ABSTRACT
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible to distinguish between an "abstract" workflow description - outlining which services must be involved in a workflow execution - and a "physical" workflow description - outlining the particular instance of services that were used in a particular enactment. Provenance information provides a useful way to capture the physical workflow description automatically, especially if this information is captured in a standard format. Subsequent analysis of this provenance information may be used to evaluate whether the abstract workflow description has been adhered to, and to enable a user executing a workflow-based application to establish "trust" in the outcome; trust, in this context, is an abstract mathematical construct that can be computed using provenance information. Performing analysis on such provenance information, we propose a fuzzy model for calculating trust based on an enacted workflow.
- P. Cingolani. jfuzzylogic: Open source fuzzy logic. available at: http://jfuzzylogic.sourceforge.net/html/index.html. last accessed: October 2007.Google Scholar
- P. Cingolani. Open modeller project. available at: http://openmodeller.sourceforge.net/. last accessed: October 2007.Google Scholar
- E. Cox. Fuzzy fundamentals. Spectrum, IEEE, 29(10):58--61, 1992.Google ScholarDigital Library
- H. Eichfeld, M. Klimke, M. Menke, J. Nolles, and T. Kunemund. A general-purpose fuzzy inference processor. In Proceedings of the Fourth International Conference on Microelectronics for Neural Networks and Fuzzy Systems, pages 310--317, Turin, Italy, September 1994.Google ScholarCross Ref
- M. Gaeta, G. Laria, P. Ritrovato, N. Romano, B. Serhan, S. Wesner, T. Dimitrakos, and D. M. Randal. Trust, security, and contract management challenges for grid-based application service provision. In Trust Management: Second International Conference (iTrust 2004), pages 362--368, 2004.Google ScholarCross Ref
- P. Groth, S. Jiang, S. Miles, S. Munroe, V. Tan, S. Tsasakou, and L. Moreau. An architecture for provenance systems. Technical report, University of Southampton, February 2006.Google Scholar
- P. Groth, M. Luck, and L. Moreau. A protocol for recording provenance in service-oriented grids. In Proceedings of the 8th International Conference on Principles of Distributed Systems (OPODIS'04), Grenoble, France, December 2004. Google ScholarDigital Library
- A. Jones, R. White, N. Pittas, W. Gray, T. Sutton, X. Xu, O. Bromley, N. Caithness, F. Bisby, N. Fiddian, M. Scoble, A. Culham, and P. Williams. BiodiversityWorld: An architecture for an extensible virtual laboratory for analysing biodiversity patterns. In UK e-Science All Hands Meeting, EPSRC, pages 759--765, Nottingham, UK, september 2003.Google Scholar
- S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in p2p networks. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, May 2003. Google ScholarDigital Library
- W. Liu. Trustworthy service selection and composition - reducing the entropy of service-oriented web. In 3rd IEEE International Conference on Industrial Informatics (INDIN).Google Scholar
- L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Stanford Digital Library Technologies Project, 1998.Google Scholar
- S. Rajbhandari, A. Contes, O. Rana, V. Deora, and I. Wootten. Trust assessment using provenance in service oriented application. In The Tenth IEEE International EDOC Conference (EDOC 2006), First International Workshop on Service Intelligence and Service Science (SISS 2006), Hongkong, October 2006. Google ScholarDigital Library
- S. Rajbhandari, I. Wootten, A. S. Ali, and O. Rana. Evaluating provenance-based trust for scientific workflows. In Sixth IEEE International Symposium on Cluster Computation and the Grid(CCGrid06), pages 365--372, Singapore, May 2006. Google ScholarDigital Library
- J. Sabater and C. Sierra. REGRET: a reputation model for gregarious societies. In Proceedings of the Fifth International Conference on Autonomous Agents, pages 194--195, Montreal, Canada, 2001. Google ScholarDigital Library
- M. P. Singh. Trustworthy service composition: Challenges and research questions. In Proceedings of the Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies, 2002. Google ScholarDigital Library
- A. Svirskas, M. D. Wilson, A. E. Arenas, E. C. Lupu, N. Tuptuk, D. Chadwick, P. Giambiagi, T. Dimitrakos, and B. Roberts. Aspects of trusted and secure business-oriented vo management in service oriented architectures. In Seventh IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), pages 3--11, 2005. Google ScholarDigital Library
- J. F. Tang, B. Zhou, Z.-J. He, and U. Pompe. Adaptive workflow-oriented services composition and allocation in distributed environment. In Proceedings of the Third International Conference on Machine Leaming and Cybernetics, Shanghai, China, 26--29 August 2004.Google Scholar
- M. Witkowski, A. Aritikis, and J. Pitt. Experiments in building experiential trust in a society of objective-trust based agents. Trust in Cyber-society:integrating human and machine perspective, pages 111--132, 2000. Google ScholarDigital Library
- S. J. H. Yang, J. S. F. Hsieh, B. C. W. Lan, and J.-Y. Chung. Composition and evaluation of trustworthy web services. In BSN '05: Proceedings of the IEEE (EEE05) International workshop on Business services networks, pages 5--12, Hongkong, 2005. Google ScholarDigital Library
- L. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng. Quality driven web services composition. In Proceedings of the 12th international conference on World Wide Web, pages 411--421, Budapest, Hungary, 2003. Google ScholarDigital Library
- H.-J. Zimmermann. Fuzzy set theory: and its applications. Boaten: Kluwer Academic Publishers, 1996. Google ScholarDigital Library
Index Terms
- A fuzzy model for calculating workflow trust using provenance data
Recommendations
Using Explicit Control Processes in Distributed Workflows to Gather Provenance
Provenance and Annotation of Data and ProcessesDistributing workflow tasks among high performance environments involves local processing and remote execution on clusters and grids. This dis-tribution often needs interoperation between heterogeneous workflow definition languages and their ...
Mechanisms for provenance collection in scientific workflow systems
Scientific workflow management systems run scientific experiments. They manage sequences of complex process transformations and collect provenance information at various levels of abstraction. Collected provenance information from scientific experiments ...
Scientific Workflow Repeatability through Cloud-Aware Provenance
UCC '14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud ComputingThe transformations, analyses and interpretations of data in scientific workflows are vital for the repeatability and reliability of scientific workflows. This provenance of scientific workflows has been effectively carried out in Grid based scientific ...
Comments