Specification and recognition of service trust behaviors
Keywords:
Service, Trust, Pattern, Pushdown Automata, Data MiningAbstract
We propose in this paper a new approach for the specification and recognition of service trust behaviors through the so-called trust patterns, which denote typical trust behaviors. The trust
patterns are defined based on context free languages and modeled as pushdown automata. Furthermore, we provide a unified model to capture these patterns and prove the correctness of the proposed model. Finally, we conduct a comprehensive experimental study using Weka in which we test different classifiers on a dataset of trust sequences and provide a comparative study regarding the accuracy of these classifiers.
References
Aho, A. V., Hopcroft, J. E., and Ullman, J. D.
(1968). Time and Tape Complexity of Pushdown Automaton Languages. Information and Control, 13(3):186–206.
Ashtiani, M. and Azgomi, M. A. (2016).
Trust Modeling based on a Combination
of Fuzzy Analytic Hierarchy Process and
Fuzzy VIKOR. Soft Computing, 20(1):399–
Bidgoly, A. J. and Ladani, B. T. (2011).
Trust Modeling and Verification Using Colored
Petri Nets. In Proceedings of the
eightth International ISC Conference on
Information Security and Cryptology (ISCISC’
, pages 1–8. IEEE Computer
Society.
Carbone, M., Nielsen, M., and Sassone, V.
(2003). A Formal Model for Trust in Dynamic
Networks. In Proceedings of the International
Conference on Software Engineering
and Formal Methods (SEFM’2003),
pages 54–61. IEEE Computer Society.
Chandrasekaran, P. (2012). A Testbed for Evaluating
Computational Trust Models. PhD
thesis, Carleton University.
Costa, G. and Matteucci, I. (2011). Trustdriven
Policy Enforcement Through Gate
Automata. In Proceedings of the Fifth International
Conference on Innovative Mobile
and Internet Services in Ubiquitous Computing
(IMIS), pages 208–215. IEEE.
El-Qurna, J., Yahyaoui, H., and Almulla, M.
(2017). A New Framework for the Verification
of Service Trust Behaviors. Knowledge-
Based Systems, 121:7–22.
Golbeck, J. and Hindler, J. (2005). Inferring
Binary Trust Relationships in Web-based
Social Networks. ACM Transactions on Internet
Technology, 6(4):497–529.
Gopalakrishnan, G. (2006). Computation Engineering:
Applied Automata Theory and Logic. Springer.
Gramond, E. and Rodger, S. (1999). Using
JFLAP to Interact with Theorems in Automata
Theory. In Proceedings of the Thirtieth
SIGCSE Technical Symposium on Computer
Science Education, pages 336–340.
Grandison, T. and Sloman, M. (2000). A
Survey of Trust in Internet Applications.
IEEE Communications Surveys and Tutorials,
(4):2–16.
Guo, J., Ma, J., and Wan, T. (2017). A Mutual
Evaluation Based Trust Management
Method forWireless Sensor Networks. Chinese
Journal of Electronics, 26(2):407–415.
Hopcroft, J. E. (2007). Introduction to Automata
Theory, Languages, and Computation.
Pearson Addison Wesley.
Huang, J. and Nicol, D. M. (2010). A Formal
Semantics based Calculus of Trust. IEEE
Internet Computing, 14(5):38–46.
Khosravifar, B., Bentahar, J., Mizouni, R.,
Otrok, H., Alishahi, M., and Thiran, P.
(2013). Agent-based Game-theoretic Model
for Collaborative Web Services: Decision
Making Analysis. Expert Systems with Applications,
(8):3207–3219.
Kuter, U. and Golbeck, J. (2010). Using
Probabilistic Confidence Models for Trust
Inference in Web-based Social Networks.
ACM Transactions on Internet Technology
(TOIT), 10(2):1–23.
Lin, J., Keogh, E., Wei, L., and Leonardi,
S. (2007). Experiencing SAX: A Novel
Symbolic Representation of Time Series.
Data Mining and Knowledge Discovery,
(2):107–144.
Liu, G., Liu, Y., Liu, A., Li, Z., Zheng,
K., Wang, Y., and Zhou, X. (2018).
Context-aware Trust Network Extraction
in Large-Scale Trust-Oriented Social Networks.
World Wide Web, 21(3):713–738.
Lupia, A. and De Rango, F. (2016). Trust Management
using Probabilistic Energy-Aware Mobile
ad-hoc Networks. In Proceedings of
the Wireless Telecommunications Symposium
(WTS’2016), pages 1–6. IEEE.
Muchahari, M. K. and Sinha, S. K. (2018).
Game-Theoretic Method for Selection of
Trustworthy Cloud Service Providers. In
Proceedings of the First International Conference
on Smart System, Innovations and
Computing, pages 545–553. Springer.
Mui, L., Mohtashemi, M., and Ari, H. (2002).
A Computational Model of Trust and Reputation.
In Proceedings of the 35th Annual
Hawaii International Conference on System
Sciences (HICSS’2002), pages 2431–2439.
IEEE Computer Society.
Olmedilla, D., Rana, O. F., Matthews, B., and
Nejdl, W. (2005). Security and Trust Issues
in Semantic Grids. In Semantic grid, volume
, pages 191–200.
Orojloo, H. and Azgomi, M. A. (2017). A
Game-theoretic Approach to Model and
Quantify the Security of Cyber-physical
Systems. Computers in Industry, 88:44–57.
Raj, E. D. and Babu, L. D. (2017). An Enhanced
Trust Prediction Strategy for Online
Social Networks using Probabilistic Reputation
Features. Neurocomputing, 219:412–
Shamila, E. and Ramachandran, V. (2010). A
New Trust Evaluating Model for Web Services
Access. In Proceedings of the International
Conference on Emerging Trends in
Robotics and Communication Technologies
(INTERACT’2010), pages 373–376. IEEE.
Shekarpour, S. and Katebi, S. (2008). A
Trust Model Based on Statistical Propagation
and Fuzzy Aggregation for Semantic
Web. In Proceedings of the Second UKSIM
European Symposium on Computer Modeling
and Simulation (EMS’2008), pages 459–
IEEE Computer Society.
Sherchan, W., Nepal, S., and Bouguettaya,
A. (2011). A Trust Prediction Model for
Service Web. In Proceeding of the International
Conference on Trust, Security
and Privacy in Computing and Communications,
pages 258–265. IEEE Computer Society.
Singh, S. I. and Sinha, S. K. (2016). A Trust
Model based on Markov Model Driven
Gaussian Process Prediction. International
Journal of Computer Applications, 146(14).
Yahyaoui, H. (2012). A Trust-based Game
Theoretical Model for Web Services Collaboration.
Knowledge-Based Systems,
:162–169.
Yahyaoui, H. and Zhioua, S. (2013). Bootstrapping
Trust of Web Services Based on
Trust Patterns and Hidden Markov Models.
Knowledge and Information Systems,
(2):389–416.
Yang, L., Xing, C., Zhang, Y., and Xiong,
Z. (2011). Research on Interest Domain
Partition Based P2P Intuitionistic Fuzzy
Trust Model. In Proceedings of the fourth
IEEE International Conference on Broadband
Network and Multimedia Technology
(IC-BNMT’2011), pages 343–348. IEEE
Computer Society.
Yang, Y., Zhang, J., and Kisiel, B. (2003). A
Scalability Analysis of Classifiers in Text
Categorization. In Proceedings of the 26th
annual International ACM SIGIR conference
on Research and Development in Information
Retrieval, pages 96–103. ACM.
Zhang, T., Zheng, L., Wang, Y., Shen, Y., Xi,
N., Ma, J., and Yong, J. (2018). Trustworthy
Service Composition with Secure Data
Transmission in Sensor Networks. World
Wide Web, 21(1):185–200.
Zhou, Q., Li, L., Wang, S., Xu, S., and Tan,
W. (2007). A Novel Approach to Manage
Trust in Ad Hoc Networks. In Proceedings Convergence
Information Technology, pages 295–
IEEE Computer Society.