Skip to main content
Top
Published in: Service Oriented Computing and Applications 2/2015

01-06-2015 | Original Research Paper

A quality model for social networks populated with web services

Authors: Noura Faci, Marinella Petrocchi, Gianpiero Costantino, Fabio Martinelli, Zakaria Maamar

Published in: Service Oriented Computing and Applications | Issue 2/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents the development and evaluation of a \(\mathcal {Q}\)o\(\mathcal {SN}\) (standing for \(\mathcal {Q}\)uality of \(\mathcal {S}\)ocial \(\mathcal {N}\)etwork) model for social networks populated with Web services. These Web services are given the opportunity to select the networks in which they would like to sign in taking into account their concerns (in fact their providers’ concerns) like better protection to their details and better exposure to potential users. To support Web services selection, the \(\mathcal {Q}\)o\(\mathcal {SN}\) model is built upon four criteria including robustness, trust, fairness, and traceability. The computation of these criteria uses a cryptographic technique known as secure multi-party computation. Different experiments showing how the networks react to Web services’ actions (e.g., attack, join, and kick out) are also presented in the paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Quality of Service (QoS) is adopted in other disciplines like networking and uses non-functional properties like response time, reliability level, and latency.
 
2
It is worth noticing that robustness was called privacy in [17]. In this paper, we rename it to avoid overlap with the privacy property that SMC guarantees (Sect. 4).
 
3
Repetitive and considerable gaps between a Web service announced-QoS and effective-QoS might indicate performance degradation and inability of delivering the announced QoS [25].
 
5
FairPlay allows to write secure functions that deal with integers, only. Thus, in the implementation, we round each ratio to an integer. In particular, each decimal number is multiplied by 10, and then rounded to the next integer, if bigger or equal to .5 (otherwise, to the previous one).
 
6
Despite the division is performed out of the SMC-function, inputs of all SWSs are kept preserved by the function 1.
 
7
It is worth noticing that comparisons between a threshold value and the actual attackRatio of SWSs may be done by an appropriate use of secure two-party computation.
 
8
A confidence interval gives an estimated range of values which is likely to include an unknown population parameter, the estimated range being calculated from a given set of sample data (http://​www.​stat.​yale.​edu/​Courses/​1997-98/​101/​confint.​htm).
 
Literature
1.
go back to reference Al-Sharawneh J, Williams M-A (2009) A social network approach in semantic web services selection using follow the leader behavior. In: Proceedings of the 13th enterprise distributed object computing conference workshops (EDOCW’2009), Auckland, New Zealand Al-Sharawneh J, Williams M-A (2009) A social network approach in semantic web services selection using follow the leader behavior. In: Proceedings of the 13th enterprise distributed object computing conference workshops (EDOCW’2009), Auckland, New Zealand
2.
go back to reference Audun J, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRef Audun J, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRef
3.
go back to reference Badr Y, Maamar Z (2009) Can enterprises capitalize on their social networks? Cutter IT J 22(10):10–14 Badr Y, Maamar Z (2009) Can enterprises capitalize on their social networks? Cutter IT J 22(10):10–14
4.
go back to reference Bansal S, Bansal A, Blake MB (2010) Trust-based dynamic web service composition using social network analysis. In: Proceedings of the international workshop on business applications for social network analysis (BASNA’2010) held in conjunction with the fourth international conference on internet multimedia systems architecture and applications (IMSAA’2010), Bangalore, India Bansal S, Bansal A, Blake MB (2010) Trust-based dynamic web service composition using social network analysis. In: Proceedings of the international workshop on business applications for social network analysis (BASNA’2010) held in conjunction with the fourth international conference on internet multimedia systems architecture and applications (IMSAA’2010), Bangalore, India
5.
go back to reference Beaver D, Micali S, Rogaway P (1990) The round complexity of secure protocols. In: Proceedings of the twenty-second annual ACM symposium on theory of computing (STOC’1990), Baltimore, MD, USA Beaver D, Micali S, Rogaway P (1990) The round complexity of secure protocols. In: Proceedings of the twenty-second annual ACM symposium on theory of computing (STOC’1990), Baltimore, MD, USA
6.
go back to reference Ben-David A, Nisan N, Pinkas B (2008) FairplayMP: A system for secure multi-party computation. In: Proceedings of the 15th ACM conference on computer and communications security (CCS’2008), New York, NY, USA Ben-David A, Nisan N, Pinkas B (2008) FairplayMP: A system for secure multi-party computation. In: Proceedings of the 15th ACM conference on computer and communications security (CCS’2008), New York, NY, USA
7.
go back to reference Bistarelli S, Foley SN, O’Sullivan B, Santini F (2010) Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Secur Commun Netw 3(6):595–610CrossRef Bistarelli S, Foley SN, O’Sullivan B, Santini F (2010) Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Secur Commun Netw 3(6):595–610CrossRef
8.
go back to reference Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen TP, Krøigaard M, Dam Nielsen J, Buus Nielsen J, Nielsen K, Pagter J, Schwartzbach MII, Toft T (2009) Secure multiparty computation goes live. In: Proceedings of 13th international conference on financial cryptography and data security (FC’2009), Accra Beach, Barbados Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen TP, Krøigaard M, Dam Nielsen J, Buus Nielsen J, Nielsen K, Pagter J, Schwartzbach MII, Toft T (2009) Secure multiparty computation goes live. In: Proceedings of 13th international conference on financial cryptography and data security (FC’2009), Accra Beach, Barbados
9.
go back to reference Bruno G, Dengler F, Jennings B, Khalaf R, Nurcan S, Prilla M, Sarini M, Schmidt R, Silva R (2010) Key challenges for enabling agile BPM with social software. J Softw Maint Evol Res Pract 22(6–7):297–326 Bruno G, Dengler F, Jennings B, Khalaf R, Nurcan S, Prilla M, Sarini M, Schmidt R, Silva R (2010) Key challenges for enabling agile BPM with social software. J Softw Maint Evol Res Pract 22(6–7):297–326
10.
go back to reference Chen W, Paik I (2012) Improving efficiency of service discovery using linked data-based service publication. Inf Syst Front Spinger (forthcoming) Chen W, Paik I (2012) Improving efficiency of service discovery using linked data-based service publication. Inf Syst Front Spinger (forthcoming)
12.
go back to reference Elnaffar S, Maamar Z, Sheng QZ (April-June 2013) When clouds start socializing: the sky model. Int J E-Bus Res IGI Global Pub 9(2):1–7 Elnaffar S, Maamar Z, Sheng QZ (April-June 2013) When clouds start socializing: the sky model. Int J E-Bus Res IGI Global Pub 9(2):1–7
13.
go back to reference Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the nineteenth annual ACM symposium on theory of computing, STOC ’87 Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the nineteenth annual ACM symposium on theory of computing, STOC ’87
14.
go back to reference Maamar Z, Faci N, Boukadi K, Sheng QZ, Yao L (2014) Commitments to regulate social web services operation. IEEE Trans Serv Comput (forthcoming) Maamar Z, Faci N, Boukadi K, Sheng QZ, Yao L (2014) Commitments to regulate social web services operation. IEEE Trans Serv Comput (forthcoming)
15.
go back to reference Maamar Z, Faci N, Krug Wives L, Badr Y, Bispo Santos P, de Oliveira Palazzo MJ (2011) Using social networks to web services discovery. IEEE Internet Comput 15(4):48–54 Maamar Z, Faci N, Krug Wives L, Badr Y, Bispo Santos P, de Oliveira Palazzo MJ (2011) Using social networks to web services discovery. IEEE Internet Comput 15(4):48–54
16.
go back to reference Maamar Z, Faci N, Krug Wives L, Yahyaoui H, Hacid H (2011) Towards a method for engineering social web services. In: Proceedings of the IFIP WG8.1 working conference on method engineering (ME’2011), Paris, France Maamar Z, Faci N, Krug Wives L, Yahyaoui H, Hacid H (2011) Towards a method for engineering social web services. In: Proceedings of the IFIP WG8.1 working conference on method engineering (ME’2011), Paris, France
17.
go back to reference Maamar Z, Faci N, Loo A, Ghodous P (2012) Towards a quality of social network (QoSN) model in the context of social web services. In: The proceedings of the 3rd international conference of exploring services science (IESS’2012), Geneva, Switzerland Maamar Z, Faci N, Loo A, Ghodous P (2012) Towards a quality of social network (QoSN) model in the context of social web services. In: The proceedings of the 3rd international conference of exploring services science (IESS’2012), Geneva, Switzerland
18.
go back to reference Maamar Z, Faci N, Luck M, Hachimi S (2012) Specifying and implementing social web services operation using commitments. In: The proceedings of the 27th annual ACM symposium on applied computing (SAC’2012), Riva del Garda, Trento, Italy Maamar Z, Faci N, Luck M, Hachimi S (2012) Specifying and implementing social web services operation using commitments. In: The proceedings of the 27th annual ACM symposium on applied computing (SAC’2012), Riva del Garda, Trento, Italy
19.
go back to reference Maamar Z, Faci N, Sheng QZ, Yao L (2012) Towards a user-centric social approach to web services composition, execution, and monitoring. In: Proceedings of the 13th international conference on web information system engineering (WISE’2012), Paphos, Cyprus Maamar Z, Faci N, Sheng QZ, Yao L (2012) Towards a user-centric social approach to web services composition, execution, and monitoring. In: Proceedings of the 13th international conference on web information system engineering (WISE’2012), Paphos, Cyprus
20.
go back to reference Maamar Z, Hacid H, Hunhs MN (2011) Why web services need social networks. IEEE Internet Comput 15(2):90–94 Maamar Z, Hacid H, Hunhs MN (2011) Why web services need social networks. IEEE Internet Comput 15(2):90–94
21.
go back to reference Maamar Z, Krug Wives L, Badr Y, Elnaffar S, Boukadi K, Faci N (2011) LinkedWS: A novel web services discovery model based on the metaphor of “Social Networks”. Simul Model Pract Theory 19(10):121–132 Maamar Z, Krug Wives L, Badr Y, Elnaffar S, Boukadi K, Faci N (2011) LinkedWS: A novel web services discovery model based on the metaphor of “Social Networks”. Simul Model Pract Theory 19(10):121–132
22.
go back to reference Maamar Z, Yahyaoui H, Lim E, Thiran P (2011) Social Engineering of Communities of Web Services. In: Proceedings of the 11th annual international symposium on applications and the internet (SAINT’2011), Munich, Germany Maamar Z, Yahyaoui H, Lim E, Thiran P (2011) Social Engineering of Communities of Web Services. In: Proceedings of the 11th annual international symposium on applications and the internet (SAINT’2011), Munich, Germany
23.
go back to reference Maaradji A, Hacid H, Daigremont J, Crespi N (2010) Towards a Social Network Based Approach for Services Composition. In: Proceedings of the 2010 IEEE international conference on communications (ICC’2010), Cap Town, South Africa Maaradji A, Hacid H, Daigremont J, Crespi N (2010) Towards a Social Network Based Approach for Services Composition. In: Proceedings of the 2010 IEEE international conference on communications (ICC’2010), Cap Town, South Africa
24.
go back to reference Malkhi D, Nisan N, Pinkas B, Sella Y (2004) Fairplay: a secure two-party computation system. In: Proceedings of the 13th conference on USENIX security symposium (SSYM’2004), Berkeley, CA, USA Malkhi D, Nisan N, Pinkas B, Sella Y (2004) Fairplay: a secure two-party computation system. In: Proceedings of the 13th conference on USENIX security symposium (SSYM’2004), Berkeley, CA, USA
25.
go back to reference Medjahed B, Rezgui A, Bouguettaya A, Ouzzani M (2003) Infrastructure for e-government web services. IEEE Internet Comput 7(1):58–65CrossRef Medjahed B, Rezgui A, Bouguettaya A, Ouzzani M (2003) Infrastructure for e-government web services. IEEE Internet Comput 7(1):58–65CrossRef
26.
go back to reference Nam Ko M, Cheek GP, Shehab M, Sandhu R (2010) Social-networks connect services. IEEE Comput 43(8):37–43 Nam Ko M, Cheek GP, Shehab M, Sandhu R (2010) Social-networks connect services. IEEE Comput 43(8):37–43
27.
go back to reference Orlandi C (2011) Is multiparty computation any good in practice? In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’2011), Prague, Czech Republic Orlandi C (2011) Is multiparty computation any good in practice? In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’2011), Prague, Czech Republic
28.
go back to reference Papadimitriou P, Garcia-Molina H (2011) Data leakage detection. IEEE Trans Knowl Data Eng 23(1):51–63 Papadimitriou P, Garcia-Molina H (2011) Data leakage detection. IEEE Trans Knowl Data Eng 23(1):51–63
29.
go back to reference Pinkas B, Schneider T, Smart NP, Williams SC (2009) Secure two-party computation is practical. In: Proceedings of the 15th international conference on the theory and application of cryptology and information security: advances in cryptology (ASIACRYPT’2009), Tokyo, December Pinkas B, Schneider T, Smart NP, Williams SC (2009) Secure two-party computation is practical. In: Proceedings of the 15th international conference on the theory and application of cryptology and information security: advances in cryptology (ASIACRYPT’2009), Tokyo, December
30.
go back to reference Rubin S, Jha S, Miller BP (2004) Automatic generation and analysis of NIDS attacks. In: Proceedings of the 20th annual computer security applications conference (ACSAC’2004), Tucson, Arizona, USA Rubin S, Jha S, Miller BP (2004) Automatic generation and analysis of NIDS attacks. In: Proceedings of the 20th annual computer security applications conference (ACSAC’2004), Tucson, Arizona, USA
31.
go back to reference Schmidt R, Nurcan S (2008) BPM and Social Software. In: Proceedings of the first workshop on business process management and social software (BPMS2’2008), Milan, Italy Schmidt R, Nurcan S (2008) BPM and Social Software. In: Proceedings of the first workshop on business process management and social software (BPMS2’2008), Milan, Italy
32.
go back to reference Wu Q, Iyengar A, Subramanian R, Rouvellou I, Silva-Lepe I, Mikalsen T (2009) Combining quality of service and social information for ranking services. In: Proceedings of ServiceWave 2009 workshops held in conjunction with the 7th international conference on service service-oriented computing (ICSOC’2009), Stockholm, Sweden Wu Q, Iyengar A, Subramanian R, Rouvellou I, Silva-Lepe I, Mikalsen T (2009) Combining quality of service and social information for ranking services. In: Proceedings of ServiceWave 2009 workshops held in conjunction with the 7th international conference on service service-oriented computing (ICSOC’2009), Stockholm, Sweden
33.
go back to reference Xie X, Du B, Zhang Z (2008) Semantic service composition based on social network. In: Proceedings of the 17th international world wide web conference (WWW’2008), Beijing, China Xie X, Du B, Zhang Z (2008) Semantic service composition based on social network. In: Proceedings of the 17th international world wide web conference (WWW’2008), Beijing, China
34.
go back to reference Yao AC-C (1986), How to generate and exchange secrets. In: Proceedings of the 27th annual symposium on foundations of computer, science (SFCS’1986), October 1986 Yao AC-C (1986), How to generate and exchange secrets. In: Proceedings of the 27th annual symposium on foundations of computer, science (SFCS’1986), October 1986
Metadata
Title
A quality model for social networks populated with web services
Authors
Noura Faci
Marinella Petrocchi
Gianpiero Costantino
Fabio Martinelli
Zakaria Maamar
Publication date
01-06-2015
Publisher
Springer London
Published in
Service Oriented Computing and Applications / Issue 2/2015
Print ISSN: 1863-2386
Electronic ISSN: 1863-2394
DOI
https://doi.org/10.1007/s11761-014-0156-8

Other articles of this Issue 2/2015

Service Oriented Computing and Applications 2/2015 Go to the issue

Premium Partner