Skip to main content
Log in

Collaboration through computation: incorporating trust model into service-based software systems

  • Special Issue Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

The open and dynamic nature of service-based software systems necessitates spontaneous and trustworthy interactions between collaborating entities. Service providers are exposed to users spanned across multiple organizational domains, so can be exploited by potentially untrustworthy service requestors. Given that, service providers need to trust requestors before granting them with services. Trust encompasses a number of quality attributes (e.g., security, competence, honesty) and helps in dynamic decision making. In this paper, we present a trust-based service collaboration approach, facilitated by the analysis of service-based interactions between service providers and requestors, and recommendations between service providers. Service providers exchange recommendations to convey their trust on requestors. This collaboration is quantified using our proposed trust model, called CAT, a Context-Aware Trust model based on service-based interactions by considering services as contexts. We identify a number of collaboration-based trust properties including risk and context-awareness and incorporate them in CAT. A context-similarity parameter is introduced to decide on similar services. A time-based ageing parameter is proposed to decrease trust values over time without any further interactions. Direct and indirect recommendations from other service providers are included in total trust calculation, with a path-based ageing parameter applying over indirect recommendations. A mechanism to calculate the accuracy of recommendations is proposed to differentiate between reliable and unreliable recommendations. These calculation schemes are employed in a trust-based service collaboration algorithm to automatically decide on granting services to requestors. The approach is elaborated using examples from file sharing applications, and successfully evaluated by implementing a prototype service-based file sharing grid.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Durad M, Cao Y (2006) A vision for trust managment grid. In: Proceedings of the sixth IEEE international symposium on cluster computing and the grid, Singapore. IEEE CS Press, Los Alamitos, pp 34–44

  2. Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In: Proceedings of the third annual conference on trust management, Lecture Notes in Computer Science, vol 3477. Springer, Heidelberg, pp 364–371

  3. Gambetta D (1988) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations, Chap 13. University of Oxford, 213–237

  4. Bond A, Arnold D (1994) Visualizing service interaction in an open distributed system. In: Proceedings of the first international workshop on services in distributed and networked environments, Prague, Czech Republic. IEEE CS Press, Los Alamitos, pp 19–25

  5. Haque M, Ahamed SI (2007) An omnipresent formal trust model (FTM) for pervasive computing environment. In: Proceedings of the 31st annual IEEE international computer software and applications conference, Beijing, China. IEEE CS Press, Los Alamitos, 49–56

  6. Rajbhandari S, Contes A, Rana OF, Deora V, Wootten I (2006) Trust assessment using provenance in service oriented applications. In: Proceedings of the tenth IEEE on international enterprise distributed object computing conference workshops, Hongkong. IEEE CS Press, Los Alamitos, pp 65–72

  7. Dimmock N, Belokosztolszki A, Eyers D, Bacon J, Ingram D, Moody K (2004) Using trust and risk in role-based access control policies. In: Proceedings of the ninth ACM symposium on access control models and technologies. ACM Press, New York, pp 156–162

  8. Huynh T, Jennings N, Shadbolt N (2004) FIRE: An integrated trust and reputation model for open multi-agent systems. In: Proceedings of the 16th European conference on artificial intelligence. Valencia, Spain, pp 18–22

  9. Wang Y, Singh M (2007) Formal trust model for multiagent systems. In: Proceedings of the 20th international joint conference on artificial intelligence. India, pp 1551–1556

  10. Billhardt H, Hermoso R, Ossowski S, Centeno R (2007) Trust based service provider selection in open environments. In: Proceedings of the 22nd annual ACM symposium on applied computing, Seoul, Korea. ACM Press, New York, pp 1375–1380

  11. Ries S (2007) Certain trust: a trust model for users and agents. In: Proceedings of the 22nd annual ACM symposium on applied computing, Seoul, Korea. ACM Press, New York, pp 1599–1604

  12. Sherchan W, Loke S, Krishnaswamy S (2006) A fuzzy model for reasoning about reputation in web services. In: Proceedings of the 21st annual ACM symposium on applied computing, Dijon, France. ACM Press, New York, pp 1886–1892

  13. Capra L, Musolesi M (2006) Autonomic trust prediction for pervasive systems. In: Proceedings of the 20th international conference on Advanced Information Networking and Applications. Vienna, Austria, IEEE CS Press, Los Alamitos, 481–488

  14. Sabater J, Sierra C (2001) REGRET: A reputation model for gregarious societies. In: Proceedings of the fourth workshop on deception, fraud and trust in agent societies, Canada, pp 61–70

  15. Wang Y, Singh M (2006) Trust representation and aggregation in distributed agent systems. In: Proceedings of the 21st international conference on artificial intelligence, Boston

  16. Quercia D, Hailes S, Capra L (2006) B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the fourth international conference on Trust Management, Lecture Notes in Computer Science, vol 3986, Springer, Heidelberg, pp 298–312

  17. Jøsang A (1996) The right type of trust for distributed systems. In: Proceedings of the 1996 workshop on new security paradigms, Lake Arrowhead. ACM Press, New York, pp 119–131

  18. Uddin MG, Zulkernine M, Ahamed SI (2008) CAT: a context-aware trust model for open and dynamic systems. In: Proceedings of the 23rd annual ACM symposium on applied computing, Brazil. ACM Press, New York, pp 2024–2029

  19. Uddin MG, Zulkernine M (2008) UMLtrust: towards developing trust-aware software. In: Proceedings of the 23rd annual ACM symposium on applied computing, Brazil. ACM Press, New York, pp 831–836

  20. Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15(3): 200–222

    Article  Google Scholar 

  21. Tie-Yan L, HuaFei Z, Kwok-Yan L (2003) A novel two-level trust model for grid. In: Information and communications security, Lecture Notes in Computer Science, vol 2836. Springer, Heidelberg, pp 214–225

  22. Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: Proceedings of the third international conference on peer-to-peer computing, Sweden. IEEE CS Press, Los Alamitos, pp 150–157

  23. Lin C, Varadharajan V (2006) Trust based risk management for distributed system security—a new approach. In: Proceedings of the first international conference on availability, reliability and security. Vienna, Austria, IEEE CS Press, Los Alamitos, pp 6–13

  24. Grandison T, Sloman M (2000) A survey of trust in internet application. in IEEE Communications Surveys & Tutorials 3(4):September 2000. 15pp

  25. Azzedin F, Maheswaran M (2003) Trust modeling for peer-to-peer based computing systems. In: Proceedings of the international symposium on parallel and distributed processing. IEEE Press, New York, 10pp

  26. Toivonen S, Lenzini G, Uusitalo I (2006) Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of models of trust for the Web. Edinburgh, Scotland

  27. Bellifemine F, Caire G, Poggi A, Rimassa G (2003) Jade: a white paper. Exp Search Innov 3(3): 14

    Google Scholar 

  28. Eclipse (2008) Eclipse 3.2 Documentation

  29. MySQL Enterprise Server (2008) MySQL 5.0 Reference Manual

  30. Zacharia G, Maes P (2000) Trust management through reputation mechanisms. in Applied Artificial Intelligence 14(9): 881–908

    Article  Google Scholar 

  31. Kotsovinos E, Williams A (2006) BambooTrust: practical scalable trust management for global public computing. In Proceedings of the 21st annual ACM symposium on applied computing, Dijon, France. ACM Press, New York, pp 1893–1897

  32. Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled conference on electronic commerce, Slovenia

  33. Etalle S, Winsborough W (2005) Integrity constraints in trust management. In: Proceedings of tenth ACM symposium on access control models and technologies, Sweden. ACM Press, New York, pp 1–10

  34. Ryutov T, Zhou L, Neuman C, Foukia N, Leithead T, Seamons K (2005) Adaptive trust negotiation and access control for grids, In: Proceedings of the sixth IEEE/ACM international workshop on grid computing, Washington, USA. IEEE CS Press, Los Alamitos, pp 55–62

  35. Teacy W, Patel J, Jennings N, Luck M (2002) Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: Proceedings of fourth international joint conference on autonomous agents and multiagent systems, pp 997–1004

  36. Jurca R, Faltings B (2002) Towards incentive-compatible reputation management. In: Trust, reputation and security: theories and practice. Lecture Notes in Computer Science, vol 2631. Springer, Heidelberg, pp 138–147

  37. Lesani M, Bagheri S. Applying and inferring fuzzy trust in semantic web social networks. In: Proceedings of the Canadian semantic web (semantic web and beyond computing for human experinece V2). Springer, Heidelberg, pp 23–43

  38. Yu B, Singh MP (2002) An evidential model of distributed reputation mechanism. In: Proceedings of first international conference on autonomous agents and multiagent systems. ACM Press, New York, pp 294–301

  39. Chakraborty S, Ray I (2006) TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: Proceedings of the 11th ACM symposium on access control models and technologies. California, USA. ACM Press, New York, pp 49–58

  40. Xiong L, Liu L (2002) Building trust in decentralized peer-to-peer electronic communities. In: Proceedings of the fifth international conference on electronic commerce research. Montreal

  41. Sandhu R, Zhang X (2005) Peer-to-peer access control architecture using trusted computing technology. In: Proceedings of the tenth ACM symposium on access control models and technologies, Sweden. ACM Press, New York, pp 147–158

  42. Kamvar SD, Schlosser MT, Molina-Garcia H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on world wide web, Budapest. ACM Press, New York, pp 640–651

  43. Zhang W, Bi J, Wu J, Qin Z (2007) An approach to optimize local trust algorithm for suremsg service. In: Proceedings of the 2007 ECSIS symposium on bio-inspired, learning, and intelligent systems for security, Edinburg, IEEE CS Press, Los Alamitos, pp 51–54

  44. English C, Terzis S, Nixon P (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Pers Ubiquitous Comput 10(1): 50–54

    Article  Google Scholar 

  45. Yu E, Liu L (2001) Modelling trust for system design using the i* strategic actors framework. In: Proceedings of the international workshop on deception, fraud, and trust in agent societies, Lecture Notes in Computer Science, vol 2246. Springer, Heidelberg, pp 175–194

  46. Horkoff J, Yu E, Liu L (2006) Analyzing trust in technology strategies. In: Proceedings of the international conference on privacy, security, and trust. McGraw-Hill, New York, pp 21–32

  47. Uddin MG (2008) Development and automatic monitoring of trust-aware service-based software systems. In: Queen’s University Masters Thesis

  48. Douceur J (2002) The sybil attack. In: Proceedings of the first international workshop on peer-to-peer systems, Lecture Notes in Computer Science, vol 2429. Cambridge, MA, USA, Springer, Heidelberg, pp 251–260

  49. Damon M, Doug S, Dirk G (2007) A mechanism for detecting and responding to misbehaving nodes in wireless networks. In: Proceedings of the fourth IEEE communications society conference on sensor, mesh and ad hoc communications and networks. IEEE CS Press, Los Alamitos, pp 678–684

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Zulkernine.

Additional information

This research is partially funded by the Natural Sciences and Engineering Research Council of Canada (NSERC).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Uddin, M.G., Zulkernine, M. & Ahamed, S.I. Collaboration through computation: incorporating trust model into service-based software systems. SOCA 3, 47–63 (2009). https://doi.org/10.1007/s11761-009-0037-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-009-0037-8

Keywords

Navigation