Professional Documents
Culture Documents
a r t i c l e
i n f o
Article history:
Received 15 October 2014
Revised 24 July 2015
Accepted 30 September 2015
Available online 6 November 2015
Keywords:
Web service
Trust
Credibility
a b s t r a c t
This paper discusses the assessment of Web services trust. This assessment is undermined by the uncertainty
that raises due to end-users ratings that can be questioned and variations in Web services performance at
run-time. To tackle the rst uncertainty a fuzzy-based credibility model is suggested so that the gap between
end-users (known as strict) and the current majority is reduced. To deal with the second uncertainty two trust
approaches (i.e., deterministic and probabilistic) are proposed so that trust levels for future interactions with
WSs are made available to users. The deterministic approach takes account end-users credibility values and
the probabilistic one is built upon probabilistic databases and a fuzzy-based credibility model. A series of experiments are carried out to validate the suggested credibility model and these trust approaches. The results
show that the probabilistic approach improves signicantly trust quality and is more robust compared to the
deterministic one. Future work consists of incorporating several credibility models into a single probabilistic
trust model.
2015 Elsevier Inc. All rights reserved.
1. Introduction
It is largely accepted that current Web services (WSs) selection approaches rely on either non-functional properties (aka
Quality of Service (QoS)) that providers announce publicly or on
collecting qualitative/quantitative values that end-users share with
respect to past experiences of using these Web services. Qualitative/quantitative values permit to establish feedback/ratings that
indicate the satisfaction of end-users with the overall performance of
WSs. However a complete reliance on both providers and end-users
raises trustworthiness concerns among future potential end-users
due to biases such as beeng-up a WSs QoS and/or undermining a
WS performance both done purposely. To address these biases two
types of trust models are reported in the literature. The rst model
uses end-users feedback/ratings to compute a trust value (e.g., Xiong
and Liu, 2004). And, the second model observes the behaviors of WSs
over a period of time to compute a trust value (e.g., Wang and Singh,
2007). We are particularly interested in the rst trust model. Indeed
end-users with either limited or non-existent experience of using
WSs cannot provide adequate trust values. When establishing trust
these end-users wrestle with two kinds of uncertainties:
http://dx.doi.org/10.1016/j.jss.2015.09.040
0164-1212/ 2015 Elsevier Inc. All rights reserved.
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
497
498
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
weak
CMaj
= C j , C j =
(|Ck |)
(1)
This strategy could turn out inappropriate when membership degrees are very small.
The moderate strategy retains the ratings in a cluster with a
membership degree exceeding a xed threshold and selects the
most populated C j as CMaj . Eq. (2) identies the moderate majority
moderate ):
cluster (CMaj
moderate
CMaj
= C j , C j =
max
k=1,Nbcluster
(|Ck |)
(2)
MEi,k , i [1, n]
3.1. Basics
Credibility has two components (Bordens and Horowitz,
2001): expertise and trustworthiness. In this work we recall that we
target strict end-users who are known for their strong expertise and
trustworthiness in a certain community. These end-users stick to
their ratings regardless of the majority for reasons listed by Schum
and Morris (2007) including veracity they tell the truth, objectivity their ratings are based on evidences, and accuracy they
estimate their ratings well. Several studies in social psychology (e.g.,
Lesko, 1997; Sternthal et al., 1978) evaluate the impact of source
credibility on belief and attitude changes. These studies demonstrate that credible sources are persuasive and can affect existing
beliefs (e.g., ratings) and attitudes more than non-credible sources.
Therefore, strict end-users can push a majority to question (even
review) their ratings. To study how this happens we rely on Yagers
participatory learning paradigm (Yager, 2004). It represents situations
where the current ratings are correct, but not necessarily accurate
(resp., wrong) and only require a limited (resp. signicant) tuning by
the majority members. Our proposal is to reduce the gap between
strict end-users ratings and the current majoritys rating so that a
max
k=1,Nbcluster
Last but not least the strong strategy selects the cluster with the
highest membership degree of ratings as CMaj . Eq. (3) identies the
MEi j = 1/
i=1
Xi centroid(C j )
2
p=1
Xi centroid
(C p ) m1
if ME (k) ME (k+1) < then
stop
else
k = k + 1, return to step 2
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
strong
strong
CMaj
= C j,
(MEi, j ) =
i[1,n]
max
k=1,Nbcluster
(MEi,k )
(3)
i[1,n]
strategy{weak,moderate,strong}
Once CMaj
is established, the next step is to
compute the credibility of end-users in this cluster. Eq. (4) identies
ui s credibility as a distance from his rating to the majority opinion
represented by the centroid of CMaj . This credibility is computed using
the normalized Euclidean distance N as the similarity measure:
strategy
CRij = 1 Xi centroid(CMaj
) ,
N
(4)
both
j
Xk
TX j =
Li
kLi
as a weighted average of Xk .
(5)
is the best trusted due to the limited knowledge about WSj amongst
Li . As a solution ui can consult an additional set of peers (L
i ) who
have already established trust values for WSj using other ratings given
by um = k . Therefore trust can also be measured using WSj s reputation (REP ij ). Sabater and Sierra (2002) dene reputation as the opinion (or view) of someone about something. Ramchurn et al. (2004)
rene Sabater and Sierras denition by stating that This view can
be mainly derived from an aggregation of opinions of members of the
community about one of them. Ramchurn et al. distinguished between trust and reputation; the former is derived from direct interactions and the latter is mainly acquired from the environment or other
agents and ultimately allows to establish trust. Eq. (6) assesses REP ij :
REP ij =
kLi
is a good trust measure but does not allow to claim that WSj
XL
1
(CRk Xkj )
CRk
j
XL
i
499
j
1
TLm
L
| i|
mL
(6)
T ji = TX j + REP ij
Li
(7)
500
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
Possible world interpretation is highly intuitive and offers a concise semantics for query evaluation over probabilistic databases. Let
service=W S1 be a query that looks for WS1 in certain tuples in ProbDB.
This query is evaluated against each pwdk separately ((pwdk )). The
probability associated with (pwdk ) corresponds to Pk . The result
is in k=1,8 ( pwdk ) that contains a set of tuples t
. Eq. (8) assesses
Prob(t
):
Prob(t
) =
Pk
(8)
k, t
( pwdk )
ple model (e.g., Suciu et al., 2011); each tuple is associated with a
probability that needs to be independent from the rest of tuples.
It is worth noticing that it is not straightforward to represent probabilistic databases when all tuples represent independent events.
However, more complex probabilistic databases can sometimes be
decomposed into tuple independent relations and then be normalized (Suciu et al., 2011).
Fig. 3 shows how we normalize P robDB (P robDBN ) into two
tuple-independent probabilistic relations PE E R and P robR1 . P E E R
stores all end-users along with their respective credibility values.
Since PE E R should often be updated we treat it as a view instead
of a table. ui is credible about WSj if his ratings are consistent. Eq. (9)
assesses ui s credibility (CRi ) over the ratings he provided in the past.
CRi =
CRij
(9)
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
501
FROM ProbDB N
502
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
http://www.wsdream.net .
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
503
Recall =
|A B|
|A|
P recision =
|A B|
|B|
(10)
(11)
504
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
the majority opinion using the different strategies, assessing endusers credibility values and nally, comparing the obtained trust values. Fig. 7 shows that moderate and strong strategies give smaller and
less oscillating trust error and thus the most accurate and consistent
results. These strategies hold steady even when end-users ratings are
altered. The weak strategys results are very unstable and the trust error signicantly increases when the ratio of strict end-users exceeds
20%. The weak strategy detects another cluster as a potential majority
cluster and selects it as MC . This latter proves to be inappropriate.
The fourth experiment evaluates the capacity of our credibility
model in nding non-malicious end-users ratings and rejecting malicious end-users ratings using the recall and precision metrics. We
consider two credibility models: K-means clustering-based credibility model (CM1 ) and C-means clustering-based credibility model
(CM2 ). Fig. 8(a) and (b) shows the improvement in recall and precision that we have achieved using our credibility model. Both recall
and precision have increased. Even when the recall given by CM2 was
lower at some points, this did not impact the precision. Based on the
experiment the average precision has increased by 43% and the recall by 1.3%. The increase in the precision is quite impressive and has
even reached 100% in some tests. This shows the eciency of CM2
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
505
References
Bezdek, J., 1981. Pattern Recognition with Fuzzy Objective Function Algorithms. Kluwer
Academic Publishers.
Bordens, K., Horowitz, I., 2001. Social Psychology. Psychology Press.
Buchegger, S., Boudec, J.-Y. L., 2004. A robust reputation system for peer-to-peer and
mobile ad-hoc networks. In: Proceedings of the Second Workshop on Economics
of Peer-to-peer Systems (P2P Econ). Cambridge, USA.
Cavallo, R., Pittarelli, M., 1987. The theory of probabilistic databases. In: Proceedings of
the Thirteenth International Conference on Very Large Data Bases. Brighton, England.
Cover, T., Thomas, J., 1991. Elements of Information Theory. Wiley.
Dalvi, N., Suciu, D., 2007. Ecient query evaluation on probabilistic databases. Int. J.
Very Larg. Data Bases (VLDB) J. 16 (4), 523544.
Fuhr, N., Rlleke, T., 1997. A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Trans. Inf. Syst. (TOIS) 15 (1).
Huang, J., Antova, L., Koch, C., Olteanu, D., 2009. MayBMS: a probabilistic database management system. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York, USA.
IEEE, 1990. Standard Glossary of Software Engineering Terminology. Technical Report.
IEEE Computer Society Press.
Jayram, T.S., Kale, S., Vee, E., 2007. Ecient aggregation algorithms for probabilistic
data. In: Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms.
New Orleans, USA.
Jsang, A., 2001. A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.
Based Syst. 9 (3).
Kanungo, T., Mount, D., Netanyahu, N., Piatko, C., Silverman, R., Wu, A., 2002. An ecient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24 (7).
Kim, Y., Kim, D., 2005. A study of online transaction self-ecacy, consumer trust,
and uncertainty reduction in electronic commerce transaction. In: Proceedings of
the Annual Hawaii International Conference on System Sciences (HICSS). Hawaii,
USA.
Kyburg, H.E., 1987. Bayesian and non-bayesian evidential updating. Artif.
Intell. 3 (1).
Lesko, W., 1997. Readings in Social Psychology: General, Classic and Contemporary Selections. Boston: Allyn & Bacon.
Mihail, P.M., Saberi, A., 2007. Random walks with lookahead in power law random
graphs. Internet Math. 1 (1).
Malik, Z., Bouguettaya, A., 2009. Rateweb: reputation assessment for trust establishment among web services. Very Larg. Data Bases (VLDB) J. 18 (4).
Nguyen, N., Caruana, R., 2007. Consensus clusterings. In: Proceedings of the Seventh
IEEE International Conference on Data Mining. Omaha, USA.
Noor, T., Sheng, Q., Ngu, A., Alfazi, A., Law, J., 2013. Cloud armor: a platform for
credibility-based trust management of cloud services. In: Proceedings of the ACM
Conference on Information and Knowledge Management (CIKM).
Ramchurn, S., Huynh, D., Jennings, N., 2004. Trust in multi-agent systems. Knowl. Eng.
Rev. 19 (1).
Ries, S., Habib, S., Mhlhuser, M., Varadharajan, V., 2011. CertainLogic: a Logic for Modeling Trust and Uncertainty. Lecture Notes in Computer Science, 6740. Springer.
Sabater, J., Sierra, C., 2002. Reputation and social network analysis in multi-agent systems. In: Proceedings of the First International Joint Conference on Autonomous
Agents and Multiagent Systems: Part 1. Bologna, Italy.
Sarma, A., Benjelloun, O., Halevy, A., Widom, J., 2006. Working models for uncertain
data. In: Proceedings of the Twenty-Second International Conference on Data Engineering (ICDE). Atlanta, USA.
Schum, D., Morris, J., 2007. Assessing the competence and credibility of human sources
of intelligence evidence: contributions from law and probability. Law Probab. Risk
6 (1).
Selcuk, A., Uzun, E., Pariente, M., 2004. A reputation-based trust management system
for p2p networks. In: Proceedings of the International Symposium on Cluster Computing and the Grid. Chicago, USA.
Sen, P., Deshpande, A., 2007. Representing and querying correlated tuples in probabilistic databases. In: Proceedings of the International Conference on Data Engineering
(ICDE). Istanbul, Turkey.
Sternthal, B., Phillips, L., Dholakia, R., 1978. The persuasive effect of source credibility:
a situational analysis. Public Opin. Q. 42 (3).
Suciu, D., Olteanu, D., Koch, C., 2011. Probabilistic Databases. Synthesis Digital Library
of Engineering and Computer Science.
Teacy, W.T., Patel, J., Jennings, N.R., Luck, M., 2006. Travos: trust and reputation in the
context of inaccurate information sources. Auton. Agents and Multi Agent Syst. 12
(2).
Troffaes, M., 2006. Generalizing the conjunction rule for aggregating conicting expert
opinions. Int. J. Intell. Syst. 21 (3).
Wang, Y., Singh, M., 2007. Formal trust model for multiagent systems. In: Proceedings
of the International Joint Conference on Articial Intelligence. Hyderabad, India.
Weng, J., Miao, C., Goh, A., 2005. Protecting online rating systems from unfair ratings.
In: Trust, Privacy, and Security in Digital Business. In: Lecture Notes in Computer
Science, 3592.
Whitby, A., Jsang, A., Indulska, J., 2004. Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of the Workshop on Trust in Agent Societies hold in
the Autonomous Agents and Multi Agent Systems Conference.
Xiong, L., Liu, L., 2004. Peertrust: supporting reputation-based trust for peer-to-peer
electronic communities. IEEE Trans. Knowl. Data Eng. 16 (7).
Yager, R.R., 2004. Participatory learning: a paradigm for building better digital and human agents. Law Probab. Risk 3 (1).
506
Z. Saoud et al. / The Journal of Systems and Software 122 (2016) 496506
Yu, B., Singh, M.P., 2002. An evidential model of distributed reputation management.
In: International Joint Conference on Autonomous Agents and Multi-Agent Systems. Bologna, Italy.
Zhou, R., Hwang, K., 2007. Powertrust: a robust and scalable reputation system for
trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18 (4).
Zohra Saoud is a PhD student at Universit Lyon 1. She received a Masters degree in Databases and Web Technologies from the Universit de Poitiers. Her main
research interests include: Web services, trust and related elds. Contact her at
zohra.saoud@liris.cnrs.fr.
Noura Faci is an associate professor in the Department of Computer Science at Universit Lyon 1, France. Her research interests include fault-tolerance, trust, serviceoriented computing, social networks, and Enterprise 2.0. Faci received a PhD in Computer Science from Reims University, France. Contact her at noura.faci@liris.cnrs.fr.