scholarly journals A Customer-Centric Trust Evaluation Model for Personalized Service Selection

2018 ◽  
Vol 2018 ◽  
pp. 1-13
Author(s):  
Junwei Zhang ◽  
Deyu Li ◽  
Xiaoqin Fan

Trust is a very important criterion when service customers select desired Web services from a cluster of Web services with the same function. Most existing trust models cannot effectively implement personalized service selection with regard to consumer preferences and expectations. This paper designs a novel trust management method based on peer-to-peer network and presents a customer-centric trust evaluation model for personalized service selection. The trust evaluation model firstly maintains consumer-to-consumer trust values that are calculated according to preference similarity between customers, secondly gathers ratings on services submitted by other consumers, then synthesizes customer-to-customer trust and these ratings to generate personalized consumer-to-service trust, and finally selects the desired services according to the expected trust levels presented by customers. This paper conducts some experiments to demonstrate the details of service selection. Experimental results show that this model has good applicability to implement personalized service selection. The proposed model well simulates the reality.

2018 ◽  
Vol 14 (04) ◽  
pp. 211 ◽  
Author(s):  
Jinghua Zhu

Because the current research on wireless sensor networks is not thorough enough, with such shortcomings as lack of objectivity and insufficient accuracy of the trust evaluation model of network nodes, this paper proposes a trust evaluation model with multi-factor comprehensive consideration and Bayesian model, an improved trust evaluation model, by combining trust management mechanism, trust factor, fuzzy set and D-S evidence theory, solving factor singleness and imprecise evaluation in the original model. The simulation results show that the proposed model has good dynamic adaptability, higher detection rate and lower detection error rate, and it consumes less energy and improves the security of the network.


2019 ◽  
Vol 13 (2) ◽  
pp. 94-100
Author(s):  
Dolly Sharma ◽  
Shailendra Singh ◽  
Mamta Mittal

Background: Grid computing relates to a pool of resources to be shared by users in Grid Environment. Security of the resources from users and vice-versa is a significant issue. This is where the notion of trust comes into existence. A number of researchers have proposed models for evaluation of trust in grid computing, but they fail to spot one or the other parameters for trust evaluation. The essence of trust models in grid computing is that they offer autonomic trust management. An autonomic trust model has been patented by Z. Yan and C. Prehofer in 2009. Another patent was published by Anna University in 2010 to evaluate the trustworthiness of a resource provider in Grid environment. Objective: This paper firstly focuses and illustrates these essential parameters. Based on these parameters, further, a comparison of some existing models for trust evaluation is shown. Finally, common parameters missed out by various models have been highlighted giving way for improvements of Trust model. Methods: A Trust evaluation model has been proposed by us previously based on a number of real-world trust evaluation parameters. This model sees trust as a three-dimensional entity. Trust is based on Dempter Shafer’s theory in which trust is calculated mathematically. Results: Software trust needs to be calculated mathematically. There are a large number of real-world parameters that need to be included for evaluating trust. Conclusion: As trust models in research are based on simulation techniques, so it is important to include real-world factors that affect trust value of one entity on other. Some of those parameters, missed by most of the models have been identified for inclusion in future trust models.


2016 ◽  
Vol 7 (2) ◽  
pp. 33-46 ◽  
Author(s):  
Nalini A. Mhetre ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.


Author(s):  
XIAOYONG LI ◽  
FENG ZHOU ◽  
XUDONG YANG

With the widespread application of web services, trust-based service selection has become a significant requirement from a requester's point of view, and trust prediction mechanism has become a determining factor for any given service's success. But the dynamic nature of trust creates the biggest challenge in measuring a trust value and make trust predictions. In this paper, a new trust prediction model is proposed based on multiple decision factors. Firstly, the proposed model integrates multiple complementary decision factors to reflect complexity and uncertainty of trust relationship. In addition to including traditional experience-based trust factor and feedback-based trust factor, this model innovatively integrates QoS-based trust factor into global trust evaluation, which makes the model have a better rationality and a higher practicability than the existing approaches. Meanwhile, the proposed model applies the theory of OWA (Ordered Weighted Averaging) operator to assign the classification weights to these decision factors, which makes the model exhibit a strong adaptability in handling various dynamic behaviors of service providers. Simulation results show that, compared to the existing approaches, the proposed model has remarkable enhancements in the accuracy of trust prediction.


Author(s):  
Nalini A. Mhetre ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relationships from real to virtual world requires the negotiation of trust based on the security properties of devices. However, these models are developed in limited devices. This paper proposes a distributed trust model for device-to-device communication in ubiquitous computing. Mathematical model based on fuzzy rules to establish trust is presented. Fuzzy simulation of the model is presented to validate the findings. Simulation results show that proposed model calculates fuzzy trust values reliably.


Author(s):  
Farid Meziane

Trust is widely recognized as an essential factor for the continual development of business to customer electronic commerce (B2C EC). Many trust models have been developed, however, most are subjective and do not take into account the vagueness and ambiguity of EC trust and the customers’ intuitions and experience when conducting online transactions. In this article, we develop a fuzzy trust model using fuzzy reasoning to evaluate EC trust. This trust model is based on the information customers expect to find on an EC Website and is shown to increase customers trust towards online merchants. We argue that fuzzy logic is suitable for trust evaluation as it takes into account the uncertainties within ecommerce data and like human relationships; it is often expressed by linguistics terms rather then numerical values. The evaluation of the proposed model will be illustrated using two case studies and a comparison with two evaluation models was conducted to emphasise the importance of using fuzzy logic.


Author(s):  
Gaurav Raj ◽  
Manish Mahajan ◽  
Dheerendra Singh

In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust, calculated based on available direct attributes in quality web service (QWS) data sets. After getting training of such evaluation and decision strategies, developers and customers, both will use the knowledge and improve the QoS. This research provides web-based learning about web service quality which will be utilized for prediction, recommendation and the selection of trusted web services in the pool of web services available globally. In this research, the authors include designs to make decisions about the trustworthy web services based on classification, correlation, and curve fitting to improve trust in web service prediction. In order to empower the web services life cycle, they have developed a quality assessment model to incorporate a security and performance policy.


Mathematics ◽  
2021 ◽  
Vol 9 (17) ◽  
pp. 2023
Author(s):  
Issam Alhadid ◽  
Sufian Khwaldeh ◽  
Mohammad Al Rawajbeh ◽  
Evon Abu-Taieh ◽  
Ra’ed Masa’deh ◽  
...  

Service-oriented architecture (SOA) has emerged as a flexible software design style. SOA focuses on the development, use, and reuse of small, self-contained, independent blocks of code called web services that communicate over the network to perform a certain set of simple tasks. Web services are integrated as composite services to offer complex tasks and to provide the expected services and behavior in addition to fulfilling the clients’ requests according to the service-level agreement (SLA). Web service selection and composition problems have been a significant area of research to provide the expected quality of service (QoS) and to meet the clients’ expectations. This research paper presents a hybrid web service composition model to solve web service selection and composition problems and to optimize web services’ resource utilization using k-means clustering and knapsack algorithms. The proposed model aims to maximize the service compositions’ QoS and minimize the number of web services integrated within the service composition using the knapsack algorithm. Additionally, this paper aims to track the service compositions’ QoS attributes by evaluating and tracking the web services’ QoS using the reward function and, accordingly, use the k-means algorithm to decide to which cluster the web service belongs. The experimental results on a real dataset show the superiority and effectiveness of the proposed algorithm in comparison with the results of the state–action–reward–state–action (SARSA) and multistage forward search (MFS) algorithms. The experimental results show that the proposed model reduces the average time of the web service selection and composition processes to 37.02 s in comparison to 47.03 s for the SARSA algorithm and 42.72 s for the MFS algorithm. Furthermore, the average of web services’ resource utilization results increased by 4.68% using the proposed model in comparison to the resource utilization by the SARSA and MFS algorithms. In addition, the experimental results showed that the average number of service compositions using the proposed model improved by 26.04% compared with the SARSA and MFS algorithms.


Sign in / Sign up

Export Citation Format

Share Document