Database Reference
In-Depth Information
such an approach will not work in the context of systems such as those
proposed in [51].
Trusted Platform Module (TPM) hardware [71], commonly provided
in commodity PCS, can be leveraged to help provide this assurance. To
address the problem of protecting the privacy of data contributors, tech-
niques such as requiring explicit authorization for applications to access
local resources and formulating and enforcing access control policies can
be used. A TPM is a relatively inexpensive hardware component used to
facilitate building trusted software systems. It is possible to leverage the
TPM functionality of attesting to the integrity of software running on
a device to a remote verifier. The TPM can attest to the software plat-
form running on the machine by providing a signed quote of its PCR(s)
in response to a challenge from a remote verifier.
In many cases, user actions may change the data (such as the cropping
of an image), but this may not actually affect the trust of the underly-
ing data. The work in [72] proposes YouProve , which is a partnership
between a mobile device's trusted hardware and software that allows
un-trusted client applications to directly control the fidelity of data they
upload and services to verify that the meaning of source data is pre-
served. The approach relies on trusted analysis of derived data, which
generates statements comparing the content of a derived data item to
its source. For example, the work in [72] tests the effectiveness of the
method on a variety of modifications on audio and photo data, and shows
that it is possible to verify which modifications may change the meaning
of the underlying content.
A more critical question about trustworthiness arises when the data
is collected through the actions of end users. In such cases, the user
responses may have an inherent level of errors which may need to be
evaluated for their trustworthiness. The issue of truthfulness and trust
arises more generally in any kind of application, where the ability to
contribute information is open . Such openness is a double-edged sword,
in that it greatly increases information availability at the expense of
trust. Aside from social and participatory sensing platforms, any web-
enabled platforms which allow the free contribution of information may
face such issues.
In this context, the problem of trustworthiness has been studied for
resolving multiple, conflicting information provision on the web. The
earliest work in this regard was proposed in [170], where the problem
of studying conflicting information from different providers was studied
[170]. Subsequently, the problem of studying trustworthiness in more
general dynamic contexts was studied in [48, 49].
Search WWH ::




Custom Search