Evaluating Workflow Trust using Hidden Markov Modeling and Provenance Data

نویسندگان

  • Mahsa Naseri
  • Simone A. Ludwig
چکیده

In service-oriented environments, services provide different qualities in terms of parameters like availability, cost, reputation, execution time, etc. A trust score can be derived from these QoS parameters, which determines the rate of reliability in each service. This score can assist the service consumer parties to decide whether or not to transact with that service provider in the future. In such distributed environments, services with different functionalities are combined together to define new services or provide higher level functionalities. Having a trust score for each service, the trust level of a combination of services, i.e. a workflow, can be determined. Assessing the trust value of a workflow helps to determine its rate of reliability. Therefore, the trustworthiness of the results of a workflow will be inferred to decide whether the workflow’s trust rate should be improved. The improvement can be done by replacing services with low trust levels with services with higher trust levels. In this paper, we provide a new approach for evaluating workflow trust based on the Hidden Markov Model (HMM). We first present how the workflow trust evaluation can be modelled as a HMM and provide information on how the model and its associated probabilities can be assessed. Then, we investigate the behaviour of our model by relaxing the stationary assumption of HMM and present another model based on non-stationary hidden Markov models. We compare the results of the two models and present our conclusions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust and Risk Relationship Analysis on a Workflow Basis: a Use Case

Trust and risk are often seen in proportion to each other; as such high trust may induce low risk and vise versa. However, recent research argues that trust and risk relationship is implicit rather than proportional. Considering that trust and risk are implicit, this paper proposes for the first time a novel approach to view trust and risk on a basis of a provenance data model (W3C PROV) applie...

متن کامل

Big Data Provenance: Challenges and Implications for Benchmarking

Data Provenance is information about the origin and creation process of data. Such information is useful for debugging data and transformations, auditing, evaluating the quality of and trust in data, modelling authenticity, and implementing access control for derived data. Provenance has been studied by the database, workflow, and distributed systems communities, but provenance for Big Data whi...

متن کامل

How Much Domain Data Should Be in Provenance Databases?

Provenance databases are an important asset in data analytics of large-scale scientific data. The data derivation path allows for identifying parameters, files and domain data values of interest. In scientific workflows, provenance data is automatically captured by workflow systems. However, the power of provenance data analyses depends on the expressiveness of domain-specific data along the pr...

متن کامل

What-if Analysis in Wireless Sensor Networks Using Workflow Provenance

Over the time sensor network readings become large datasets. A user reading the sensed data will not totally comprehend the readings without learning the path taken and understanding the dataset. As this is an accepted fact, the idea of including the provenance data while publishing sensor readings has been around for many years. First, the readings were annotated with data provenance such as r...

متن کامل

Modeling Context Aware Dynamic Trust Using Hidden Markov Model

Modeling trust in complex dynamic environments is an important yet challenging issue since an intelligent agent may strategically change its behavior to maximize its profits. In this paper, we propose a context aware trust model to predict dynamic trust by using a Hidden Markov Model (HMM) to model an agent’s interactions. Although HMMs have already been applied in the past to model an agent’s ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009