International Journal of Innovation and Applied Studies
ISSN: 2028-9324     CODEN: IJIABO     OCLC Number: 828807274     ZDB-ID: 2703985-7
Wednesday 18 September 2019






Custom Search


Connect with IJIAS

  Now IJIAS is indexed in EBSCO, ResearchGate, ProQuest, Chemical Abstracts Service, Index Copernicus, IET Inspec Direct, Ulrichs Web, Google Scholar, CAS Abstracts, J-Gate, UDL Library, CiteSeerX, WorldCat, Scirus, Research Bible and getCited, etc.  

Towards a Trust Envisioned Cyber Security

Volume 2, Issue 4, April 2013, Pages 540–546

 Towards a Trust Envisioned Cyber Security

Renu Mary Daniel1 and Angela Francis2

1 Department of Computer Science and Engineering, Karunya University, Coimbatore, Tamil Nadu, India
2 Department of Computer Science and Engineering, Karunya University, Coimbatore, Tamil Nadu, India

Original language: English

Received 19 February 2013

Copyright © 2013 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we know with absolute certainty that the entity with whom we are communicating is trustworthy or not? Cyber security is all about ensuring that software will behave in an expected manner and that it can prevent any threats that deter it from its expected operations. It not just deals with securing networks but rather focuses on ensuring the security of the devices connected to the networks. In this paper, we discuss the approaches used earlier for establishing trust, their limitations and focus on the need for hardware-based root of trust as software-only solutions are inadequate to ensure complete trust. We discuss an emerging technology in the ?eld of trusted computing called the Trusted Platform Module that provides a hardware-based root of trust. We also discuss about its scope, various applications, and the future work being done on it.

Author Keywords: Trust, Cyber Security, Trusted Platform Module, Integrity Measurement, Remote Attestation.

How to Cite this Article

Renu Mary Daniel and Angela Francis, “Towards a Trust Envisioned Cyber Security,” International Journal of Innovation and Applied Studies, vol. 2, no. 4, pp. 540–546, April 2013.