Trust refers to reliability on some person or some system. In computer science, any system is said to be
trusted when it behaves the way the user expects it to do. It can be defined as the success rate of any computing system. Mathematically,
trust is a probabilistic value which lies between 0 and 1.
Trust is a complex concept which has no universally accepted scholarly definition. Evidence from a contemporary, cross-disciplinary collection of scholarly writing suggests that a widely held definition of
trust is as follows: “
Trust is a psychological state comprising the intention to accept vulnerability based upon positive expectations of the intentions or behaviour of another.”
Trust is a broader notion than security as it includes subjective criteria and experience. Correspondingly, there exist both hard (security-oriented) and soft
trust (i. e. non-security oriented
trust) solutions. “Hard”
trust involves aspects like authenticity, encryption, and security in transactions. The “soft”
trust involves human psychology, brand loyalty, and userfriendliness. Some soft issues are involved in security, nevertheless. When
trust is related to cloud computing, it is classified as persistent and dynamic
trust to distinguish between social and technological means. Persistent
trust referes to
trust involving long-term underlying properties or infrastructure and this arises through relatively static social and technological mechanisms. Dynamic
trust refers to
trust specific to certain states, contexts, or short-term or variable information; this can arise through context-based social and technological mechanisms. Persistent social-based
trust in a hardware or software component or system is an expression of confidence in technological-based
trust, because it is assurance about implementation and operation of that component or system. In particular, there are links between social-based
trust and technological-based
trust through the vouching mechanism, because it is important to know who is vouching for something as well as what they are vouching; hence social-based
trust should always be considered.
Learn more in:
Trusted Cloud- and Femtocell-Based Biometric Authentication for Mobile Networks