skip to main content
10.1145/1341811.1341823acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesmardi-grasConference Proceedingsconference-collections
research-article

A fuzzy model for calculating workflow trust using provenance data

Published:29 January 2008Publication History

ABSTRACT

Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible to distinguish between an "abstract" workflow description - outlining which services must be involved in a workflow execution - and a "physical" workflow description - outlining the particular instance of services that were used in a particular enactment. Provenance information provides a useful way to capture the physical workflow description automatically, especially if this information is captured in a standard format. Subsequent analysis of this provenance information may be used to evaluate whether the abstract workflow description has been adhered to, and to enable a user executing a workflow-based application to establish "trust" in the outcome; trust, in this context, is an abstract mathematical construct that can be computed using provenance information. Performing analysis on such provenance information, we propose a fuzzy model for calculating trust based on an enacted workflow.

References

  1. P. Cingolani. jfuzzylogic: Open source fuzzy logic. available at: http://jfuzzylogic.sourceforge.net/html/index.html. last accessed: October 2007.Google ScholarGoogle Scholar
  2. P. Cingolani. Open modeller project. available at: http://openmodeller.sourceforge.net/. last accessed: October 2007.Google ScholarGoogle Scholar
  3. E. Cox. Fuzzy fundamentals. Spectrum, IEEE, 29(10):58--61, 1992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Eichfeld, M. Klimke, M. Menke, J. Nolles, and T. Kunemund. A general-purpose fuzzy inference processor. In Proceedings of the Fourth International Conference on Microelectronics for Neural Networks and Fuzzy Systems, pages 310--317, Turin, Italy, September 1994.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Gaeta, G. Laria, P. Ritrovato, N. Romano, B. Serhan, S. Wesner, T. Dimitrakos, and D. M. Randal. Trust, security, and contract management challenges for grid-based application service provision. In Trust Management: Second International Conference (iTrust 2004), pages 362--368, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. P. Groth, S. Jiang, S. Miles, S. Munroe, V. Tan, S. Tsasakou, and L. Moreau. An architecture for provenance systems. Technical report, University of Southampton, February 2006.Google ScholarGoogle Scholar
  7. P. Groth, M. Luck, and L. Moreau. A protocol for recording provenance in service-oriented grids. In Proceedings of the 8th International Conference on Principles of Distributed Systems (OPODIS'04), Grenoble, France, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Jones, R. White, N. Pittas, W. Gray, T. Sutton, X. Xu, O. Bromley, N. Caithness, F. Bisby, N. Fiddian, M. Scoble, A. Culham, and P. Williams. BiodiversityWorld: An architecture for an extensible virtual laboratory for analysing biodiversity patterns. In UK e-Science All Hands Meeting, EPSRC, pages 759--765, Nottingham, UK, september 2003.Google ScholarGoogle Scholar
  9. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in p2p networks. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. W. Liu. Trustworthy service selection and composition - reducing the entropy of service-oriented web. In 3rd IEEE International Conference on Industrial Informatics (INDIN).Google ScholarGoogle Scholar
  11. L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Stanford Digital Library Technologies Project, 1998.Google ScholarGoogle Scholar
  12. S. Rajbhandari, A. Contes, O. Rana, V. Deora, and I. Wootten. Trust assessment using provenance in service oriented application. In The Tenth IEEE International EDOC Conference (EDOC 2006), First International Workshop on Service Intelligence and Service Science (SISS 2006), Hongkong, October 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Rajbhandari, I. Wootten, A. S. Ali, and O. Rana. Evaluating provenance-based trust for scientific workflows. In Sixth IEEE International Symposium on Cluster Computation and the Grid(CCGrid06), pages 365--372, Singapore, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Sabater and C. Sierra. REGRET: a reputation model for gregarious societies. In Proceedings of the Fifth International Conference on Autonomous Agents, pages 194--195, Montreal, Canada, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. P. Singh. Trustworthy service composition: Challenges and research questions. In Proceedings of the Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Svirskas, M. D. Wilson, A. E. Arenas, E. C. Lupu, N. Tuptuk, D. Chadwick, P. Giambiagi, T. Dimitrakos, and B. Roberts. Aspects of trusted and secure business-oriented vo management in service oriented architectures. In Seventh IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), pages 3--11, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. F. Tang, B. Zhou, Z.-J. He, and U. Pompe. Adaptive workflow-oriented services composition and allocation in distributed environment. In Proceedings of the Third International Conference on Machine Leaming and Cybernetics, Shanghai, China, 26--29 August 2004.Google ScholarGoogle Scholar
  18. M. Witkowski, A. Aritikis, and J. Pitt. Experiments in building experiential trust in a society of objective-trust based agents. Trust in Cyber-society:integrating human and machine perspective, pages 111--132, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. J. H. Yang, J. S. F. Hsieh, B. C. W. Lan, and J.-Y. Chung. Composition and evaluation of trustworthy web services. In BSN '05: Proceedings of the IEEE (EEE05) International workshop on Business services networks, pages 5--12, Hongkong, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng. Quality driven web services composition. In Proceedings of the 12th international conference on World Wide Web, pages 411--421, Budapest, Hungary, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H.-J. Zimmermann. Fuzzy set theory: and its applications. Boaten: Kluwer Academic Publishers, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A fuzzy model for calculating workflow trust using provenance data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MG '08: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
      January 2008
      178 pages
      ISBN:9781595938350
      DOI:10.1145/1341811

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 January 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader