quality control relating to security, privacy, and reliability is very difficult to achieve. Vulnerabilities could exist in some of them and trigger threats.• Difficulty in administrating network components: In case management relating to security, privacy, and reliability of network components is guaranteed, vulnerabilities of the network could be eliminated and trustworthiness of the network would be achieved. However, since network components usually cross several different domains and are managed by various administrations, the operation to ensure the protection of network security, privacy, and reliability is very complicated and difficult to achieve.• Difficulty in protecting data crossing over different network components: Although every network component could implement its own mechanisms to protect network privacy, security, and availability, there are some potential threats could exist in the gap between two components. For instance, the gap between hardware and software. Halderman et al.[14] demonstrated a technology to bypass all disk encryption methods.To conquer challenges and make it possible to build a trustworthy network, there are some regulations and policies must be implemented. This is not easy when various network domains and components are involved. However, just like the ISO 9001, it would be doable while demands increase.
Trustworthy Network ModelIn this paper, we depict a novel trustworthy network model. Our approach is based on an observation that trustworthiness cannot be accomplished by technology or any countermeasure solely. It requires teamwork and needs to integrate every countermeasure together.
AbstractAn open challenge in trustworthy computing is the development of a trustworthy network since network plays an essential role of current computing infrastructure (e.g., grid computing, cloud computing, etc.). In order to have a trustworthy network, security, privacy, and reliability must be protected on every major network component. For instance, if there is no trusted mechanism to enforce security protection of every data transaction on major network components, a network cannot be relied on performing trustworthy computing. It has been observed that trustworthy network cannot be practically achieved if there is no trusted integration of major network components. In this paper, we discuss the challenges in building a trustworthy network and develop a trustworthy network model that is both scalable and interoperable with existing and future network architectures.