Abstract
This paper presents the development and evaluation of a \(\mathcal {Q}\)o\(\mathcal {SN}\) (standing for \(\mathcal {Q}\)uality of \(\mathcal {S}\)ocial \(\mathcal {N}\)etwork) model for social networks populated with Web services. These Web services are given the opportunity to select the networks in which they would like to sign in taking into account their concerns (in fact their providers’ concerns) like better protection to their details and better exposure to potential users. To support Web services selection, the \(\mathcal {Q}\)o\(\mathcal {SN}\) model is built upon four criteria including robustness, trust, fairness, and traceability. The computation of these criteria uses a cryptographic technique known as secure multi-party computation. Different experiments showing how the networks react to Web services’ actions (e.g., attack, join, and kick out) are also presented in the paper.
Similar content being viewed by others
Notes
Quality of Service (QoS) is adopted in other disciplines like networking and uses non-functional properties like response time, reliability level, and latency.
Repetitive and considerable gaps between a Web service announced-QoS and effective-QoS might indicate performance degradation and inability of delivering the announced QoS [25].
FairPlay allows to write secure functions that deal with integers, only. Thus, in the implementation, we round each ratio to an integer. In particular, each decimal number is multiplied by 10, and then rounded to the next integer, if bigger or equal to .5 (otherwise, to the previous one).
Despite the division is performed out of the SMC-function, inputs of all SWSs are kept preserved by the function 1.
It is worth noticing that comparisons between a threshold value and the actual attackRatio of SWSs may be done by an appropriate use of secure two-party computation.
A confidence interval gives an estimated range of values which is likely to include an unknown population parameter, the estimated range being calculated from a given set of sample data (http://www.stat.yale.edu/Courses/1997-98/101/confint.htm).
References
Al-Sharawneh J, Williams M-A (2009) A social network approach in semantic web services selection using follow the leader behavior. In: Proceedings of the 13th enterprise distributed object computing conference workshops (EDOCW’2009), Auckland, New Zealand
Audun J, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644
Badr Y, Maamar Z (2009) Can enterprises capitalize on their social networks? Cutter IT J 22(10):10–14
Bansal S, Bansal A, Blake MB (2010) Trust-based dynamic web service composition using social network analysis. In: Proceedings of the international workshop on business applications for social network analysis (BASNA’2010) held in conjunction with the fourth international conference on internet multimedia systems architecture and applications (IMSAA’2010), Bangalore, India
Beaver D, Micali S, Rogaway P (1990) The round complexity of secure protocols. In: Proceedings of the twenty-second annual ACM symposium on theory of computing (STOC’1990), Baltimore, MD, USA
Ben-David A, Nisan N, Pinkas B (2008) FairplayMP: A system for secure multi-party computation. In: Proceedings of the 15th ACM conference on computer and communications security (CCS’2008), New York, NY, USA
Bistarelli S, Foley SN, O’Sullivan B, Santini F (2010) Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Secur Commun Netw 3(6):595–610
Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen TP, Krøigaard M, Dam Nielsen J, Buus Nielsen J, Nielsen K, Pagter J, Schwartzbach MII, Toft T (2009) Secure multiparty computation goes live. In: Proceedings of 13th international conference on financial cryptography and data security (FC’2009), Accra Beach, Barbados
Bruno G, Dengler F, Jennings B, Khalaf R, Nurcan S, Prilla M, Sarini M, Schmidt R, Silva R (2010) Key challenges for enabling agile BPM with social software. J Softw Maint Evol Res Pract 22(6–7):297–326
Chen W, Paik I (2012) Improving efficiency of service discovery using linked data-based service publication. Inf Syst Front Spinger (forthcoming)
Drupad S (2008) Enterprise Web 2.0 Worth \(\$4.6\) Billion in 2013, Visited September 2008. Searchviews, 21 April 2008. www.searchviews.com/index.php/archives/2008/04/enterprise-web-20-worth-46-billion-in-2013.php
Elnaffar S, Maamar Z, Sheng QZ (April-June 2013) When clouds start socializing: the sky model. Int J E-Bus Res IGI Global Pub 9(2):1–7
Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the nineteenth annual ACM symposium on theory of computing, STOC ’87
Maamar Z, Faci N, Boukadi K, Sheng QZ, Yao L (2014) Commitments to regulate social web services operation. IEEE Trans Serv Comput (forthcoming)
Maamar Z, Faci N, Krug Wives L, Badr Y, Bispo Santos P, de Oliveira Palazzo MJ (2011) Using social networks to web services discovery. IEEE Internet Comput 15(4):48–54
Maamar Z, Faci N, Krug Wives L, Yahyaoui H, Hacid H (2011) Towards a method for engineering social web services. In: Proceedings of the IFIP WG8.1 working conference on method engineering (ME’2011), Paris, France
Maamar Z, Faci N, Loo A, Ghodous P (2012) Towards a quality of social network (QoSN) model in the context of social web services. In: The proceedings of the 3rd international conference of exploring services science (IESS’2012), Geneva, Switzerland
Maamar Z, Faci N, Luck M, Hachimi S (2012) Specifying and implementing social web services operation using commitments. In: The proceedings of the 27th annual ACM symposium on applied computing (SAC’2012), Riva del Garda, Trento, Italy
Maamar Z, Faci N, Sheng QZ, Yao L (2012) Towards a user-centric social approach to web services composition, execution, and monitoring. In: Proceedings of the 13th international conference on web information system engineering (WISE’2012), Paphos, Cyprus
Maamar Z, Hacid H, Hunhs MN (2011) Why web services need social networks. IEEE Internet Comput 15(2):90–94
Maamar Z, Krug Wives L, Badr Y, Elnaffar S, Boukadi K, Faci N (2011) LinkedWS: A novel web services discovery model based on the metaphor of “Social Networks”. Simul Model Pract Theory 19(10):121–132
Maamar Z, Yahyaoui H, Lim E, Thiran P (2011) Social Engineering of Communities of Web Services. In: Proceedings of the 11th annual international symposium on applications and the internet (SAINT’2011), Munich, Germany
Maaradji A, Hacid H, Daigremont J, Crespi N (2010) Towards a Social Network Based Approach for Services Composition. In: Proceedings of the 2010 IEEE international conference on communications (ICC’2010), Cap Town, South Africa
Malkhi D, Nisan N, Pinkas B, Sella Y (2004) Fairplay: a secure two-party computation system. In: Proceedings of the 13th conference on USENIX security symposium (SSYM’2004), Berkeley, CA, USA
Medjahed B, Rezgui A, Bouguettaya A, Ouzzani M (2003) Infrastructure for e-government web services. IEEE Internet Comput 7(1):58–65
Nam Ko M, Cheek GP, Shehab M, Sandhu R (2010) Social-networks connect services. IEEE Comput 43(8):37–43
Orlandi C (2011) Is multiparty computation any good in practice? In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’2011), Prague, Czech Republic
Papadimitriou P, Garcia-Molina H (2011) Data leakage detection. IEEE Trans Knowl Data Eng 23(1):51–63
Pinkas B, Schneider T, Smart NP, Williams SC (2009) Secure two-party computation is practical. In: Proceedings of the 15th international conference on the theory and application of cryptology and information security: advances in cryptology (ASIACRYPT’2009), Tokyo, December
Rubin S, Jha S, Miller BP (2004) Automatic generation and analysis of NIDS attacks. In: Proceedings of the 20th annual computer security applications conference (ACSAC’2004), Tucson, Arizona, USA
Schmidt R, Nurcan S (2008) BPM and Social Software. In: Proceedings of the first workshop on business process management and social software (BPMS2’2008), Milan, Italy
Wu Q, Iyengar A, Subramanian R, Rouvellou I, Silva-Lepe I, Mikalsen T (2009) Combining quality of service and social information for ranking services. In: Proceedings of ServiceWave 2009 workshops held in conjunction with the 7th international conference on service service-oriented computing (ICSOC’2009), Stockholm, Sweden
Xie X, Du B, Zhang Z (2008) Semantic service composition based on social network. In: Proceedings of the 17th international world wide web conference (WWW’2008), Beijing, China
Yao AC-C (1986), How to generate and exchange secrets. In: Proceedings of the 27th annual symposium on foundations of computer, science (SFCS’1986), October 1986
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Faci, N., Petrocchi, M., Costantino, G. et al. A quality model for social networks populated with web services. SOCA 9, 139–155 (2015). https://doi.org/10.1007/s11761-014-0156-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11761-014-0156-8