An Efficient Trust Propagation Scheme for Predicting Trustworthiness of Service Providers in Service-Oriented Social Networks

Author(s):  
Yu Xu ◽  
Jianxun Liu ◽  
Mingdong Tang ◽  
Xiaoqing Frank Liu
2018 ◽  
Vol 36 (6) ◽  
pp. 1114-1134 ◽  
Author(s):  
Xiufeng Cheng ◽  
Jinqing Yang ◽  
Lixin Xia

PurposeThis paper aims to propose an extensible, service-oriented framework for context-aware data acquisition, description, interpretation and reasoning, which facilitates the development of mobile applications that provide a context-awareness service.Design/methodology/approachFirst, the authors propose the context data reasoning framework (CDRFM) for generating service-oriented contextual information. Then they used this framework to composite mobile sensor data into low-level contextual information. Finally, the authors exploited some high-level contextual information that can be inferred from the formatted low-level contextual information using particular inference rules.FindingsThe authors take “user behavior patterns” as an exemplary context information generation schema in their experimental study. The results reveal that the optimization of service can be guided by the implicit, high-level context information inside user behavior logs. They also prove the validity of the authors’ framework.Research limitations/implicationsFurther research will add more variety of sensor data. Furthermore, to validate the effectiveness of our framework, more reasoning rules need to be performed. Therefore, the authors may implement more algorithms in the framework to acquire more comprehensive context information.Practical implicationsCDRFM expands the context-awareness framework of previous research and unifies the procedures of acquiring, describing, modeling, reasoning and discovering implicit context information for mobile service providers.Social implicationsSupport the service-oriented context-awareness function in application design and related development in commercial mobile software industry.Originality/valueExtant researches on context awareness rarely considered the generation contextual information for service providers. The CDRFM can be used to generate valuable contextual information by implementing more reasoning rules.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


Author(s):  
Zoia Halushka ◽  
Nafus Inna

The article analyzes the nature and economic importance of social networks as one of the components of social capital. It is shown that the economic component of social capital is associated with the ability to obtain certain economic benefits from its use. Mechanisms for the accumulation of social capital contain the involvement in these processes of all its components - trust, norms, values, social networks. The network approach of J. Coleman to substantiation of economic essence of social capital is analyzed. The necessity, possibility and directions of influence of social networks on formation and increase of efficiency of social capital have been proved. The types of social networks and the possibilities of their influence on creation of connecting, horizontally-integrating and vertically integrating social capital are revealed. The rating of social networks and examples of their use to increase the efficiency of functioning of social capital are given. It is proved that networks are formed not chaotically, but purposefully, given the subjective vision of the feasibility of such interaction, and their use can have both positive and negative consequences. The possibility of using social networks to form a service-oriented state is indicated.


Author(s):  
Artur Sancho Marques ◽  
José Figueiredo

Inspired by patterns of behavior generated in social networks, a prototype of a new object was designed and developed for the World Wide Web – the stigmergic hyperlink or “stigh”. In a system of stighs, like a Web page, the objects that users do use grow “healthier”, while the unused “weaken”, eventually to the extreme of their “death”, being autopoieticaly replaced by new destinations. At the single Web page scale, these systems perform like recommendation systems and embody an “ecological” treatment to unappreciated links. On the much wider scale of generalized usage, because each stigh has a method to retrieve information about its destination, Web agents in general and search engines in particular, would have the option to delegate the crawling and/or the parsing of the destination. This would be an interesting social change: after becoming not only consumers, but also content producers, Web users would, just by hosting (automatic) stighs, become information service providers too.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


Author(s):  
V. Pouli ◽  
C. Marinos ◽  
M. Grammatikou ◽  
S. Papavassiliou ◽  
V. Maglaris

Traditionally, network Service Providers specify Service Level Agreements (SLAs) to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus, they are not applicable to a multi–domain environment. In this paper, the authors present a framework for automatic creation and management of SLAs in a multi-domain environment. The framework is based on Service Oriented Computing (SOC) and contains a collection of web service calls and modules that allow for the automatic creation, configuration, and delivery of an end-to-end SLA, created from the merging of the per-domain SLAs. This paper also presents a monitoring procedure to monitor the QoS guarantees stipulated in the SLA. The SLA establishment and monitoring procedures are tested through a Grid application scenario targeted to perform remote control and monitoring of instrument elements distributed across the Grid.


Author(s):  
Ryota Egashira ◽  
Akihiro Enomoto ◽  
Tatsuya Suda

In Service-Oriented Computing, service providers publish their services by deploying service components which implement those services into a network. Since such services are distributed around the network, Service-Oriented Computing requires the functionality to discover the services that meet certain criteria specified by an end user. In order to overcome the scalability issue that the current centralized discovery mechanism inherently has, distributed discovery mechanisms that the P2P research community has developed may be promising alternatives. This chapter outlines existing distributed mechanisms and proposes a novel discovery mechanism that utilizes end users’ preferences. The proposed mechanism allows end users to return their feedback that describes the degree of the preference for discovered services. The returned preference information is stored at nodes and utilized to decide where to forward subsequent queries. The extensive simulation demonstrates that the proposed mechanism meets key requirements such as selectivity, efficiency and adaptability.


Author(s):  
Elarbi Badidi ◽  
Mohamed El Koutbi

The services landscape is changing with the growing adoption by businesses of the Service Oriented Architecture (SOA), the migration of business solutions to the cloud, and the proliferation of smartphones and Internet-enabled handheld devices to consume services. To meet their business goals, organizations increasingly demand services, which can satisfy their functional and non-functional requirements. Service Level Agreements (SLAs) are seen as the means to guarantee the continuity in service provisioning and required levels of service. In this paper, we propose a framework for service provisioning, which aims at providing support for automated SLA negotiation and management. The Service Broker component carries out SLA negotiation with selected service-providers on behalf of service-consumers. Multi-rounds of negotiations are very often required to reach an agreement. In each round, the negotiating parties bargain on multiple SLA parameters by trying to maximize their global utility functions. The monitoring infrastructure is in charge of observing SLA compliance monitoring using measurements obtained from independent third party monitoring services.


2014 ◽  
Vol 11 (2) ◽  
pp. 67-84 ◽  
Author(s):  
Tanveer Ahmed ◽  
Abhishek Srivastava

Service oriented architecture has revolutionized the way a traditional business process is executed. The success of this architecture is Indue to the composition of multiple heterogeneous services at runtime. Web service composition is a mechanism where several web services are combined at runtime to build a complex application for a user. It is one of the most sought after processes in the context of semantic web. But, composition of web services at runtime is a difficult task owing to the availability of multiple service providers offering the same functionality. The process if exasperated by due conflicting preferences of a service consumer. In this paper, the authors address the issue of selecting a service based on Quality of Service (QoS) attributes. They utilize concepts customized from physics to create an environment that facilitates the selection of a best service from the set of similar services. The technique not only facilitates the selection of the service with the best QoS attributes, but distributes the load among expeditiously. Here in this paper, the authors concentrate on minimizing and equitably balancing the waiting time for a user. They conduct in silico experiments on multiple workflows to demonstrate the efficacy of the proposed technique to balance load efficiently among similar service offerings.


2010 ◽  
Vol 2 (2) ◽  
pp. 38-50
Author(s):  
Tony Polgar

Web Services for Remote Portlets (WSRP) provide solutions for implementation of lightweight Service Oriented Architecture (SOA). UDDI extension for WSRP enables the discovery and access to user facing web services provided by business partners while eliminating the need to design local user facing portlets. Most importantly, the remote portlets can be updated by web service providers from their own servers. Remote portlet consumers are not required to make any changes in their portals to accommodate updated remote portlets. This approach results in easier team development, upgrades, administration, low cost development and usage of shared resources. Furthermore, with the growing interest in SOA, WSRP should cooperate with service bus (ESB).In this paper, the author examines the technical underpinning of the UDDI extensions for WSRP (user facing remote web services) and their role in service sharing among business partners. The author also briefly outlines the architectural view of using WSRP in enterprise integration tasks and the role Enterprise Service Bus (ESB).


Sign in / Sign up

Export Citation Format

Share Document