Skip to main content
Log in

NTSC: a novel trust-based service computing scheme in social internet of things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently, data-based services have played a significant role in satisfying various of requirements of people in social IoT. Since data is the basis of data-based service, therefore, it is significant to obtain trust data to enhance trust services. Few researches optimized trust issue of services from this point of view before. Therefore, based on this domain, this paper proposes a novel service computing framework to fundamentally form trust-based services via trust-based data in the social IoT, which mainly consists of two schemes. Data trustworthy is relevant to trustworthy of data providers in the social networks, therefore, we propose a trust evaluation scheme to compute trustworthy for data providers with assistance of trusted static sensor devices in edge computing, that comprehensively computes trustworthy by considering both temporal and quality factors. This process ensures to generate trust services from data source. Then, to improve precision of service evaluation in the updating process, a trust-based service evaluation scheme is proposed to compute service evaluation by fully considering trustworthy of users, which consists of two evaluation phases, local and global evaluation respectively. Finally, extensive experiment is conducted to validate efficiencies of the proposed scheme. Compared to traditional scheme, data trustworthiness can be improved by 26.4% and thus service trustworthy is improved by 26.4% accordingly. The precision of service evaluation is improved by 20.79%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

References

  1. Stergiou CL, Psannis KE, Gupta BB (2020) IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J 8(7):5164–5171

    Article  Google Scholar 

  2. Gurini DF, Gasparetti F, Micarelli A, Sansonetti G (2018) Temporal people-to-people recommendation on social networks with sentiment-based matrix factorization. Futur Gener Comput Syst 78:430–439

    Article  Google Scholar 

  3. Li T, Zhao M, Wong KKL (2020) Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. Comput Commun 152:109–118

    Article  Google Scholar 

  4. Huang S, Zeng Z, Ota K, Dong M, Wang T, Xiong N (2021) An intelligent collaboration trust interconnections system for Mobile information control in ubiquitous 5G networks. IEEE Trans Netw Sci Eng 8(1):347–365

    Article  MathSciNet  Google Scholar 

  5. Li T, Liu W, Wang T, Zhao M, Li X, Ma M (2020) Trust data collections via vehicles joint with unmanned aerial vehicles in the smart internet of things. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3956

  6. Jiang B, Huang G, Wang T, Gui J, Zhu X (2020) Trust based energy efficient data collection with unmanned aerial vehicle in edge network. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3942

  7. Boukerche A, Robson E (2018) Vehicular cloud computing: architectures, applications, and mobility. Comput Netw 135:171–189

    Article  Google Scholar 

  8. Kapetanakis S, Polatidis N, Alshammari G, Petridis M (2020) A novel recommendation method based on general matrix factorization and artificial neural networks. Neural Comput & Applic 32(16):12327–12334

    Article  Google Scholar 

  9. Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027

    Article  Google Scholar 

  10. Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58(2):102468

    Article  Google Scholar 

  11. Li T, Liu A, Xiong NN, Zhang S, Wang T (2021) A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems. Inf Sci 545:65–81

    Article  MathSciNet  Google Scholar 

  12. Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441

    Article  Google Scholar 

  13. Shen M, Liu A, Huang G, Xiong NN, Lu H (2021) ATTDC: an active and trace-able trust data collection scheme for industrial security in smart cities. IEEE Internet Things J 8(8):6437–6453

    Article  Google Scholar 

  14. He Y, Yu FR, Wei Z, Leung V (2019) Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Netw 86:154–165

    Article  Google Scholar 

  15. Kaur H, Kumar N, Batra S (2018) An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Futur Gener Comput Syst 86:297–307

    Article  Google Scholar 

  16. Fu M, Qu H, Yi Z, Lu L, Liu Y (2018) A novel deep learning-based collaborative filtering model for recommendation system. IEEE Trans Cybern 49(3):1084–1096

    Article  Google Scholar 

  17. Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Selected Areas Commun 36(2):246–256

    Article  Google Scholar 

  18. Javaid U, Aman MN, Sikdar B (2020) A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J 7(12):11815–11829

    Article  Google Scholar 

  19. Rani R, Kumar S, Dohare U (2019) Trust evaluation for light weight security in sensor enabled internet of things: game theory-oriented approach. IEEE Internet Things J 6(5):8421–8432

    Article  Google Scholar 

  20. Hu H, Jiang Z, Zhao Y, Zhang Y, Wang H, Wang W (2020) Network representation learning-enhanced multi-source information fusion model for POI recommendation in Smart City. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.3006989

  21. Pourghebleh B, Wakil K, Navimipour NJ (2019) A comprehensive study on the trust management techniques in the internet of things. IEEE Internet Things J 6(6):9326–9337

    Article  Google Scholar 

  22. Ouyang Y, Liu W, Yang Q, Mao X, Li F (2021) Trust based task offloading scheme in UAV-enhanced edge computing network. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-021-01137-y

  23. Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur Gener Comput Syst 108:909–920

    Article  Google Scholar 

  24. Li T, Liu W, Zeng Z, Xiong NN (2021) DRLR: a deep reinforcement learning based recruitment scheme for massive data collections in 6G-based IoT networks. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3067904

  25. Barcelo M, Correa A, Llorca J, Tulino AM, Vicario JL, Morell A (2016) IoT-cloud service optimization in next generation smart environments. IEEE J Selected Areas Commun 34(12):4077–4090

    Article  Google Scholar 

  26. Huang C, Huang G, Liu W, Wang R, Xie M (2021) A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs. Phys Commun 47:101320

    Article  Google Scholar 

  27. Khelloufi A, Ning H, Dhelim S, Qiu T, Ma J, Huang R, Atzori L (2020) A social relationships based service recommendation system for SIoT devices. IEEE Internet Things J 8:1859–1870. https://doi.org/10.1109/JIOT.2020.3016659

    Article  Google Scholar 

  28. Gupta BB, Quamara M (2020) An overview of internet of things (IoT): architectural aspects, challenges, and protocols. Concur Comput Practice Exp 32(21):e4946

    Google Scholar 

  29. Rezaeimehr F, Moradi P, Ahmadian S, Qader NN, Jalili M (2018) TCARS: time-and community-aware recommendation system. Futur Gener Comput Syst 78:419–429

    Article  Google Scholar 

  30. Xu Y, Ren J, Wang G, Zhang C, Yang J, Zhang Y (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans Ind Inf 15(6):3632–3641

    Article  Google Scholar 

  31. Lasmar EL, de Paula FO, Rosa RL et al (2020) Rsrs: ridesharing recommendation system based on social networks to improve the user’s qoe. IEEE Trans Intell Transp Syst 20(12):4728–4740

    Article  Google Scholar 

  32. Wang W, Chen J, Wang J et al (2019) Trust-enhanced collaborative filtering for personalized point of interests’ recommendation. IEEE Trans Ind Inf 16(9):6124–6132

    Article  Google Scholar 

  33. Gohari FS, Aliee FS, Haghighi H (2020) A significance-based trust-aware recommendation approach. Inf Syst 87:101421. https://doi.org/10.1016/j.is.2019.101421

    Article  Google Scholar 

  34. Ni J, Lin X, Shen XS (2018) Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Selected Areas Commun 36(3):644–657

    Article  Google Scholar 

  35. Li F, Huang G, Yang Q, Xie M (2021) Adaptive contention window MAC protocol in a global view for emerging trends networks. IEEE ACCESS 9(1):18402–18423

    Article  Google Scholar 

  36. Yu M, Liu A, Xiong N, Wang T (2020) An Intelligent Game based Offloading Scheme for Maximizing Benefits of IoT-Edge-Cloud Ecosystems IEEE Internet of Things Journal, DoI: https://doi.org/10.1109/JIOT.2020.3039828, 2020

  37. Mirsadeghi F, Rafsanjani MK, Gupta BB (2020) A trust infrastructure-based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-01010-4

  38. Li D, Deng L, Gupta BB et al (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

    Article  Google Scholar 

  39. Chen X, Ding J, Lu Z (2020) A decentralized trust management system for intelligent transportation environments. IEEE Trans Intell Transp Syst:1–14. https://doi.org/10.1109/TITS.2020.3013279

  40. Wang R, Zhang Z, Zhang Z, Jia Z (2018) ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput Netw 139:119–135

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwen Zeng.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, T., Huang, G., Zhang, S. et al. NTSC: a novel trust-based service computing scheme in social internet of things. Peer-to-Peer Netw. Appl. 14, 3431–3451 (2021). https://doi.org/10.1007/s12083-021-01200-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01200-8

Keywords

Navigation