Specification and recognition of service trust behaviors

Authors

  • Hamdi Yahyaoui Computer Science Department Kuwait University
  • Jumana El-Qurna Computer Science Department Kuwait University
  • Mohamed Almulla Computer Science Department Kuwait University

Keywords:

Service, Trust, Pattern, Pushdown Automata, Data Mining

Abstract

We propose in this paper a new approach for the specification and recognition of service trust behaviors through the so-called trust patterns, which denote typical trust behaviors. The trust
patterns are defined based on context free languages and modeled as pushdown automata. Furthermore, we provide a unified model to capture these patterns and prove the correctness of the proposed model. Finally, we conduct a comprehensive experimental study using Weka in which we test different classifiers on a dataset of trust sequences and provide a comparative study regarding the accuracy of these classifiers.

References

Aho, A. V., Hopcroft, J. E., and Ullman, J. D.

(1968). Time and Tape Complexity of Pushdown Automaton Languages. Information and Control, 13(3):186–206.

Ashtiani, M. and Azgomi, M. A. (2016).

Trust Modeling based on a Combination

of Fuzzy Analytic Hierarchy Process and

Fuzzy VIKOR. Soft Computing, 20(1):399–

Bidgoly, A. J. and Ladani, B. T. (2011).

Trust Modeling and Verification Using Colored

Petri Nets. In Proceedings of the

eightth International ISC Conference on

Information Security and Cryptology (ISCISC’

, pages 1–8. IEEE Computer

Society.

Carbone, M., Nielsen, M., and Sassone, V.

(2003). A Formal Model for Trust in Dynamic

Networks. In Proceedings of the International

Conference on Software Engineering

and Formal Methods (SEFM’2003),

pages 54–61. IEEE Computer Society.

Chandrasekaran, P. (2012). A Testbed for Evaluating

Computational Trust Models. PhD

thesis, Carleton University.

Costa, G. and Matteucci, I. (2011). Trustdriven

Policy Enforcement Through Gate

Automata. In Proceedings of the Fifth International

Conference on Innovative Mobile

and Internet Services in Ubiquitous Computing

(IMIS), pages 208–215. IEEE.

El-Qurna, J., Yahyaoui, H., and Almulla, M.

(2017). A New Framework for the Verification

of Service Trust Behaviors. Knowledge-

Based Systems, 121:7–22.

Golbeck, J. and Hindler, J. (2005). Inferring

Binary Trust Relationships in Web-based

Social Networks. ACM Transactions on Internet

Technology, 6(4):497–529.

Gopalakrishnan, G. (2006). Computation Engineering:

Applied Automata Theory and Logic. Springer.

Gramond, E. and Rodger, S. (1999). Using

JFLAP to Interact with Theorems in Automata

Theory. In Proceedings of the Thirtieth

SIGCSE Technical Symposium on Computer

Science Education, pages 336–340.

Grandison, T. and Sloman, M. (2000). A

Survey of Trust in Internet Applications.

IEEE Communications Surveys and Tutorials,

(4):2–16.

Guo, J., Ma, J., and Wan, T. (2017). A Mutual

Evaluation Based Trust Management

Method forWireless Sensor Networks. Chinese

Journal of Electronics, 26(2):407–415.

Hopcroft, J. E. (2007). Introduction to Automata

Theory, Languages, and Computation.

Pearson Addison Wesley.

Huang, J. and Nicol, D. M. (2010). A Formal

Semantics based Calculus of Trust. IEEE

Internet Computing, 14(5):38–46.

Khosravifar, B., Bentahar, J., Mizouni, R.,

Otrok, H., Alishahi, M., and Thiran, P.

(2013). Agent-based Game-theoretic Model

for Collaborative Web Services: Decision

Making Analysis. Expert Systems with Applications,

(8):3207–3219.

Kuter, U. and Golbeck, J. (2010). Using

Probabilistic Confidence Models for Trust

Inference in Web-based Social Networks.

ACM Transactions on Internet Technology

(TOIT), 10(2):1–23.

Lin, J., Keogh, E., Wei, L., and Leonardi,

S. (2007). Experiencing SAX: A Novel

Symbolic Representation of Time Series.

Data Mining and Knowledge Discovery,

(2):107–144.

Liu, G., Liu, Y., Liu, A., Li, Z., Zheng,

K., Wang, Y., and Zhou, X. (2018).

Context-aware Trust Network Extraction

in Large-Scale Trust-Oriented Social Networks.

World Wide Web, 21(3):713–738.

Lupia, A. and De Rango, F. (2016). Trust Management

using Probabilistic Energy-Aware Mobile

ad-hoc Networks. In Proceedings of

the Wireless Telecommunications Symposium

(WTS’2016), pages 1–6. IEEE.

Muchahari, M. K. and Sinha, S. K. (2018).

Game-Theoretic Method for Selection of

Trustworthy Cloud Service Providers. In

Proceedings of the First International Conference

on Smart System, Innovations and

Computing, pages 545–553. Springer.

Mui, L., Mohtashemi, M., and Ari, H. (2002).

A Computational Model of Trust and Reputation.

In Proceedings of the 35th Annual

Hawaii International Conference on System

Sciences (HICSS’2002), pages 2431–2439.

IEEE Computer Society.

Olmedilla, D., Rana, O. F., Matthews, B., and

Nejdl, W. (2005). Security and Trust Issues

in Semantic Grids. In Semantic grid, volume

, pages 191–200.

Orojloo, H. and Azgomi, M. A. (2017). A

Game-theoretic Approach to Model and

Quantify the Security of Cyber-physical

Systems. Computers in Industry, 88:44–57.

Raj, E. D. and Babu, L. D. (2017). An Enhanced

Trust Prediction Strategy for Online

Social Networks using Probabilistic Reputation

Features. Neurocomputing, 219:412–

Shamila, E. and Ramachandran, V. (2010). A

New Trust Evaluating Model for Web Services

Access. In Proceedings of the International

Conference on Emerging Trends in

Robotics and Communication Technologies

(INTERACT’2010), pages 373–376. IEEE.

Shekarpour, S. and Katebi, S. (2008). A

Trust Model Based on Statistical Propagation

and Fuzzy Aggregation for Semantic

Web. In Proceedings of the Second UKSIM

European Symposium on Computer Modeling

and Simulation (EMS’2008), pages 459–

IEEE Computer Society.

Sherchan, W., Nepal, S., and Bouguettaya,

A. (2011). A Trust Prediction Model for

Service Web. In Proceeding of the International

Conference on Trust, Security

and Privacy in Computing and Communications,

pages 258–265. IEEE Computer Society.

Singh, S. I. and Sinha, S. K. (2016). A Trust

Model based on Markov Model Driven

Gaussian Process Prediction. International

Journal of Computer Applications, 146(14).

Yahyaoui, H. (2012). A Trust-based Game

Theoretical Model for Web Services Collaboration.

Knowledge-Based Systems,

:162–169.

Yahyaoui, H. and Zhioua, S. (2013). Bootstrapping

Trust of Web Services Based on

Trust Patterns and Hidden Markov Models.

Knowledge and Information Systems,

(2):389–416.

Yang, L., Xing, C., Zhang, Y., and Xiong,

Z. (2011). Research on Interest Domain

Partition Based P2P Intuitionistic Fuzzy

Trust Model. In Proceedings of the fourth

IEEE International Conference on Broadband

Network and Multimedia Technology

(IC-BNMT’2011), pages 343–348. IEEE

Computer Society.

Yang, Y., Zhang, J., and Kisiel, B. (2003). A

Scalability Analysis of Classifiers in Text

Categorization. In Proceedings of the 26th

annual International ACM SIGIR conference

on Research and Development in Information

Retrieval, pages 96–103. ACM.

Zhang, T., Zheng, L., Wang, Y., Shen, Y., Xi,

N., Ma, J., and Yong, J. (2018). Trustworthy

Service Composition with Secure Data

Transmission in Sensor Networks. World

Wide Web, 21(1):185–200.

Zhou, Q., Li, L., Wang, S., Xu, S., and Tan,

W. (2007). A Novel Approach to Manage

Trust in Ad Hoc Networks. In Proceedings Convergence

Information Technology, pages 295–

IEEE Computer Society.

Downloads

Published

20-01-2020