Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2021

10-06-2021

NTSC: a novel trust-based service computing scheme in social internet of things

Authors: Ting Li, Guosheng Huang, Shaobo Zhang, Zhiwen Zeng

Published in: Peer-to-Peer Networking and Applications | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, data-based services have played a significant role in satisfying various of requirements of people in social IoT. Since data is the basis of data-based service, therefore, it is significant to obtain trust data to enhance trust services. Few researches optimized trust issue of services from this point of view before. Therefore, based on this domain, this paper proposes a novel service computing framework to fundamentally form trust-based services via trust-based data in the social IoT, which mainly consists of two schemes. Data trustworthy is relevant to trustworthy of data providers in the social networks, therefore, we propose a trust evaluation scheme to compute trustworthy for data providers with assistance of trusted static sensor devices in edge computing, that comprehensively computes trustworthy by considering both temporal and quality factors. This process ensures to generate trust services from data source. Then, to improve precision of service evaluation in the updating process, a trust-based service evaluation scheme is proposed to compute service evaluation by fully considering trustworthy of users, which consists of two evaluation phases, local and global evaluation respectively. Finally, extensive experiment is conducted to validate efficiencies of the proposed scheme. Compared to traditional scheme, data trustworthiness can be improved by 26.4% and thus service trustworthy is improved by 26.4% accordingly. The precision of service evaluation is improved by 20.79%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stergiou CL, Psannis KE, Gupta BB (2020) IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J 8(7):5164–5171CrossRef Stergiou CL, Psannis KE, Gupta BB (2020) IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J 8(7):5164–5171CrossRef
2.
go back to reference Gurini DF, Gasparetti F, Micarelli A, Sansonetti G (2018) Temporal people-to-people recommendation on social networks with sentiment-based matrix factorization. Futur Gener Comput Syst 78:430–439CrossRef Gurini DF, Gasparetti F, Micarelli A, Sansonetti G (2018) Temporal people-to-people recommendation on social networks with sentiment-based matrix factorization. Futur Gener Comput Syst 78:430–439CrossRef
3.
go back to reference Li T, Zhao M, Wong KKL (2020) Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. Comput Commun 152:109–118CrossRef Li T, Zhao M, Wong KKL (2020) Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. Comput Commun 152:109–118CrossRef
4.
go back to reference Huang S, Zeng Z, Ota K, Dong M, Wang T, Xiong N (2021) An intelligent collaboration trust interconnections system for Mobile information control in ubiquitous 5G networks. IEEE Trans Netw Sci Eng 8(1):347–365MathSciNetCrossRef Huang S, Zeng Z, Ota K, Dong M, Wang T, Xiong N (2021) An intelligent collaboration trust interconnections system for Mobile information control in ubiquitous 5G networks. IEEE Trans Netw Sci Eng 8(1):347–365MathSciNetCrossRef
7.
go back to reference Boukerche A, Robson E (2018) Vehicular cloud computing: architectures, applications, and mobility. Comput Netw 135:171–189CrossRef Boukerche A, Robson E (2018) Vehicular cloud computing: architectures, applications, and mobility. Comput Netw 135:171–189CrossRef
8.
go back to reference Kapetanakis S, Polatidis N, Alshammari G, Petridis M (2020) A novel recommendation method based on general matrix factorization and artificial neural networks. Neural Comput & Applic 32(16):12327–12334CrossRef Kapetanakis S, Polatidis N, Alshammari G, Petridis M (2020) A novel recommendation method based on general matrix factorization and artificial neural networks. Neural Comput & Applic 32(16):12327–12334CrossRef
9.
go back to reference Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef
10.
go back to reference Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58(2):102468CrossRef Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58(2):102468CrossRef
11.
go back to reference Li T, Liu A, Xiong NN, Zhang S, Wang T (2021) A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems. Inf Sci 545:65–81MathSciNetCrossRef Li T, Liu A, Xiong NN, Zhang S, Wang T (2021) A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems. Inf Sci 545:65–81MathSciNetCrossRef
12.
go back to reference Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef
13.
go back to reference Shen M, Liu A, Huang G, Xiong NN, Lu H (2021) ATTDC: an active and trace-able trust data collection scheme for industrial security in smart cities. IEEE Internet Things J 8(8):6437–6453CrossRef Shen M, Liu A, Huang G, Xiong NN, Lu H (2021) ATTDC: an active and trace-able trust data collection scheme for industrial security in smart cities. IEEE Internet Things J 8(8):6437–6453CrossRef
14.
go back to reference He Y, Yu FR, Wei Z, Leung V (2019) Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Netw 86:154–165CrossRef He Y, Yu FR, Wei Z, Leung V (2019) Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Netw 86:154–165CrossRef
15.
go back to reference Kaur H, Kumar N, Batra S (2018) An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Futur Gener Comput Syst 86:297–307CrossRef Kaur H, Kumar N, Batra S (2018) An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Futur Gener Comput Syst 86:297–307CrossRef
16.
go back to reference Fu M, Qu H, Yi Z, Lu L, Liu Y (2018) A novel deep learning-based collaborative filtering model for recommendation system. IEEE Trans Cybern 49(3):1084–1096CrossRef Fu M, Qu H, Yi Z, Lu L, Liu Y (2018) A novel deep learning-based collaborative filtering model for recommendation system. IEEE Trans Cybern 49(3):1084–1096CrossRef
17.
go back to reference Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Selected Areas Commun 36(2):246–256CrossRef Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Selected Areas Commun 36(2):246–256CrossRef
18.
go back to reference Javaid U, Aman MN, Sikdar B (2020) A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J 7(12):11815–11829CrossRef Javaid U, Aman MN, Sikdar B (2020) A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J 7(12):11815–11829CrossRef
19.
go back to reference Rani R, Kumar S, Dohare U (2019) Trust evaluation for light weight security in sensor enabled internet of things: game theory-oriented approach. IEEE Internet Things J 6(5):8421–8432CrossRef Rani R, Kumar S, Dohare U (2019) Trust evaluation for light weight security in sensor enabled internet of things: game theory-oriented approach. IEEE Internet Things J 6(5):8421–8432CrossRef
21.
go back to reference Pourghebleh B, Wakil K, Navimipour NJ (2019) A comprehensive study on the trust management techniques in the internet of things. IEEE Internet Things J 6(6):9326–9337CrossRef Pourghebleh B, Wakil K, Navimipour NJ (2019) A comprehensive study on the trust management techniques in the internet of things. IEEE Internet Things J 6(6):9326–9337CrossRef
23.
go back to reference Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur Gener Comput Syst 108:909–920CrossRef Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur Gener Comput Syst 108:909–920CrossRef
25.
go back to reference Barcelo M, Correa A, Llorca J, Tulino AM, Vicario JL, Morell A (2016) IoT-cloud service optimization in next generation smart environments. IEEE J Selected Areas Commun 34(12):4077–4090CrossRef Barcelo M, Correa A, Llorca J, Tulino AM, Vicario JL, Morell A (2016) IoT-cloud service optimization in next generation smart environments. IEEE J Selected Areas Commun 34(12):4077–4090CrossRef
26.
go back to reference Huang C, Huang G, Liu W, Wang R, Xie M (2021) A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs. Phys Commun 47:101320CrossRef Huang C, Huang G, Liu W, Wang R, Xie M (2021) A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs. Phys Commun 47:101320CrossRef
28.
go back to reference Gupta BB, Quamara M (2020) An overview of internet of things (IoT): architectural aspects, challenges, and protocols. Concur Comput Practice Exp 32(21):e4946 Gupta BB, Quamara M (2020) An overview of internet of things (IoT): architectural aspects, challenges, and protocols. Concur Comput Practice Exp 32(21):e4946
29.
go back to reference Rezaeimehr F, Moradi P, Ahmadian S, Qader NN, Jalili M (2018) TCARS: time-and community-aware recommendation system. Futur Gener Comput Syst 78:419–429CrossRef Rezaeimehr F, Moradi P, Ahmadian S, Qader NN, Jalili M (2018) TCARS: time-and community-aware recommendation system. Futur Gener Comput Syst 78:419–429CrossRef
30.
go back to reference Xu Y, Ren J, Wang G, Zhang C, Yang J, Zhang Y (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans Ind Inf 15(6):3632–3641CrossRef Xu Y, Ren J, Wang G, Zhang C, Yang J, Zhang Y (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans Ind Inf 15(6):3632–3641CrossRef
31.
go back to reference Lasmar EL, de Paula FO, Rosa RL et al (2020) Rsrs: ridesharing recommendation system based on social networks to improve the user’s qoe. IEEE Trans Intell Transp Syst 20(12):4728–4740CrossRef Lasmar EL, de Paula FO, Rosa RL et al (2020) Rsrs: ridesharing recommendation system based on social networks to improve the user’s qoe. IEEE Trans Intell Transp Syst 20(12):4728–4740CrossRef
32.
go back to reference Wang W, Chen J, Wang J et al (2019) Trust-enhanced collaborative filtering for personalized point of interests’ recommendation. IEEE Trans Ind Inf 16(9):6124–6132CrossRef Wang W, Chen J, Wang J et al (2019) Trust-enhanced collaborative filtering for personalized point of interests’ recommendation. IEEE Trans Ind Inf 16(9):6124–6132CrossRef
34.
go back to reference Ni J, Lin X, Shen XS (2018) Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Selected Areas Commun 36(3):644–657CrossRef Ni J, Lin X, Shen XS (2018) Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Selected Areas Commun 36(3):644–657CrossRef
35.
go back to reference Li F, Huang G, Yang Q, Xie M (2021) Adaptive contention window MAC protocol in a global view for emerging trends networks. IEEE ACCESS 9(1):18402–18423CrossRef Li F, Huang G, Yang Q, Xie M (2021) Adaptive contention window MAC protocol in a global view for emerging trends networks. IEEE ACCESS 9(1):18402–18423CrossRef
38.
go back to reference Li D, Deng L, Gupta BB et al (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447CrossRef Li D, Deng L, Gupta BB et al (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447CrossRef
40.
go back to reference Wang R, Zhang Z, Zhang Z, Jia Z (2018) ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput Netw 139:119–135CrossRef Wang R, Zhang Z, Zhang Z, Jia Z (2018) ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput Netw 139:119–135CrossRef
Metadata
Title
NTSC: a novel trust-based service computing scheme in social internet of things
Authors
Ting Li
Guosheng Huang
Shaobo Zhang
Zhiwen Zeng
Publication date
10-06-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01200-8

Other articles of this Issue 6/2021

Peer-to-Peer Networking and Applications 6/2021 Go to the issue

Premium Partner