurable variables has been considered in terms of the problem. In light of this, the Trust Management Model idea will be considered as a feasible approach for tackling IoT concerns (Kochovski et al. 2019). As a result, the concerns will be focused on identifying the areas of support decision-making process, protection optimization, and recognising untrustworthy behaviour. The Trust Management Model's components will be explained in this section. How do you break it down to smaller (sub-) problems? In order to break down the main problems into the sub problems, establishment of the sub problems will be done for distinguishing their characters. Herein it is worth to mention that in order to identify the key problems, the sub problems will be considered as a researchable as well as the complete unit (Rehiman and Veni 2017). As such the sub problem will be clearly linked with the data interpretation. How Do You Address Each Sub-Problem? In order to identify the each sub problem, all the sub problems will be identified as a complete resealable unit. Herein, the sub problems will be strongly linked with the data interpretation. It is worth mentioning here that the sub problems need to be added up to the total of the issue. Herein the sub problems will be established based on the aim of the research.
  • 3. How do you put everything together to solve your big problem? In order to solve the big problem of the research, the main problem will be differentiated from the opinion fact. As such specifying the underlying issues, the alternative solutions are expected to be generated on that note. Apart from that by selecting as well as evaluating the alternative, the target standard will be relatively linked. Literature Review Theme 1: Understanding the concept of Trust management in IoT: In relation to the IoT, the concept of trust management has appeared as a vital solution for trust issues. Some previous research has stated that the concerned model helps to optimize the protection along with supporting the decision making process. As such by identifying the untrusted behaviour, it can isolate the untrusted objects along with redirecting the functionality associated with the trusted zones. Based on this concern theme, it can be stated that the hierchical trust management model focuses on inverted tree structure focusing on which the root causes are analysed. On the other hand, as believed by Li, Varadharajan and Nepal (2019) as the root considered as the starting point of a trust, therefore the top down arts enhance the leaf node of the user. Theme 2: Trust Management Model as a Public infrastructure: Trust Management Model has been identified as a collection of rules through which the application is informed regarding deciding the legitimacy of the digital certificate. The research by Isirova and Potii (2018) revealed that fundamentally the trust management model provides the positive environment whether to trust on a particular organization or needs to depend on the certificate issued by the hierarchical department of the organization. Herein, in order to address the issues most of the organizations opt for the peer to peer architecture due to its well defined structure of the organization as well as discovering the complex validation. Theme 3: Effective distribution of the trust management model for IoT: The Internet of Things (IoT) is a worldwide architecture for the digital age that connects physical or digital things with current interoperability technological tools under development to deliver improved services. It is indeed interesting to note that the explosion in the number of cell phones and internet connections has created a new industry with nearly limitless possibilities. Every day, 5.5 million things are connected throughout the globe in 2016. By 2020, the population might be in the billions (Maddar, Kammoun and Youssef 2018). According to Gartner, 26 billion items will be deployed by 2020. On the other hand, in order to address the issue, In comparison to the above theme, it can be stated that in order to address the issue, the categorization process is rather different. The clustering approach can be represented on a computer as an inversion tree, but the web-of-
  • 4. trust is more directly tied to how people evaluate trustworthiness in their personal interactions. Customers can define how much trust they have in a certificate by choosing the number of independent signatories that must be present for it to be considered valid (Tran, Lu and Weber 2018). This technique works well for small groups with well-established relationships, but it does not scale well for big groups or where security consistency is critical, such as the amount of verification required before issuing a certificate. Results/Outcomes And Analysis/Discussion Introducing and discussing the results/outcomes that have achieved: In terms of achieving the outcomes, it can be stated that the concerned study has identified several themes identifying the existing pieces of literature. Herein as identified from the selected themes, in the context of the Internet of Things, the notion of trust management has emerged as a viable solution to trust challenges. According to prior study, the concerned model aids in the optimization of protection as well as the decision-making process. As a result, it may segregate untrusted objects while diverting functionality associated with trusted zones by recognising untrustworthy behaviour (Mehraj and Banday 2020). According to this common concept, the hierchical trust management model relies on an inverted tree structure in which the root causes are identified. On the other hand, because the root is thought to be the starting point of a trust, top down arts are used to enrich the sub users. The abstract idea of non-measurable variables has been considered in terms of the research challenge. Given this, the Trust Management Model idea will be seen as a feasible approach for overcoming IoT concerns. As a result, the concern has been focused on identifying the areas of support decision-making process, protection optimization, and untrustworthy behaviour identification (Awan et al. 2019). The Trust Management Model's components will be explored in this article. In terms of predicted outcomes, the study has been looked into how the Trust Management Model deals with challenges. Suggestions For Future Solutions: In terms of future solutions, it can be stated that in the forthcoming days, the Block chain based trust management model is required to be used (Qureshi et al. 2020). As such the trust related issues can be attacked by producing the malicious users through utilizing the techniques of classification. Decentralization of the online social network is another area to be concerned for the future solutions. What is to be done in the rest weeks? Activities during research 1st Week
  • 5. 2nd Week 3rd Week 4th Week 5th Week 6th Week 7th Week Selection of research topic ü
  • 6. Composition of the literature review ü
  • 7. Methodology followed in the research ü Collection of secondary data for the research
  • 8. ü ü Data analysis and interpretation
  • 10. ü Conclusion and Recommendation for the research study ü
  • 11. Final submission of the research report ü (Source: Self-Creation) Conclusion And Future Outlook What problems have you addressed? It can be concluded that The Trust Management Model is widely recognised as a viable approach to dealing with IoT issues. By optimizing the protection and support decision- making processes, the concerned model recognises untrustworthy behaviour, isolates untrustworthy objects, and diverts functionality to trusted zones. A way for establishing a trust management system for cloud computing is described by the Trust Management Model. As a result, the cloud service provider ensures that data is accessible in a secure manner. In this research, a trust evaluation approach is presented for computing a variety
  • 12. of attributes by weighing the trust components. What results have you achieved and what is the significance of the results? The result that has been achieved from the study is that In terms of accomplishing the desired goals, it can be claimed that the research project has found various topics through analysing existing literature. As a result of the chosen topics, the following is presented. The concept of trust management has evolved as a feasible solution to trust concerns in the context of the Internet of Things. The concerned model, according to previous research, contributes in the optimization of protection as well as the decision-making process. As a consequence, by recognising untrustworthy behaviour, it may be able to isolate untrusted objects while redirecting functionality associated with trusted zones. What problems would need to be addressed in future? In terms of problems to be addressed in future, it can be claimed that the block chain-based trust management model will be necessary in the near future. As a result, trust-related issues may be targeted by creating fraudulent users and employing categorization algorithms. Another area to consider for future solutions is decentralization of online social networks. References Awan, K.A., Din, I.U., Almogren, A., Guizani, M., Altameem, A. and Jadoon, S.U., 2019. Robusttrust–a pro-privacy robust distributed trust management mechanism for the internet of things. IEEE Access, 7, pp.62095-62106. Kochovski, P., Gec, S., Stankovski, V., Bajec, M. and Drobintsev, P.D., 2019. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems, 101, pp.747-759. Maddar, H., Kammoun, W. and Youssef, H., 2018. Effective distributed trust management model for Internet of Things. Procedia Computer Science, 126, pp.321-334. Qureshi, K.N., Iftikhar, A., Bhatti, S.N., Piccialli, F., Giampaolo, F. and Jeon, G., 2020. Trust management and evaluation for edge intelligence in the Internet of Things. Engineering Applications of Artificial Intelligence, 94, p.103756. Rehiman, K.R. and Veni, S., 2017, February. A trust management model for sensor enabled mobile devices in IoT. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 807-810). IEEE. Isirova, K. and Potii, O., 2018, May. Decentralized public key infrastructure development
  • 13. principles. In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 305-310). IEEE. Tran, A.B., Lu, Q. and Weber, I., 2018, September. Lorikeet: A Model-Driven Engineering Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM (Dissertation/Demos/Industry) (pp. 56-60). Li, N., Varadharajan, V. and Nepal, S., 2019, July. Context-aware trust management system for iot applications with multiple domains. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1138-1148). Malik, S., Dedeoglu, V., Kanhere, S.S. and Jurdak, R., 2019, July. Trustchain: Trust management in blockchain and iot supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 184-193). IEEE. Mehraj, S. and Banday, M.T., 2020, January. Establishing a zero trust strategy in the cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.