Volume 4, Issue 1, February 2015, Page: 8-15
Research on Service Reputation Evaluation Method Based on Cloud Model
Tingwei Chen, College of Information, Liaoning University, Shenyang, Liaoning, China
Jing Lei, College of Information, Liaoning University, Shenyang, Liaoning, China
Received: Nov. 17, 2014;       Accepted: Jan. 15, 2015;       Published: Jan. 27, 2015
DOI: 10.11648/j.ijiis.20150401.12      View  2563      Downloads  191
Abstract
With the increasingly evident advantages of service-oriented software architecture, Web service received widespread attention, and the numbers of Web Services are increasing constantly. It is more difficult to select high-quality Web service that meets user requirements. Because traditional service reputation evaluation approaches cannot ensure the authenticity and reliability of user ratings, this paper proposes a cloud-based reputation evaluation approach for assessing the history behavior of service consumers, and also takes into account the rating similarity to generate rating quality cloud. With the parameters of cloud model, we can measure the quality level and stability of rankings, which provide additional evidence for trust decision-making. The result of simulating experiments shows that the proposed approach can improve the accuracy of reputation evaluation and the quality of Web service selection, and defend against malicious attacks, so that the interests of service requesters and service providers can be protected.
Keywords
Web Services, Trust Model, Cloud Theory, Recommendation Trust
To cite this article
Tingwei Chen, Jing Lei, Research on Service Reputation Evaluation Method Based on Cloud Model, International Journal of Intelligent Information Systems. Vol. 4, No. 1, 2015, pp. 8-15. doi: 10.11648/j.ijiis.20150401.12
Reference
[1]
Min Luo, Mark Endrei, et al. Patterns: Service-Oriented Architecture and Web Services. International Technical Support Organization,Raleigh Center
[2]
Fu Xiao-Dong, ZOU Ping, JIANG Ying. Web Service Reputation Measurement Based on Quality of Service Similarity. Computer Integrated Manufacturing Systems, Vol.14, No.3, March 2008, pp.0619-0624.
[3]
Hien Trang Nguyen, Weiling Zhao, Jian Yang. A Trust and Reputation Model Based on Bayesian Network for Web Services[C] IEEE International Conference on Web Services,2010, pp.251-258
[4]
Sun Qiu-Jing, Zeng Ping-Fan. Trust Model Based on Reputation and Cloud Model in P2P Environment. Journal of Chinese Computer Systems, Vol.31, No.7, July 2010, pp.1328-1332.
[5]
Billhardt H, Hermoso R, Ossowski S, Centeno R. Trust-Based Service Provider Selection in Open Environments. In: Proc. of the22nd Annual ACM Symp. on Applied Computing. New York: ACM Press, 2007, pp. 1375-1380.
[6]
Li DY, Du Y. Artificial Intelligence with Uncertainty. Beijing: National Defense Industry Press, 2005 (in Chinese).
[7]
Claypool M et al. Implicit interest indicators[C]. In: Proceedings of ACM Intelligent User Interfaces Conference (IUI) , Santa Fe, New Mexico, ACM, 2001.
[8]
Liu Xue-yi. Delphi Technique in the Assessment of Interdisciplinary Research. JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY, vol. 8, No. 2, 2007.
[9]
Li Zhen, Yang Fang-Chun, Su Sen. Fuzzy Multi-Attribute Decision Making-Based Algorithm for Semantic Web Service Composition, Journal of Software, Vol.20, No.3, March 2009.
[10]
Sun Ping, Jiang Chang-Jun. Using Service Clustering to Facilitate Process-Oriented Semantic Web Service Discovery. CHINESE JOURNAL OF COMPUTERS, Vol18, No.8, Aug. 2008
[11]
Li Xiong, Liu Ling. Peer Trust supporting reputation-based trust for peer-to-peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7), pp.843-857.
[12]
Li DY, Meng HJ, Shi XM. Membership cloud and membership cloud generator. Journal of Computer Research and Development, 1995, 32(6), pp.16-21 (in Chinese with English abstract).
[13]
Wang Shang-Guang, Sun Qi-Bo, Yang Fang-Chang. Reputation Evaluation Approach in Web Service Selection. Journal of Software, 2012, 23(6), pp.1350-1367.
[14]
Beth T, Borcherding M, Klein B. Valuation of Trust in OpenNetwork[C]//Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994, pp. 3-18.
Browse journals by subject