Unraveling trust management in cybersecurity: insights from a systematic literature review

被引:1
作者
Pigola, Angelica [1 ]
Meirelles, Fernando de Souza [1 ]
机构
[1] Fundacao Getulio Vargas FGV EAESP, Sao Paulo Business Sch, Ave 9 Julho,2029 Bela Vista, BR-01313902 Sao Paulo, SP, Brazil
关键词
Trust management; Systematic literature review; Cybersecurity; Information security; INFORMATION-SYSTEMS; THREAT MITIGATION; RISK-MANAGEMENT; SECURITY; PRIVACY; INTERNET; BLOCKCHAIN; DESIGN; REQUIREMENTS; METHODOLOGY;
D O I
10.1007/s10799-024-00438-x
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper presents the findings of a systematic literature review aimed at elucidating the key anchors, strategies, methods, and techniques pertinent to trust management (TM) in cybersecurity. Drawing upon a meticulous analysis of 106 scholarly papers published between 2001 and 2024, the review offers a comprehensive overview of TM in cybersecurity practices in diverse cyber contexts. The study identifies seven foundational anchors crucial for effective TM frameworks: authentication, authorization, access control, privacy protection, monitoring and auditing, encryption and cryptography, risk management, and iterative and interactive trust processes. Additionally, ten overarching strategies emerge from the synthesis of literature, encompassing identity and access management, role-based access control, least privilege principle, digital certificates or public key infrastructure, security policies and procedures, encryption and data protection, continuous monitoring and risk assessment, vendor and third-party risk management, compliance management and continuous collaboration. Furthermore, the review delineates several methods instrumental in TM processes, and various techniques augmenting these methods were also identified, ranging from trust scoring algorithms and trust aggregation mechanisms to trust reasoning engines and trust-aware routing protocols. The synthesis of literature not only elucidates the multifaceted nature of TM in cybersecurity presented in a framework but also underscores the evolving strategies and technologies employed to establish and maintain trust in dynamic digital ecosystems. By providing a comprehensive overview of anchors, strategies, methods, and techniques in TM in cybersecurity. This review offers valuable insights for practitioners, researchers, and policymakers engaged in enhancing trustworthiness and resilience in contemporary cyber environments.
引用
收藏
页数:23
相关论文
共 132 条
[1]   IoT trust and reputation: a survey and taxonomy [J].
Aaqib, Muhammad ;
Ali, Aftab ;
Chen, Liming ;
Nibouche, Omar .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01)
[2]   Towards Trustworthy Resource Scheduling in Clouds [J].
Abbadi, Imad M. ;
Ruan, Anbang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :973-984
[3]   Transient Customer Response to Data Breaches of Their Information [J].
Agarwal, Sumit ;
Ghosh, Pulak ;
Ruan, Tianyue ;
Zhang, Yunqi .
MANAGEMENT SCIENCE, 2024, 70 (06) :4105-4114
[4]   Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing [J].
Ahmad, Waqas ;
Wang, Shengling ;
Ullah, Ata ;
Sheharyar ;
Mahmood, Zahid .
IEEE ACCESS, 2018, 6 :46363-46381
[5]   Fuzzy Theory in Fog Computing: Review, Taxonomy, and Open Issues [J].
Al-Araji, Zaid Jasim ;
Ahmad, Sharifah Sakinah Syed ;
Kausar, Nasreen ;
Farhani, Anis ;
Ozbilge, Ebru ;
Cagin, Tonguc .
IEEE ACCESS, 2022, 10 :126931-126956
[6]   A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework [J].
Al-Shareeda, Mahmood. A. A. ;
Manickam, Selvakumar .
IEEE ACCESS, 2023, 11 :46218-46228
[7]   Comprehensive three-phase bibliometric assessment on the blockchain (2012-2020) [J].
Alam, Sana ;
Zardari, Shehnila ;
Shamsi, Jawwad .
LIBRARY HI TECH, 2023, 41 (02) :287-308
[8]   A framework to evaluate the barriers for adopting the internet of medical things using the extended generalized TODIM method under the hesitant fuzzy environment [J].
Alattas, Khalid ;
Wu, Qun .
APPLIED INTELLIGENCE, 2022, 52 (12) :13345-13363
[9]   Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions [J].
Alazab, Mamoun ;
Priya, Swarna R. M. ;
Parimala, M. ;
Maddikunta, Praveen Kumar Reddy ;
Gadekallu, Thippa Reddy ;
Quoc-Viet Pham .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3501-3509
[10]   Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms [J].
Alshammari, Salah T. ;
Alsubhi, Khalid ;
Aljahdali, Hani Moaiteq Abdullah ;
Alghamdi, Ahmed Mohammed .
IEEE ACCESS, 2021, 9 :161488-161506