SlideShare a Scribd company logo
Answers: Introduction Project Aims The aim of the project is
Answers:
Introduction
Project Aims
The aim of the project is to address the issues implementing the Trust Management Model.
In order to address the issue, the appropriate existing pieces of literature will be reviewed
along with discussing a proper methodology.
Background
The Trust Management Model is basically considered as a viable solution by which the IoT
issues are addressed. By optimizing the protection, as well as process of the support
decision making, the concerned model identifies the untrusted behaviour, installation of the
untrusted objects and redirecting the functionality for trusted zones (Malik et al. 2019).
According to the Trust Management model a system is proposed through which the trust
management system can be implemented for cloud computing. As a result, secured data
access is assured by the cloud service provider. Herein the method of trust evaluation gets
proposed to weight the trust factors for calculating the multiple attributes.
Research Problems And The Context
In terms of research problem the issue of abstract notion of the non-measurable variables
will be taken into account. Considering this fact the concept of Trust Management Model
will be concerned as a viable solution for resolving the IOT issues. As such the issues will be
focused on identifying the areas of support for the decision making process, optimisation of
protection, and identification of untrusted behaviour. Herein the components of the Trust
Management Model will be discussed.
Expected Outcomes
In terms of expected outcomes, it can be stated that the research will address the way
through which the issues are addressed by the Trust Management Model.
Benefits And Significance
In terms of benefits, it can be stated that the study is significant because it will review
appropriate pieces of the existing literature. As the data will be gathered from the already
published research, therefore authentic data will be presented by the concerned research.
Issues in current Trust Management Model: In current Trust Management Model it is seen
that the concerned model fails to optimise the protection along with supporting the decision
making process. As a result, the trust management system got failed to be implemented for
the cloud computing. The issues in trust evaluation method weighted the trust factors to be
calculated considering the several attributes.
How to resolve the issues: In order to resolve the said issue, the cloud security standard will
be established. As such, the SOC 2 standard will be demonstrating the policies, controls and
procedures of the firm in order to meet the trust management principles such as
Availability, Security, Processing Integrity, Privacy and Confidentiality.
Research Methodology
What is the Problem?
The issues of abstract notions of non-measurable variables has been considered in terms of
the problem. In light of this, the Trust Management Model idea will be considered as a
feasible approach for tackling IoT concerns (Kochovski et al. 2019). As a result, the concerns
will be focused on identifying the areas of support decision-making process, protection
optimization, and recognising untrustworthy behaviour. The Trust Management Model's
components will be explained in this section.
How do you break it down to smaller (sub-) problems?
In order to break down the main problems into the sub problems, establishment of the sub
problems will be done for distinguishing their characters. Herein it is worth to mention that
in order to identify the key problems, the sub problems will be considered as a researchable
as well as the complete unit (Rehiman and Veni 2017). As such the sub problem will be
clearly linked with the data interpretation.
How Do You Address Each Sub-Problem?
In order to identify the each sub problem, all the sub problems will be identified as a
complete resealable unit. Herein, the sub problems will be strongly linked with the data
interpretation. It is worth mentioning here that the sub problems need to be added up to
the total of the issue. Herein the sub problems will be established based on the aim of the
research.
How do you put everything together to solve your big problem?
In order to solve the big problem of the research, the main problem will be differentiated
from the opinion fact. As such specifying the underlying issues, the alternative solutions are
expected to be generated on that note. Apart from that by selecting as well as evaluating the
alternative, the target standard will be relatively linked.
Literature Review
Theme 1: Understanding the concept of Trust management in IoT:
In relation to the IoT, the concept of trust management has appeared as a vital solution for
trust issues. Some previous research has stated that the concerned model helps to optimize
the protection along with supporting the decision making process. As such by identifying
the untrusted behaviour, it can isolate the untrusted objects along with redirecting the
functionality associated with the trusted zones. Based on this concern theme, it can be
stated that the hierchical trust management model focuses on inverted tree structure
focusing on which the root causes are analysed. On the other hand, as believed by Li,
Varadharajan and Nepal (2019) as the root considered as the starting point of a trust,
therefore the top down arts enhance the leaf node of the user.
Theme 2: Trust Management Model as a Public infrastructure:
Trust Management Model has been identified as a collection of rules through which the
application is informed regarding deciding the legitimacy of the digital certificate. The
research by Isirova and Potii (2018) revealed that fundamentally the trust management
model provides the positive environment whether to trust on a particular organization or
needs to depend on the certificate issued by the hierarchical department of the
organization. Herein, in order to address the issues most of the organizations opt for the
peer to peer architecture due to its well defined structure of the organization as well as
discovering the complex validation.
Theme 3: Effective distribution of the trust management model for IoT:
The Internet of Things (IoT) is a worldwide architecture for the digital age that connects
physical or digital things with current interoperability technological tools under
development to deliver improved services. It is indeed interesting to note that the explosion
in the number of cell phones and internet connections has created a new industry with
nearly limitless possibilities. Every day, 5.5 million things are connected throughout the
globe in 2016. By 2020, the population might be in the billions (Maddar, Kammoun and
Youssef 2018). According to Gartner, 26 billion items will be deployed by 2020. On the
other hand, in order to address the issue, In comparison to the above theme, it can be stated
that in order to address the issue, the categorization process is rather different. The
clustering approach can be represented on a computer as an inversion tree, but the web-of-
trust is more directly tied to how people evaluate trustworthiness in their personal
interactions. Customers can define how much trust they have in a certificate by choosing the
number of independent signatories that must be present for it to be considered valid (Tran,
Lu and Weber 2018). This technique works well for small groups with well-established
relationships, but it does not scale well for big groups or where security consistency is
critical, such as the amount of verification required before issuing a certificate.
Results/Outcomes And Analysis/Discussion
Introducing and discussing the results/outcomes that have achieved:
In terms of achieving the outcomes, it can be stated that the concerned study has identified
several themes identifying the existing pieces of literature. Herein as identified from the
selected themes, in the context of the Internet of Things, the notion of trust management
has emerged as a viable solution to trust challenges. According to prior study, the concerned
model aids in the optimization of protection as well as the decision-making process. As a
result, it may segregate untrusted objects while diverting functionality associated with
trusted zones by recognising untrustworthy behaviour (Mehraj and Banday 2020).
According to this common concept, the hierchical trust management model relies on an
inverted tree structure in which the root causes are identified. On the other hand, because
the root is thought to be the starting point of a trust, top down arts are used to enrich the
sub users. The abstract idea of non-measurable variables has been considered in terms of
the research challenge. Given this, the Trust Management Model idea will be seen as a
feasible approach for overcoming IoT concerns. As a result, the concern has been focused on
identifying the areas of support decision-making process, protection optimization, and
untrustworthy behaviour identification (Awan et al. 2019). The Trust Management Model's
components will be explored in this article. In terms of predicted outcomes, the study has
been looked into how the Trust Management Model deals with challenges.
Suggestions For Future Solutions:
In terms of future solutions, it can be stated that in the forthcoming days, the Block chain
based trust management model is required to be used (Qureshi et al. 2020). As such the
trust related issues can be attacked by producing the malicious users through utilizing the
techniques of classification. Decentralization of the online social network is another area to
be concerned for the future solutions.
What is to be done in the rest weeks?
Activities during research
1st Week
2nd Week
3rd Week
4th Week
5th Week
6th Week
7th Week
Selection of research topic
ü
Composition of the literature review
ü
Methodology followed in the research
ü
Collection of secondary data for the research
ü
ü
Data analysis and interpretation
ü
ü
Findings
ü
Conclusion and Recommendation for the research study
ü
Final submission of the research report
ü
(Source: Self-Creation)
Conclusion And Future Outlook
What problems have you addressed?
It can be concluded that The Trust Management Model is widely recognised as a viable
approach to dealing with IoT issues. By optimizing the protection and support decision-
making processes, the concerned model recognises untrustworthy behaviour, isolates
untrustworthy objects, and diverts functionality to trusted zones. A way for establishing a
trust management system for cloud computing is described by the Trust Management
Model. As a result, the cloud service provider ensures that data is accessible in a secure
manner. In this research, a trust evaluation approach is presented for computing a variety
of attributes by weighing the trust components.
What results have you achieved and what is the significance of the results?
The result that has been achieved from the study is that In terms of accomplishing the
desired goals, it can be claimed that the research project has found various topics through
analysing existing literature. As a result of the chosen topics, the following is presented. The
concept of trust management has evolved as a feasible solution to trust concerns in the
context of the Internet of Things. The concerned model, according to previous research,
contributes in the optimization of protection as well as the decision-making process. As a
consequence, by recognising untrustworthy behaviour, it may be able to isolate untrusted
objects while redirecting functionality associated with trusted zones.
What problems would need to be addressed in future?
In terms of problems to be addressed in future, it can be claimed that the block chain-based
trust management model will be necessary in the near future. As a result, trust-related
issues may be targeted by creating fraudulent users and employing categorization
algorithms. Another area to consider for future solutions is decentralization of online social
networks.
References
Awan, K.A., Din, I.U., Almogren, A., Guizani, M., Altameem, A. and Jadoon, S.U., 2019.
Robusttrust–a pro-privacy robust distributed trust management mechanism for the
internet of things. IEEE Access, 7, pp.62095-62106.
Kochovski, P., Gec, S., Stankovski, V., Bajec, M. and Drobintsev, P.D., 2019. Trust management
in a blockchain based fog computing platform with trustless smart oracles. Future
Generation Computer Systems, 101, pp.747-759.
Maddar, H., Kammoun, W. and Youssef, H., 2018. Effective distributed trust management
model for Internet of Things. Procedia Computer Science, 126, pp.321-334.
Qureshi, K.N., Iftikhar, A., Bhatti, S.N., Piccialli, F., Giampaolo, F. and Jeon, G., 2020. Trust
management and evaluation for edge intelligence in the Internet of Things. Engineering
Applications of Artificial Intelligence, 94, p.103756.
Rehiman, K.R. and Veni, S., 2017, February. A trust management model for sensor enabled
mobile devices in IoT. In 2017 International Conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud)(I-SMAC) (pp. 807-810). IEEE.
Isirova, K. and Potii, O., 2018, May. Decentralized public key infrastructure development
principles. In 2018 IEEE 9th International Conference on Dependable Systems, Services and
Technologies (DESSERT) (pp. 305-310). IEEE.
Tran, A.B., Lu, Q. and Weber, I., 2018, September. Lorikeet: A Model-Driven Engineering
Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM
(Dissertation/Demos/Industry) (pp. 56-60).
Li, N., Varadharajan, V. and Nepal, S., 2019, July. Context-aware trust management system
for iot applications with multiple domains. In 2019 IEEE 39th International Conference on
Distributed Computing Systems (ICDCS) (pp. 1138-1148).
Malik, S., Dedeoglu, V., Kanhere, S.S. and Jurdak, R., 2019, July. Trustchain: Trust
management in blockchain and iot supported supply chains. In 2019 IEEE International
Conference on Blockchain (Blockchain) (pp. 184-193). IEEE.
Mehraj, S. and Banday, M.T., 2020, January. Establishing a zero trust strategy in the cloud
computing environment. In 2020 International Conference on Computer Communication
and Informatics (ICCCI) (pp. 1-6). IEEE.

More Related Content

Similar to Introduction Project Aims The aim of the project is.pdf

jrfm-14-00496-v2.pdf
jrfm-14-00496-v2.pdfjrfm-14-00496-v2.pdf
jrfm-14-00496-v2.pdf
BeatriceAlNisham
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
blondellchancy
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Predictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopiaPredictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopia
Hazelknight Media & Entertainment Pvt Ltd
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
haifa rzem
 
Persuasive Essay Middle School Rubric
Persuasive Essay Middle School RubricPersuasive Essay Middle School Rubric
Persuasive Essay Middle School Rubric
Alicia Galindo
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
IRJET Journal
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
Hafiz Sanni
 
AI Trends.pdf
AI Trends.pdfAI Trends.pdf
AI Trends.pdf
RevaldiAnggara
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
jeanettehully
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
IRJET Journal
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
Antoinette Williams
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Momo Scott
 
MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docx
annandleola
 
The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...
Souad Kamoun Chouk
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
zmark3
 

Similar to Introduction Project Aims The aim of the project is.pdf (19)

jrfm-14-00496-v2.pdf
jrfm-14-00496-v2.pdfjrfm-14-00496-v2.pdf
jrfm-14-00496-v2.pdf
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Predictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopiaPredictive analytics - The cure for business myopia
Predictive analytics - The cure for business myopia
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
Persuasive Essay Middle School Rubric
Persuasive Essay Middle School RubricPersuasive Essay Middle School Rubric
Persuasive Essay Middle School Rubric
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
 
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
How to Improve Efficiency of Banking System with Big Data (A Case Study of Ni...
 
AI Trends.pdf
AI Trends.pdfAI Trends.pdf
AI Trends.pdf
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry
 
MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docx
 
The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...The Futur of Business Intelligence and Knowledge Management at the era of Big...
The Futur of Business Intelligence and Knowledge Management at the era of Big...
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 

More from bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docx
bkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
bkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
bkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
bkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
bkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
bkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
bkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
bkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
bkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
bkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
bkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
bkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
bkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
bkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
bkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
bkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
bkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Denish Jangid
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Introduction Project Aims The aim of the project is.pdf

  • 1. Answers: Introduction Project Aims The aim of the project is Answers: Introduction Project Aims The aim of the project is to address the issues implementing the Trust Management Model. In order to address the issue, the appropriate existing pieces of literature will be reviewed along with discussing a proper methodology. Background The Trust Management Model is basically considered as a viable solution by which the IoT issues are addressed. By optimizing the protection, as well as process of the support decision making, the concerned model identifies the untrusted behaviour, installation of the untrusted objects and redirecting the functionality for trusted zones (Malik et al. 2019). According to the Trust Management model a system is proposed through which the trust management system can be implemented for cloud computing. As a result, secured data access is assured by the cloud service provider. Herein the method of trust evaluation gets proposed to weight the trust factors for calculating the multiple attributes. Research Problems And The Context In terms of research problem the issue of abstract notion of the non-measurable variables will be taken into account. Considering this fact the concept of Trust Management Model will be concerned as a viable solution for resolving the IOT issues. As such the issues will be focused on identifying the areas of support for the decision making process, optimisation of protection, and identification of untrusted behaviour. Herein the components of the Trust Management Model will be discussed. Expected Outcomes In terms of expected outcomes, it can be stated that the research will address the way through which the issues are addressed by the Trust Management Model.
  • 2. Benefits And Significance In terms of benefits, it can be stated that the study is significant because it will review appropriate pieces of the existing literature. As the data will be gathered from the already published research, therefore authentic data will be presented by the concerned research. Issues in current Trust Management Model: In current Trust Management Model it is seen that the concerned model fails to optimise the protection along with supporting the decision making process. As a result, the trust management system got failed to be implemented for the cloud computing. The issues in trust evaluation method weighted the trust factors to be calculated considering the several attributes. How to resolve the issues: In order to resolve the said issue, the cloud security standard will be established. As such, the SOC 2 standard will be demonstrating the policies, controls and procedures of the firm in order to meet the trust management principles such as Availability, Security, Processing Integrity, Privacy and Confidentiality. Research Methodology What is the Problem? The issues of abstract notions of non-measurable variables has been considered in terms of the problem. In light of this, the Trust Management Model idea will be considered as a feasible approach for tackling IoT concerns (Kochovski et al. 2019). As a result, the concerns will be focused on identifying the areas of support decision-making process, protection optimization, and recognising untrustworthy behaviour. The Trust Management Model's components will be explained in this section. How do you break it down to smaller (sub-) problems? In order to break down the main problems into the sub problems, establishment of the sub problems will be done for distinguishing their characters. Herein it is worth to mention that in order to identify the key problems, the sub problems will be considered as a researchable as well as the complete unit (Rehiman and Veni 2017). As such the sub problem will be clearly linked with the data interpretation. How Do You Address Each Sub-Problem? In order to identify the each sub problem, all the sub problems will be identified as a complete resealable unit. Herein, the sub problems will be strongly linked with the data interpretation. It is worth mentioning here that the sub problems need to be added up to the total of the issue. Herein the sub problems will be established based on the aim of the research.
  • 3. How do you put everything together to solve your big problem? In order to solve the big problem of the research, the main problem will be differentiated from the opinion fact. As such specifying the underlying issues, the alternative solutions are expected to be generated on that note. Apart from that by selecting as well as evaluating the alternative, the target standard will be relatively linked. Literature Review Theme 1: Understanding the concept of Trust management in IoT: In relation to the IoT, the concept of trust management has appeared as a vital solution for trust issues. Some previous research has stated that the concerned model helps to optimize the protection along with supporting the decision making process. As such by identifying the untrusted behaviour, it can isolate the untrusted objects along with redirecting the functionality associated with the trusted zones. Based on this concern theme, it can be stated that the hierchical trust management model focuses on inverted tree structure focusing on which the root causes are analysed. On the other hand, as believed by Li, Varadharajan and Nepal (2019) as the root considered as the starting point of a trust, therefore the top down arts enhance the leaf node of the user. Theme 2: Trust Management Model as a Public infrastructure: Trust Management Model has been identified as a collection of rules through which the application is informed regarding deciding the legitimacy of the digital certificate. The research by Isirova and Potii (2018) revealed that fundamentally the trust management model provides the positive environment whether to trust on a particular organization or needs to depend on the certificate issued by the hierarchical department of the organization. Herein, in order to address the issues most of the organizations opt for the peer to peer architecture due to its well defined structure of the organization as well as discovering the complex validation. Theme 3: Effective distribution of the trust management model for IoT: The Internet of Things (IoT) is a worldwide architecture for the digital age that connects physical or digital things with current interoperability technological tools under development to deliver improved services. It is indeed interesting to note that the explosion in the number of cell phones and internet connections has created a new industry with nearly limitless possibilities. Every day, 5.5 million things are connected throughout the globe in 2016. By 2020, the population might be in the billions (Maddar, Kammoun and Youssef 2018). According to Gartner, 26 billion items will be deployed by 2020. On the other hand, in order to address the issue, In comparison to the above theme, it can be stated that in order to address the issue, the categorization process is rather different. The clustering approach can be represented on a computer as an inversion tree, but the web-of-
  • 4. trust is more directly tied to how people evaluate trustworthiness in their personal interactions. Customers can define how much trust they have in a certificate by choosing the number of independent signatories that must be present for it to be considered valid (Tran, Lu and Weber 2018). This technique works well for small groups with well-established relationships, but it does not scale well for big groups or where security consistency is critical, such as the amount of verification required before issuing a certificate. Results/Outcomes And Analysis/Discussion Introducing and discussing the results/outcomes that have achieved: In terms of achieving the outcomes, it can be stated that the concerned study has identified several themes identifying the existing pieces of literature. Herein as identified from the selected themes, in the context of the Internet of Things, the notion of trust management has emerged as a viable solution to trust challenges. According to prior study, the concerned model aids in the optimization of protection as well as the decision-making process. As a result, it may segregate untrusted objects while diverting functionality associated with trusted zones by recognising untrustworthy behaviour (Mehraj and Banday 2020). According to this common concept, the hierchical trust management model relies on an inverted tree structure in which the root causes are identified. On the other hand, because the root is thought to be the starting point of a trust, top down arts are used to enrich the sub users. The abstract idea of non-measurable variables has been considered in terms of the research challenge. Given this, the Trust Management Model idea will be seen as a feasible approach for overcoming IoT concerns. As a result, the concern has been focused on identifying the areas of support decision-making process, protection optimization, and untrustworthy behaviour identification (Awan et al. 2019). The Trust Management Model's components will be explored in this article. In terms of predicted outcomes, the study has been looked into how the Trust Management Model deals with challenges. Suggestions For Future Solutions: In terms of future solutions, it can be stated that in the forthcoming days, the Block chain based trust management model is required to be used (Qureshi et al. 2020). As such the trust related issues can be attacked by producing the malicious users through utilizing the techniques of classification. Decentralization of the online social network is another area to be concerned for the future solutions. What is to be done in the rest weeks? Activities during research 1st Week
  • 5. 2nd Week 3rd Week 4th Week 5th Week 6th Week 7th Week Selection of research topic ü
  • 6. Composition of the literature review ü
  • 7. Methodology followed in the research ü Collection of secondary data for the research
  • 8. ü ü Data analysis and interpretation
  • 10. ü Conclusion and Recommendation for the research study ü
  • 11. Final submission of the research report ü (Source: Self-Creation) Conclusion And Future Outlook What problems have you addressed? It can be concluded that The Trust Management Model is widely recognised as a viable approach to dealing with IoT issues. By optimizing the protection and support decision- making processes, the concerned model recognises untrustworthy behaviour, isolates untrustworthy objects, and diverts functionality to trusted zones. A way for establishing a trust management system for cloud computing is described by the Trust Management Model. As a result, the cloud service provider ensures that data is accessible in a secure manner. In this research, a trust evaluation approach is presented for computing a variety
  • 12. of attributes by weighing the trust components. What results have you achieved and what is the significance of the results? The result that has been achieved from the study is that In terms of accomplishing the desired goals, it can be claimed that the research project has found various topics through analysing existing literature. As a result of the chosen topics, the following is presented. The concept of trust management has evolved as a feasible solution to trust concerns in the context of the Internet of Things. The concerned model, according to previous research, contributes in the optimization of protection as well as the decision-making process. As a consequence, by recognising untrustworthy behaviour, it may be able to isolate untrusted objects while redirecting functionality associated with trusted zones. What problems would need to be addressed in future? In terms of problems to be addressed in future, it can be claimed that the block chain-based trust management model will be necessary in the near future. As a result, trust-related issues may be targeted by creating fraudulent users and employing categorization algorithms. Another area to consider for future solutions is decentralization of online social networks. References Awan, K.A., Din, I.U., Almogren, A., Guizani, M., Altameem, A. and Jadoon, S.U., 2019. Robusttrust–a pro-privacy robust distributed trust management mechanism for the internet of things. IEEE Access, 7, pp.62095-62106. Kochovski, P., Gec, S., Stankovski, V., Bajec, M. and Drobintsev, P.D., 2019. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems, 101, pp.747-759. Maddar, H., Kammoun, W. and Youssef, H., 2018. Effective distributed trust management model for Internet of Things. Procedia Computer Science, 126, pp.321-334. Qureshi, K.N., Iftikhar, A., Bhatti, S.N., Piccialli, F., Giampaolo, F. and Jeon, G., 2020. Trust management and evaluation for edge intelligence in the Internet of Things. Engineering Applications of Artificial Intelligence, 94, p.103756. Rehiman, K.R. and Veni, S., 2017, February. A trust management model for sensor enabled mobile devices in IoT. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 807-810). IEEE. Isirova, K. and Potii, O., 2018, May. Decentralized public key infrastructure development
  • 13. principles. In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 305-310). IEEE. Tran, A.B., Lu, Q. and Weber, I., 2018, September. Lorikeet: A Model-Driven Engineering Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM (Dissertation/Demos/Industry) (pp. 56-60). Li, N., Varadharajan, V. and Nepal, S., 2019, July. Context-aware trust management system for iot applications with multiple domains. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1138-1148). Malik, S., Dedeoglu, V., Kanhere, S.S. and Jurdak, R., 2019, July. Trustchain: Trust management in blockchain and iot supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 184-193). IEEE. Mehraj, S. and Banday, M.T., 2020, January. Establishing a zero trust strategy in the cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.