Open Access   Article Go Back

Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model

G. Raj1 , M. Mahajan2 , D. Singh3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1556-1566, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.15561566

Online published on Jun 30, 2018

Copyright © G. Raj, M. Mahajan, D. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Raj, M. Mahajan, D. Singh, “Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1556-1566, 2018.

MLA Style Citation: G. Raj, M. Mahajan, D. Singh "Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model." International Journal of Computer Sciences and Engineering 6.6 (2018): 1556-1566.

APA Style Citation: G. Raj, M. Mahajan, D. Singh, (2018). Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model. International Journal of Computer Sciences and Engineering, 6(6), 1556-1566.

BibTex Style Citation:
@article{Raj_2018,
author = {G. Raj, M. Mahajan, D. Singh},
title = {Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1556-1566},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2383},
doi = {https://doi.org/10.26438/ijcse/v6i6.15561566}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.15561566}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2383
TI - Trust Management in Web Services for Prediction and Selection based on Trust Evaluation Model
T2 - International Journal of Computer Sciences and Engineering
AU - G. Raj, M. Mahajan, D. Singh
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1556-1566
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
638 233 downloads 227 downloads
  
  
           

Abstract

Trust, usually deal as a collaborative term for security and reliability, is also known as base parameter for defining quality of services (web services , cloud services) in cloud based environment in current research trends. In the early service communications, quality of web service was published by service provider which may be unreliable and not credible. For better verification, trust , a more refine parameters is calculated for predicting quality over all possible parameters defined in QWS dataset for evaluating trust of clustered web services. Here, We propose a Trust Management System, in which We implement security and trust policies using WS-Security and WS-Trust. Also, we had included Trust Evaluation Model (TEM) to evaluate the upcoming request /response on cloud based web server and calculate trust values. using evidence and Dempster - Shefer (D-S) rules which will help in updating the QWS dataset in clustered view of trusted web services of similar type of application.

Key-Words / Index Term

(D-S) rules, respective trust values, Cloud Trust, WS-Security; WS- Trust

References

[1] Gaurav Raj, Muhammad Sarfaraz, "Survey on Trust establishment in Cloud computing”, Confluence- The Next Generation Information Technology Summit, Amity University, Noida, 25-26 Sept. 2014, IEEE
[2] Weiliang Zhao, Vijay Varadharajan, "Trust Management for Web Services", IEEE International Conference on Web Services, (pp.818-821),Beijing, (2008).
[3] Ayesha Kanwal. , Rahat Masood. and Muhammad Awais Shibli., “Evaluation and Establishment of Trust in Cloud Federation”, 8th International Conference on Ubiquitous Information Management and Communication, Article No. 12, pp. 1-5, 2014, ISBN: 978-1-4503-2644-5 doi>10.1145/2557977.2558023
[4] Xiaonian Wu, Runlian Zhang, Bing Zeng, Shengyuan Zhou, "A Trust Evaluation Model for Cloud Computing " Elsevier Procedia Computer Science, Information Technology and Quantitative Management, Science Direct, Volume 17, 2013, Pages 1170-1177
[5] E. Chang, T. Dillon, F. K. Hussain"Trust and Reputation for Service-Oriented Environments", Wiley, 2006.
[6] Tyrone Grandison and Morris Sloman, "A Survey of Trust in Internet Application", IEEE Communications Surveys and Tutorials, Fourth Quarter 2000.
[7] R.Joseph Manoj and Dr.A.Chandrasekar, "A Literature Review on Trust Management in Web Services Access Control", "International Journal on Web Service Computing", Vol.4, No.3, September 2013
[8] M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management", IEEE Symposium on Security and Privacy, 1996. Proceedings, ISSN: 1081-6011, Oakland, CA, USA, USA , 1996.
[9] Rich Mogull, J. Arlen, F. Gilbert, A. Lane, D. Mortman, G. Peterson, M. Rothman, “Security Guidance for Critical Areas of Focus in Cloud Computing”, Security Guidance v4.0 © Copyright 2017, Cloud Security Alliance.
[10] National Institute of Standard and Technology, “NIST Cloud Computing Standards Roadmap, NIST Special Publication 500-291,Version 2, (Supersedes Version 1.0, July 2011)" , NIST Cloud Computing Standards Roadmap Working Group , July 2013
[11] Ahmed Taha, Salman Manzoor, Neeraj Suri, "SLA-Based Service Selection for Multi-Cloud Environments", Edge Computing (EDGE) 2017 IEEE International Conference on, pp. 65-72, 2017.
[12] Loubna Mekouar, Youssef Iraqi, "TrustWS: A Trust Management System forWeb Services", Conference: International Symposium on Web Services, At Dubai, UAE, 2010
[13] Jagpreet Sidhu, Sarbjeet Singh, "Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers", Journal of Grid Computing, pp. , 2017, ISSN 1570-7873.
[14] Mohammad Mehedi Hassan, Mohammad Abdullah-Al-Wadud, Ahmad Almogren, SK Md. Mizanur Rahman, Abdulhameed Alelaiwi, Atif Alamri, Md. Abdul Hamid, "QoS and trust-aware coalition formation game in data-intensive cloud federations", Concurrency and Computation: Practice and Experience, pp. n/a, 2015, ISSN 15320626.
[15] Talal H, Quan Z. “Trust as a Service: A Framework for Trust Management in Cloud Environments”, ACM 12th international conference on Web information system engineering, pp. 314–321, 2011.
[16] M. D. Priya, A. Lavanya, "Intrusion Detection System Using Raspberry Pi Honeypot in Network Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 41-45, January-February 2018.
[17] E. Manigandan, C. Kalaiarasi, E. Manigandan, Prof. C. Kalaiarasi, "Cryptography in Cloud Computing : A Basic Approach to confirm Security in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 3, pp. 58-63, January-February 2018.