Trust-Based Decentralized Service Composition Approach in Service-Oriented Mobile Social Networks
ZHANG Tao1,3, MA Jian-feng1,3, XI Ning1,3, LIU Xi-meng3, XIONG Jin-bo2
1. School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China;
2. Faculty of Software, Fujian Normal University, Fuzhou, Fujian 350108, China;
3. Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, Shaanxi 710071, China
Trustworthy service composition in service-oriented mobile social networks suffers from the opaque characteristics of service components, the subjective interpretation of trust requirements, and the opportunistic connectivity of social participants.To tackle these issues, we propose a trust-based decentralized service-composition approach.The proposed approach decentralizedly evaluates the trustworthiness of target services at both component and composite levels based on a lattice-based trust model to prevent data from being transmitted to untrustworthy counterparts.Moreover, by analyzing the dependency relationships, service are selected satisfied both global and local constraints specified by service consumers and vendors respectively.Finally, based on Monte Carlo method, a trustworthy social path selection, optimization and fault-tolerant approach is developed to deliver service evaluation and invocation information.Experimental results demonstrate its practical suitability of service composition for service-oriented mobile social networks, which leads to low cost for service evaluation, as well as high success rate and aggregated trust value for path selection.
张涛, 马建峰, 习宁, 刘西蒙, 熊金波. 面向服务移动社交网络中基于信任的分布式服务组合方法[J]. 电子学报, 2016, 44(2): 258-267.
ZHANG Tao, MA Jian-feng, XI Ning, LIU Xi-meng, XIONG Jin-bo. Trust-Based Decentralized Service Composition Approach in Service-Oriented Mobile Social Networks. Chinese Journal of Electronics, 2016, 44(2): 258-267.
[1] Kyu-Han K,Min A W,Gupta D,et al.Improving energy efficiency of Wi-Fi sensing on smartphones[A].Proceedings of 2011 IEEE INFOCOM[C].Shanghai,China:2011.2930-2938.
[2] Wei D,Dave V,Lili Q,et al.Secure friend discovery in mobile social networks[A].Proceedings of 2011 IEEE INFOCOM[C].Shanghai,China:2011.1647-1655.
[3] Fan J,Du Y,Gao W,et al.Geography-aware active data dissemination in mobile social networks[A].IEEE 7th International Conference on Mobile Adhoc and Sensor Systems[C].San Francisco,CA:2010.109-118.
[4] Liang X H,Li X D,Shen X S.Enabling trustworthy service evaluation in service-oriented mobile social networks[J].IEEE Trans on Parallel and Distributed Systems,2014,25(2):310-320.
[5] Zhang T,Ma J,Xi N,et al.Trustworthy service composition in service-oriented mobile social networks[A].21th IEEE International Conference on Web Services[C].Anchorage,Alaska:2014.684-687.
[6] Vu L H,Hauswirth M,Aberer K.QoS-based service selection and ranking with trust and reputation management[A].Proceedings of On the Move to Meaningful Internet Systems 2005:CoopIS,DOA,and ODBASE[C].Berlin Heidelberg:2005.466-483.
[7] Jsang A,Ismail R,Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43(2):618-644.
[8] Al-Oufi S,Kim H N,El Saddik A.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181.
[9] Noor T H,Sheng Q Z,Zeadally S,et al.Trust management of services in cloud environments:Obstacles and solutions[J].ACM Comput Surv,2013,46(1):1-30.
[10] Wang Y,Lin K J,Wong D,et al.Trust management towards service-oriented applications[J].Service Oriented Computing and Applications,2009,3(2):129-146.
[11] Li L,Wang Y,Lim E P.Trust-oriented composite service selection and discovery[A].7th International Joint Conference of Service-Oriented Computing[C].Berlin,Heidelberg:2009:50-67.
[12] Hang C W,Singh M P.Trustworthy service selection and composition[J].ACM Trans Auton Adapt Syst,2011,6(1):1-17.
[13] Nepal S,Malik Z,Bouguettaya A.Reputation management for composite services in service-oriented systems[J].International Journal of Web Services Research.2011,8(2):29-52.
[14] Zhang T,Ma J,Li Q,et al.Trust-based service composition in multi-domain environments under time constraint[J].Science China Information Sciences,2014,57:092109(16).
[15] Liu Y,Ngu A H,Zeng L Z.QoS Computation and Policing in Dynamic Web Service Selection[M].Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters.New York,NY:2004.66-73.
[16] Li L,Wang Y,Lim E P.Trust-oriented composite service selection with QoS constraints[J].Journal of Universal Computer Science.2010,16(13):1720-1744.
[17] 王尚广,孙其博,杨放春.Web 服务选择中信誉度评估方法[J].软件学报,2012,23(6):1350-1367. Wang S G,Sun Q B,Yang F C.Reputation evaluation approach in Web service selection[J].Journal of Software,2012,23(6):1350-1367.(in Chinese)
[18] Malik Z,Bouguettaya A.RATEWeb:Reputation assessment for trust establishment among Web services[J].The VLDB Journal,2009,18(4):885-911.
[19] Zhang T,Ma J,Sun C,et al.Service composition in multi-domain environment under time constraint[A].IEEE 20th International Conference on Web Services[C].Santa Clara,CA:2013.227-234.
[20] Nepal S,Malik Z,Bouguettaya A.Reputation propagation in composite services[A].IEEE 7th International Conference on Web Services[C].Los Angeles,CA:2009.295-302.
[21] Kunegis J,Lommatzsch A,Bauckhage C.The slashdot zoo:mining a social network with negative edges[A].Proceedings of the 18th international conference on World Wide Web[C].Madrid,Spain:ACM.2009.741-750.
[22] Hang C W,Wang Y,Singh M P.Operators for propagating trust and their evaluation in social networks[A].Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems[C].Budapest,Hungary:2009:1025-1032.
[23] Lin CY,Cao N,Liu SX,et al.SmallBlue:Social network analysis for expertise search and collective intelligence[A].IEEE 25th International Conference on Data Engineering[C].Shanghai,China:2009.1483-1486.
[24] Liu G F,Wang Y,Orgun M A.Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks[A].IEEE 19th International Conference on Web Services[C].Honolulu,HI:2012.384-391.
[25] Liu G F,Wang Y,Orgun M A.Finding K optimal social trust paths for the selection of trustworthy service providers in complex social networks[A].IEEE 9th International Conference on Web Services[C].Washington DC:2011.41-48.
[26] Abdul-Rahman A,Hailes S.Supporting trust in virtual communities[A].Proceedings of the 33rd Annual Hawaii International Conference on System Sciences[C].Hawaii:2000.1-9.
[27] Golbeck J,Hendler J.Inferring binary trust relationships in Web-based social networks[J].ACM Trans Internet Technol,2006,6(4):497-529.
[28] 王勇,代桂平,侯亚荣.信任感知的组合服务动态选择方法[J].计算机学报,2009,32(8):1668-1675. Wang Y,Dai G P,Hou Y R.Dynamic methods of trust-aware composite service selection[J].Chinese Journal of Computers.2009,32(8),1668-1675.(in Chinese)
[29] 乔秀全,杨春,李晓峰,等.社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2413. Qiao X Q,Yang C,Li X F,et al.A trust calculating algorithm based on social networking service users' context[J].Chinese Journal of Computers 2011,34(12),2403-2413.(in Chinese)
[30] 王刚,桂小林.社会网络中交易节点的选取及其信任关系计算方法[J].计算机学报,2013,36(2):368-383. Wang G,Gui X L.Selecting and trust computing for transaction nodes in online social networks[J].Chinese Journal of Computers.2013,36(2),368-383.(in Chinese)
[31] Xi N,Ma J,Sun C,et al.Decentralized information flow verification framework for the service chain composition in mobile computing environments[A].IEEE 20th International Conference on Web Services[C].Santa Clara,CA:2013.563-570.
[32] Ferrante J,Ottenstein K J,Warren J D.The program dependence graph and its use in optimization[J].ACM Trans Program Lang Syst,1987,9(3):319-349.
[33] Wei S,Yen I L,Thuraisingham B,et al.Rule-based run-time information flow control in service cloud[A].2011 IEEE International Conference on Web Services[C].Washington DC:2011.524-531.
[34] Xue Y,Nahrstedt K.Fault tolerant routing in mobile ad hoc networks[A].IEEE Wireless Communications and Networking Conference[C].New Orleans,Louisiana:2003.1174-1179.
[35] Gentle J E,Hrdle W K,Mori Y.Handbook of Computational Statistics:Concepts and Methods[M].2nd edition.Springer,2012.
[36] Liu G F,Wang Y,Orgun M A.Optimal social trust path selection in complex social networks[A].Proceedings of the 24th AAAI Conference on Artificial Intelligence[C].Atlanta,Georgia:2010.1397-1398.