Multi-dimensional trust for context-aware services computing

被引:5
|
作者
Mousa, Afaf [1 ]
Bentahar, Jamal [1 ]
Alam, Omar [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
[2] Trent Univ, Dept Comp Sci, Peterborough, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Context-aware services; QoS trust management; Dynamic cyclic dependency; Collusion attacks; White-washing attack; WEB SERVICES; REPUTATION; COMPOSITE; NETWORKS; QOS;
D O I
10.1016/j.eswa.2021.114592
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper addresses the problem of trust management of cloud, fog and IoT services in dynamically changing environments. The continuous dynamic environment is one of the challenges that trustworthy services management in the cloud, fog and IoT settings faces. Services in such an environmental context have difficulty securing an acceptable quality of service (QoS). This article proposes a trust management framework that establishes service trust by considering the direct trust from the truster (subjective trust), aggregating referrals about the service in a collusion-resistant manner (objective trust), and bootstrapping new services. We introduce a subjective trust model based on the formalism of dependency networks to dynamically predict the provided QoS in response to context environment changes. The proposed approach leverages the dependency relations that exist among the QoS metrics and environmental context variables. The novelty at the subjective trust level lies in considering the dynamic cyclic dependency relations that enhances the prediction accuracy. However, subjective trust based on direct interactions could be insufficient to make the trust estimate credible. Hence, on top of the subjective layer, we propose an objective trust management model resilient to collusion attacks by leveraging the power of mass collaboration among referees. Finally, we propose a bootstrapping mechanism that is resilient to the white-washing attacks by observing the behaviours of newcomer services with no trust resources using the concept of social adoption to estimate their initial trust values. Experiments conducted on reallife and synthetic datasets demonstrate the effectiveness of our approach compared with state-of-the-art approaches. We used the statistical log score to assess the model's prediction accuracy and employed the estimation error of the objective trust as indicated by referees relative to the one calculated by the multi-round simulation. The ROC (Receiver Operating Characteristic) curves are finally used to measure the accuracy of the classifier used in the proposed trust bootstrapping mechanism in providing accurate initial trust values. The main findings of the paper are around the new trust model of cloud, fog and IoT services considering their dynamically changing environments. The first finding is that the prediction of the provided QoS shows better results when it is dynamic and responds to context environment changes by leveraging the dynamic dependency network linking the QoS metrics and context variables of the environment. The second finding is that the objective trust performs better when it is resilient to collusion attacks by leveraging the power of mass collaboration among referees. The third finding is that the bootstrapping mechanism that observes the behaviours of new comer services with no trust resources using the concept of social adoption to estimate their initial trust values excels by being resilient to white watching attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Context-aware notification for wearable computing
    Kern, N
    Schiele, B
    SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, PROCEEDINGS, 2003, : 223 - 230
  • [42] Context-aware Computing for the Internet of Things
    Piccialli, Francesco
    Jeon, Gwanggil
    INTERNET OF THINGS, 2021, 14
  • [43] Situated Interaction and Context-Aware Computing
    Dey, Anind K.
    Kortuem, Gerd
    Morse, David R.
    Schmidt, Albrecht
    PERSONAL AND UBIQUITOUS COMPUTING, 2001, 5 (01) : 1 - 3
  • [44] Siren: Context-aware computing for firefighting
    Jiang, XD
    Chen, NY
    Hong, JI
    Wang, K
    Takayama, L
    Landay, JA
    PERVASIVE COMPUTING, PROCEEDINGS, 2004, 3001 : 87 - 105
  • [45] Data Management for Context-Aware Computing
    Xue, Wenwei
    Pung, Hungkeng
    Ng, Wenlong
    Gu, Tao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 492 - +
  • [46] Modeling uncertainty in context-aware computing
    Truong, BA
    Lee, YK
    Lee, SY
    FOURTH ANNUAL ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2005, : 676 - 681
  • [47] A formalism for context-aware mobile computing
    Yan, L
    Sere, K
    ISPDC 2004: THIRD INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING/HETEROPAR '04: THIRD INTERNATIONAL WORKSHOP ON ALGORITHMS, MODELS AND TOOLS FOR PARALLEL COMPUTING ON HETEROGENEOUS NETWORKS, PROCEEDINGS, 2004, : 14 - 21
  • [48] Robustness in Context-Aware Mobile Computing
    Wolf, Hannes
    Herrmann, Klaus
    Rothermel, Kurt
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 46 - 53
  • [49] Context-Aware Verifiable Cloud Computing
    Yan, Zheng
    Yu, Xixun
    Ding, Wenxiu
    IEEE ACCESS, 2017, 5 : 2211 - 2227
  • [50] Issues in developing context-aware computing
    Pascoe, J
    Ryan, N
    Morse, D
    HANDHELD AND UBIQUITOUS COMPUTING, PROCEEDINGS, 1999, 1707 : 208 - 221