skip to main content
research-article

Trustworthy Service Selection and Composition

Published:01 February 2011Publication History
Skip Abstract Section

Abstract

We consider Service-Oriented Computing (SOC) environments. Such environments are populated with services that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services, to support specified user needs directly or by providing additional services. Existing approaches for service selection either fail to capture the dynamic relationships between services or assume that the environment is fully observable. In practical situations, however, consumers are often not aware of how the services are implemented. We propose two distributed trust-aware service selection approaches: one based on Bayesian networks and the other on a beta-mixture model. We experimentally validate our approach through a simulation study. Our results show that both approaches accurately punish and reward services in terms of the qualities they offer, and further that the approaches are effective despite incomplete observations regarding the services under consideration.

Skip Supplemental Material Section

Supplemental Material

References

  1. Amazon.com. 2009. Amazon elastic compute cloud (Amazon EC2). http://aws.amazon.com/ec2/.Google ScholarGoogle Scholar
  2. Bezdek, J. C. 1981. Pattern Recognition with Fuzzy Objective Function Algorithms. Kluwer Academic Publishers, Norwell, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bishop, C. M. 2006. Pattern Recognition and Machine Learning. Springer, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bouguila, N., Ziou, D., and Monga, E. 2006. Practical Bayesian estimation of a finite beta mixture through Gibbs sampling and its applications. Statist. Comput. 16, 2, 215--225. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bpel. 2007. Web services business process execution language, version 2.0. http://docs.oasis-open.org/wsbpel/2.0/.Google ScholarGoogle Scholar
  6. Buntine, W. L. 1994. Operations for learning with graphical models. J. Artif. Intell. Res. 2, 159--225. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dempster, A. P., Laird, N. M., and Rubin, D. B. 1977. Maximum likelihood from incomplete data via the EM algorithm. J. Royal Statist. Soc. Series B 39, 1, 1--38.Google ScholarGoogle ScholarCross RefCross Ref
  8. Evans, M., Hastings, N., and Peacock, B. 2000. Statistical Distributions 3rd Ed. Wiley-Interscience, New York.Google ScholarGoogle Scholar
  9. Fielitz, B. D. and Myers, B. L. 1975. Estimation of parameters in the beta distribution. Decis. Sci. 6, 1, 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  10. Friedman, N. 1998. The Bayesian structural EM algorithm. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI). Morgan Kaufmann, San Francisco, CA, 129--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hang, C.-W., Wang, Y., and Singh, M. P. 2008. An adaptive probabilistic trust model and its evaluation. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. 1485--1488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hang, C.-W., Wang, Y., and Singh, M. P. 2009. Operators for propagating trust and their evaluation in social networks. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1025--1032. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lauritzen, S. L. 1995. The EM algorithm for graphical association models with missing data. Comput. Statist. Data Anal. 19, 2, 191--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lin, W.-L., Lo, C.-C., Chao, K.-M., and Younas, M. 2008. Consumer-Centric QoS-aware selection of Web services. J. Comput. Syst. Sci. 74, 2, 211--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Liu, W. 2005. Trustworthy service selection and composition---Reducing the entropy of service-oriented Web. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN). IEEE Computer Society, Los Alamitos, CA, 104--109.Google ScholarGoogle Scholar
  16. Maximilien, E. M. and Singh, M. P. 2004. A framework and ontology for dynamic Web services selection. IEEE Internet Comput. 8, 5, 84--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. McLachlan, G. and Peel, D. 2000. Finite Mixture Models. Wiley-Interscience, New York.Google ScholarGoogle Scholar
  18. Menascé, D. A. 2004. Composing Web services: A QoS view. IEEE Internet Comput. 8, 6, 88--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Milanovic, N. and Malek, M. 2004. Current solutions for Web service composition. IEEE Internet Comput. 8, 6, 51--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Nepal, S., Malik, Z., and Bouguettaya, A. 2009. Reputation propagation in composite services. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS). IEEE Computer Society, 295--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Paradesi, S., Doshi, P., and Swaika, S. 2009. Integrating behavioral trust in Web service compositions. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS). IEEE Computer Society, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Pearl, J. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Singh, M. 1997. Learning Bayesian networks from incomplete data. In Proceedings of the 14th National Conference on Artificial Intelligence (AAAI). AAAI Press, Menlo Park, CA, 534--539. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Singh, M. P. and Huhns, M. N. 2005. Service-Oriented Computing: Semantics, Processes, Agents. John Wiley & Sons, Chichester, UK.Google ScholarGoogle Scholar
  25. Wang, Y. and Singh, M. P. 2006. Trust representation and aggregation in a distributed agent system. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI). AAAI Press, Menlo Park, 1425--1430. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wang, Y. and Singh, M. P. 2010. Evidence-Based trust: A mathematical model geared for multiagent systems. ACM Trans. Auton. Adaptive Syst. 5, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wu, G., Wei, J., Qiao, X., and Li, L. 2007. A Bayesian network based QoS assessment model for Web services. In Proceedings of the IEEE International Conference on Services Computing. IEEE Computer Society, Los Alamitos, CA, 498--505.Google ScholarGoogle Scholar
  28. Yue, K., Liu, W., and Li, W. 2007. Towards Web services composition based on the mining and reasoning of their causal relationships. In Advances in Data and Web Management. Lecture Notes in Computer Science, vol. 4505. Springer, Berlin, 777--784. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zhang, N. L. and Poole, D. 1996. Exploiting causal independence in Bayesian network inference. J. Artif. Intell. Res. 5, 301--328. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trustworthy Service Selection and Composition

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Autonomous and Adaptive Systems
          ACM Transactions on Autonomous and Adaptive Systems  Volume 6, Issue 1
          February 2011
          127 pages
          ISSN:1556-4665
          EISSN:1556-4703
          DOI:10.1145/1921641
          Issue’s Table of Contents

          Copyright © 2011 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 February 2011
          • Accepted: 1 July 2010
          • Revised: 1 March 2010
          • Received: 1 June 2009
          Published in taas Volume 6, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!