Trust and Privacy Enabled Service Composition Using Social Experience

被引:0
|
作者
Mokarizadeh, Shahab [1 ]
Dokoohaki, Nima [1 ]
Matskin, Mihhail [1 ,2 ]
Kuengas, Peep [3 ]
机构
[1] Royal Inst Technol KTH, ICT Sch, Stockholm, Sweden
[2] Norwegian Univ Sci & Technol, Trondheim, Norway
[3] Univ Tartu, Tartu, Estonia
来源
基金
瑞典研究理事会;
关键词
Social Network; Privacy; Trust; Web-service; Web-service Composition;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a framework for automatic selection and composition of services which exploits trustworthiness of services as a metric for measuring the quality of service composition. Trustworthiness is defined in terms of service reputation extracted from user profiles. The profiles are, in particular, extracted and inferred from a social network which accumulates users past experience with corresponding services. Using our privacy inference model we, first, prune social network to hide privacy sensitive contents and, then, utilize a trust inference based algorithm to measure reputation score of each individual service, and subsequently trustworthiness of their composition.
引用
收藏
页码:226 / +
页数:3
相关论文
共 50 条
  • [1] The privacy victim experience of SoLoMo services: impact on trust, service quality, and privacy concerns
    Yang, Heng-Li
    Lin, Ren-Xiang
    [J]. SERVICE BUSINESS, 2021, 15 (04) : 725 - 755
  • [2] The privacy victim experience of SoLoMo services: impact on trust, service quality, and privacy concerns
    Heng-Li Yang
    Ren-Xiang Lin
    [J]. Service Business, 2021, 15 : 725 - 755
  • [3] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 409 - +
  • [4] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 307 - +
  • [5] Trustworthy service composition using swift trust in SON
    Ma, Xiaoning
    [J]. Journal of Computational Information Systems, 2010, 6 (14): : 4761 - 4766
  • [6] Trust Model for Privacy in Social Networking using Probabilistic Determination
    Yadav, Preeti
    Gupta, Savita
    Venkatesan, S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [7] Supporting Trust and Privacy with an Identity-Enabled Architecture
    Sarma, Amardeo
    Girao, Joao
    [J]. FUTURE INTERNET, 2012, 4 (04) : 1016 - 1025
  • [8] Privacy in Data Service Composition
    Barhamgi, Mahmoud
    Perera, Charith
    Yu, Chia-Mu
    Benslimane, Djamal
    Camacho, David
    Bonnet, Christine
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (04) : 639 - 652
  • [9] The flipside of ubiquitous connectivity enabled by smartphone-based social networking service: Social presence and privacy concern
    Choi, Sujeong
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2016, 65 : 325 - 333
  • [10] Improving Privacy in Data Service Composition
    Tiwary, Gyan Prakash
    Stroulia, Eleni
    Srivastava, Abhishek
    [J]. IEEE ACCESS, 2021, 9 : 95716 - 95729