skip to main content
research-article

CAN-TM: Chain Augmented Naïve Bayes-based Trust Model for Reliable Cloud Service Selection

Published:19 September 2019Publication History
Skip Abstract Section

Abstract

The increasing proliferation of Cloud Services (CSs) has made the reliable CS selection problem a major challenge. To tackle this problem, this article introduces a new trust model called Chain Augmented Naïve Bayes-based Trust Model (CAN-TM). This model leverages the correlation that may exist among QoS attributes to solve many issues in reliable CS selection challenge, such as predicting missing assessments and improving accuracy of trust computing. This is achieved by combining both the n-gram Markov model and the Naïve Bayes model. Experiments are conducted to validate that our proposed CAN-TM outperforms state-of-the-art approaches.

References

  1. Nizar Bouguila. 2008. Clustering of count data using generalized dirichlet multinomial distributions. IEEE Trans. Knowl. Data Eng. 20, 4 (2008), 462--474. DOI:https://doi.org/10.1109/TKDE.2007.190726Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Marco Bressan and Jordi Vitrià. 2002. Improving naive Bayes using class-conditional ICA. In Proceedings of the Ibero-American Conference on Artificial Intelligence. Springer, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  3. Sudip Chakraborty and Krishnendu Roy. 2012. An SLA-based framework for estimating trustworthiness of a cloud. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12). 937--942. DOI:https://doi.org/10.1109/TrustCom.2012.84Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Chow and C. Liu. 2006. Approximating discrete probability distributions with dependence trees. IEEE Trans. Inf. Theor. 14, 3 (Sept. 2006), 462--467. DOI:https://doi.org/10.1109/TIT.1968.1054142Google ScholarGoogle Scholar
  5. Shuai Ding, Shanlin Yang, Youtao Zhang, Changyong Liang, and Chenyi Xia. 2014. Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-based Syst. 56 (2014), 216--225. DOI:https://doi.org/10.1016/j.knosys.2013.11.014Google ScholarGoogle Scholar
  6. Wenjuan Fan and Harry G. Perros. 2014. A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-based Syst. 70 (2014), 392--406. DOI:https://doi.org/10.1016/j.knosys.2014.07.018Google ScholarGoogle Scholar
  7. Nir Friedman, Dan Geiger, and Moises Goldszmidt. 1997. Bayesian network classifiers. Mach. Learn. 29, 2 (01 Nov. 1997), 131--163. DOI:https://doi.org/10.1023/A:1007465528199Google ScholarGoogle Scholar
  8. N. Friedman, D. Geiger, and M. Goldszmit. 1997. Bayesian network classifiers. Mach. Learn. 29 (1997), 131--163. DOI:https://doi.org/10.1023/a:1007465528199Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gopal Krishna Gupta. 2004. Principal component analysis and Bayesian classifier based character recognition. In Proceedings of the AIP Conference, Vol. 707. AIP, 465--479.Google ScholarGoogle ScholarCross RefCross Ref
  10. Mark A. Hall. 2000. Correlation-based feature selection for discrete and numeric class machine learning. In Proceedings of the 17th International Conference on Machine Learning (ICML’00). Morgan Kaufmann Publishers Inc., San Francisco, CA, 359--366. Retrieved from: http://dl.acm.org/citation.cfm?id=645529.657793.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Iqbal and S. Asghar. 2009. Generating hierarchical association rules with the use of Bayesian network. In Proceedings of the 3rd International Conference on Network and System Security. 528--533. DOI:https://doi.org/10.1109/NSS.2009.43Google ScholarGoogle Scholar
  12. Liangxiao Jiang, Harry Zhang, Zhihua Cai, and Jiang Su. 2005. Learning tree augmented naive Bayes for ranking. In Proceedings of the 10th International Conference on Database Systems for Advanced Applications (DASFAA’05). Springer-Verlag, Berlin, 688--698. DOI:https://doi.org/10.1007/11408079_63Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Eamonn J. Keogh and Michael J. Pazzani. 1999. Learning augmented Bayesian classifiers: A comparison of distribution-based and classification-based approaches. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS’99).Google ScholarGoogle Scholar
  14. Igor Kononenko. 1991. Semi-naive Bayesian classifier. In Proceedings of the European Working Session on Learning on Machine Learning (EWSL’91). Springer-Verlag New York, Inc., New York, NY, 206--219. Retrieved from: http://dl.acm.org/citation.cfm?id=112152.112167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pat Langley, Wayne Iba, and Kevin Thompson. 1992. An analysis of Bayesian classifiers. In Proceedings of the 10th National Conference on Artificial Intelligence (AAAI’92). AAAI Press, 223--228. Retrieved from: http://dl.acm.org/citation.cfm?id=1867135.1867170.Google ScholarGoogle Scholar
  16. Pat Langley and Stephanie Sage. 1994. Induction of selective Bayesian classifiers. In Proceedings of the 10th International Conference on Uncertainty in Artificial Intelligence (UAI’94). Morgan Kaufmann Publishers Inc., San Francisco, CA, 399--406. Retrieved from: http://dl.acm.org/citation.cfm?id=2074394.2074445.Google ScholarGoogle ScholarCross RefCross Ref
  17. Y. K. (Yu-Kweng) Lin. 1976. Probabilistic Theory of Structural Dynamics. Huntington, N.Y.: R. E. Krieger Pub. Co. Reprint of the edition published by McGraw-Hill, New York.Google ScholarGoogle Scholar
  18. Paul Manuel. 2015. A trust model of cloud computing based on quality of service. In Annals of Operations Research. Vol. 233. Springer Science+Business Media New York, 281--292. DOI:https://doi.org/10.1007/s10479-013-1380-xGoogle ScholarGoogle Scholar
  19. M. Mehdi, N. Bouguila, and J. Bentahar. 2012. Trustworthy web service selection using probabilistic models. In Proceedings of the 19th IEEE International Conference on Web Services (ICWS’12), 17--24. DOI:https://doi.org/10.1109/ICWS.2012.17Google ScholarGoogle Scholar
  20. Manel Mrabet, Yosra ben Saied, and Leila Azouz Saidane. 2017. Modeling correlation between QoS attributes for trust computation in cloud computing environments. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid’17). IEEE Press, Piscataway, NJ, 488--497. DOI:https://doi.org/10.1109/CCGRID.2017.38Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hien Trang Nguyen, Weiliang Zhao, and Jian Yang. 2010. A trust and reputation model based on bayesian network for web services. In IEEE International Conference on Web Services (ICWS'10), Miami, Florida, USA. 251--258. DOI:http://dx.doi.org/10.1109/ICWS.2010.36Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi, Jeriel Law, and Anne H. H. Ngu. 2013. Identifying fake feedback for effective trust management in cloud environments. In Proceedings of the International Conference on Service-Oriented Computing Workshops (ICSOC’12). 47--58. DOI:https://doi.org/10.1007/978-3-642-37804-1_6Google ScholarGoogle Scholar
  23. Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar, and Anne H. H. Ngu. 2016. CloudArmor: Supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. 27, 2 (2016), 367--380. DOI:https://doi.org/10.1109/TPDS.2015.2408613Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Michael J. Pazzani. 1996. Searching for Dependencies in Bayesian Classifiers. Springer New York, New York, NY, 239--248. DOI:https://doi.org/10.1007/978-1-4612-2404-4_23Google ScholarGoogle Scholar
  25. Fuchun Peng, Dale Schuurmans, and Shaojun Wang. 2004. Augmenting naive Bayes classifiers with statistical language models. Inform. Retr. 7 (2004), 317--345. DOI:https://doi.org/10.1023/B:INRT.0000011209.19643.e2Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mithun Nagendra Prasad, Arcot Sowmya, and Inge Koch. 2004. Feature subset selection using ICA for classifying emphysema in HRCT images. In Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04), Vol. 4. IEEE, 515--518.Google ScholarGoogle ScholarCross RefCross Ref
  27. Chenhao Qu and Rajkumar Buyya. 2014. A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications (AINA’14). 850--857. DOI:https://doi.org/10.1109/AINA.2014.104Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Lie Qu, Yan Wang, and Mehmet A. Orgun. 2013. Cloud service selection based on the aggregation of user feedback and quantitative performance assessment. In Proceedings of the IEEE International Conference on Services Computing, 152--159. DOI:https://doi.org/10.1109/SCC.2013.92Google ScholarGoogle Scholar
  29. Lie Qu, Yan Wang, and Mehmet A. Orgun. 2014. Context-aware cloud service selection based on comparison and aggregation of user subjective assessment and objective performance assessment. In Proceedings of the IEEE International Conference on Web Services (ICWS’14). 81--88. DOI:https://doi.org/10.1109/ICWS.2014.24Google ScholarGoogle Scholar
  30. Lie Qu, Yan Wang, Mehmet A. Orgun, Ling Liu, Huan Liu, and Athman Bouguettaya. 2015. CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Trans. Serv. Comput. 8, 3 (2015), 369--383. DOI:https://doi.org/10.1109/TSC.2015.2413111Google ScholarGoogle ScholarCross RefCross Ref
  31. V. Viji Rajendran and S. Swamynathan. 2016. Hybrid model for dynamic evaluation of trust in cloud services. Wirel. Netw. 22, 6 (2016), 1807--1818. DOI:https://doi.org/10.1007/s11276-015-1069-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  32. Chotirat (Ann) Ratanamahatana and Dimitrios Gunopulos. 2003. Feature selection for the naive Bayesian classifier using decision trees. Appl. Artific. Intell. 17, 5--6 (2003), 475--487. DOI:https://doi.org/10.1080/713827175Google ScholarGoogle ScholarCross RefCross Ref
  33. Steven Reece, Alex Rogers, Stephen J. Roberts, and Nicholas R. Jennings. 2007. Rumours and reputation: Evaluating multi-dimensional trust within a decentralised reputation system. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’07). 165. DOI:https://doi.org/10.1145/1329125.1329326Google ScholarGoogle Scholar
  34. Irina Rish. 2001. An empirical study of the naive Bayes classifier. In IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, Vol. 3. IBM New York, 41--46.Google ScholarGoogle Scholar
  35. Alagumani Selvaraj and Subashini Sundararajan. 2016. Evidence-based trust evaluation system for cloud services using fuzzy logic. Int. J. Fuzzy Syst. (2016), 1--9. DOI:https://doi.org/10.1007/s40815-016-0146-4Google ScholarGoogle Scholar
  36. Sarbjeet Singh and Jagpreet Sidhu. 2017. Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers. Fut. Gen. Comp. Syst. 67 (2017), 109--132. DOI:https://doi.org/10.1016/j.future.2016.07.013Google ScholarGoogle ScholarCross RefCross Ref
  37. Mona Taghavi, Jamal Bentahar, Hadi Otrok, Omar Abdel Wahab, and Azzam Mourad. 2017. On the effects of user ratings on the profitability of cloud services. In Proceedings of the IEEE International Conference on Web Services (ICWS’17). 1--8. DOI:https://doi.org/10.1109/ICWS.2017.8Google ScholarGoogle ScholarCross RefCross Ref
  38. David R. Tobergte and Shirley Curtis. 2013. Workshop on quantification, communication, and interpretation of uncertainty in simulation and data science. Journal of Chemical Information and Modeling 53, 9 (2013), 1689--1699. DOI:http://dx.doi.org/10.1017/CBO9781107415324.004Google ScholarGoogle ScholarCross RefCross Ref
  39. Dongxia Wang, Tim Muller, Yang Liu, and Jie Zhang. 2014. Towards robust and effective trust management for security: A survey. In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’14). 511--518. DOI:https://doi.org/10.1109/TrustCom.2014.65Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Shinji Watanabe and Jen-Tzung Chien. 2015. Bayesian Speech and Language Processing (1st ed.). Cambridge University Press, New York, NY.Google ScholarGoogle Scholar
  41. Nayyar A. Zaidi, Jesús Cerquides, Mark J. Carman, and Geoffrey I. Webb. 2013. Alleviating naive Bayes attribute independence assumption by attribute weighting. J. Mach. Learn. Res. 14, 1 (Jan. 2013), 1947--1988. Retrieved from: http://dl.acm.org/citation.cfm?id=2567709.2567725.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Harry Zhang and Shengli Sheng. 2004. Learning weighted naive Bayes with accurate ranking. In Proceedings of the 4th IEEE International Conference on Data Mining (ICDM’04). IEEE Computer Society, Washington, DC, 567--570. Retrieved from: http://dl.acm.org/citation.cfm?id=1032649.1033532.Google ScholarGoogle ScholarCross RefCross Ref
  43. Harry Zhang and Jiang Su. 2004. Naive Bayesian classifiers for ranking. In Machine Learning: ECML 2004, Jean-François Boulicaut, Floriana Esposito, Fosca Giannotti, and Dino Pedreschi (Eds.). Springer Berlin, 501--512.Google ScholarGoogle Scholar

Index Terms

  1. CAN-TM: Chain Augmented Naïve Bayes-based Trust Model for Reliable Cloud Service Selection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 19, Issue 4
          Special Section on Trust and AI and Regular Papers
          November 2019
          201 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/3362102
          • Editor:
          • Ling Liu
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 September 2019
          • Accepted: 1 May 2019
          • Revised: 1 April 2019
          • Received: 1 October 2018
          Published in toit Volume 19, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!