User-centric trust and reputation model for personal and trusted service selection

Improving quality of services (QoS) through applying trust and reputation management technology is increasingly popular in the literature and industry. Most existing trust and reputation systems calculate a general trust value or vector based on the gathered feedback without regard to trust's l...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of intelligent systems Vol. 26; no. 8; pp. 687 - 717
Main Authors Yan, Su-Rong, Zheng, Xiao-Lin, Chen, De-Ren, Zhang, Wen-Yu
Format Journal Article
LanguageEnglish
Published Hoboken Wiley Subscription Services, Inc., A Wiley Company 01.08.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Improving quality of services (QoS) through applying trust and reputation management technology is increasingly popular in the literature and industry. Most existing trust and reputation systems calculate a general trust value or vector based on the gathered feedback without regard to trust's locality and subjectivity; therefore, they cannot effectively support a personal selection with consumer preferences. Our goal is to build a trust and reputation mechanism for facilitating a trustworthy and personal service selection in a service‐oriented Web, where service peers can act as a service provider and/or a service consumer. A user‐centric trust and reputation mechanism distinguishing the different trust context and content to enable a personal service selection with regard to trust preference in a service‐oriented Web is represented in detail. It is widely recognized that reputation‐based trust methods must face the challenge of malicious behaviors. To deal with the malicious feedback behaviors, we introduce a “bidirectional'' feedback mechanism based on QoS experience similarity in our trust and reputation framework. The test run demonstrates that our method can significantly increase the success rate of service transactions and is effective in resisting various malicious behaviors of service peers, when it is compared to other similar methods. © 2011 Wiley Periodicals, Inc.
Bibliography:istex:6BBFDC6A1B887ACAA9FB51F3DD2F9D83D2BBE904
ArticleID:INT20488
ark:/67375/WNG-L226HNNM-P
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0884-8173
1098-111X
1098-111X
DOI:10.1002/int.20488