A Survey Study on Reputation-based Trust Mechanisms in Service-Oriented Computing
Main Article Content
Abstract
- The Reputation-Based Trust mechanism (RBT) helps a service assess the trustworthiness of offered services, based on the feedback obtained from their users. A key challenge to apply the RBT is to prevent the cheating behavior of users when they provide recommendations they might give unfair ratings to benefit themselves. This survey describes the research communities that are making efforts to solve the problems of the RBT in Service-Oriented Computing (SOC) domain. A summary of findings is then discussed to position the trends and directions of future studies. The survey can be used as a reference guide in a hope to make trust-based service systems more reliable and scalable.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
I/we certify that I/we have participated sufficiently in the intellectual content, conception and design of this work or the analysis and interpretation of the data (when applicable), as well as the writing of the manuscript, to take public responsibility for it and have agreed to have my/our name listed as a contributor. I/we believe the manuscript represents valid work. Neither this manuscript nor one with substantially similar content under my/our authorship has been published or is being considered for publication elsewhere, except as described in the covering letter. I/we certify that all the data collected during the study is presented in this manuscript and no data from the study has been or will be published separately. I/we attest that, if requested by the editors, I/we will provide the data/information or will cooperate fully in obtaining and providing the data/information on which the manuscript is based, for examination by the editors or their assignees. Financial interests, direct or indirect, that exist or may be perceived to exist for individual contributors in connection with the content of this paper have been disclosed in the cover letter. Sources of outside support of the project are named in the cover letter.
I/We hereby transfer(s), assign(s), or otherwise convey(s) all copyright ownership, including any and all rights incidental thereto, exclusively to the Journal, in the event that such work is published by the Journal. The Journal shall own the work, including 1) copyright; 2) the right to grant permission to republish the article in whole or in part, with or without fee; 3) the right to produce preprints or reprints and translate into languages other than English for sale or free distribution; and 4) the right to republish the work in a collection of articles in any other mechanical or electronic format.
We give the rights to the corresponding author to make necessary changes as per the request of the journal, do the rest of the correspondence on our behalf and he/she will act as the guarantor for the manuscript on our behalf.
All persons who have made substantial contributions to the work reported in the manuscript, but who are not contributors, are named in the Acknowledgment and have given me/us their written permission to be named. If I/we do not include an Acknowledgment that means I/we have not received substantial contributions from non-contributors and no contributor has been omitted.
References
2. Artz, D. and Gil, Y. 2007. A Survey of Trust in Computer Science and the Semantic Web. Web Semant 5(2): 58-71.
3. Atrey, P. K., Hossain, M. A. and Saddik, A. E. 2008. Association Based Dynamic Computation of Reputation in Web Services. Journal of Web and Grid Services 4(2): 169-188.
4. Brandenburger, A. 2007. Cooperative Game Theory, Characteristic Functions, Allocations, Marginal Contribution.
5. Braynov, S. and Sandholm, T. 2002. Incentive Compatible Mechanism for Trust Revelation. Proceedings of the 1st International Joint Conference on Autonomous Agents and Multi Agent Systems, Italy, pp. 310-311.
6. Chen, B. and Chan M. C. 2010. Mobicent: a Credit-based Incentive System for Disruption Tolerant Network. Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM ‘10), San Diego, CA, USA, pp. 875-883.
7. Chen, M. and Singh, J.P. 2001, Computing and Using Reputations for Internet Ratings. Proceedings of the 3rd ACM Conference on Electronic Commerce, pp. 154-162.
8. Chen, T. and Zhong, S. 2010. Inpac: an enforceable incentive scheme for wireless networks using network coding. Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM ‘10), San Diego, CA, USA, pp. 1828-1836.
9. Chen, Z., Liang-Tien, C., Silverajan, B. and Bu-Sung, L. 2003. UX - An Architecture Providing QoS-Aware and Federated Support for UDDI. Proceedings of International Conference on Web Services (ICWS), pp. 171- 176.
10. Clemen, R. T. 2002. Incentive Contracts and Strictly Proper Scoring Rules. Test 11(1): 167-189.
11. Damiani, E., di Vimercati, D., Paraboschi, S., Samarati, P. and Violante, F. 2003. A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.207-216.
12. Dasgupta, P. Trust as a Commodity. 1990. Trust: Making and Breaking Cooperative Relations. Gambetta, D (Ed.), Basil Blackwell. Oxford, 2000.
13. Day, J. and Deters, R. Selecting the Best Web Service. 2004. Proceedings of the 14th Annual IBM Centers for Advanced Studies Conference, pp. 293-307.
14. Dellarocas, C. 2002. Goodwill Hunting: An Economically Efficient Online Feedback Mechanism for Environments with Variable Product Quality. Proceedings of the Workshop on Agent-Mediated Electronic Commerce, London, UK, pp. 238-252.
15. Elliott, C. 2006. Hotel Reviews Online: In Bed with Hope, Half-Truths and Hype. The New York Times. https://ehotelier.com/hospitalitynews/item.php?id=A7571_0_11_0_M Lastaccess on 4th August 2011.
16. Gerding, E., Larson, K. and Jennings, N. 2009. Mechanism Design for Eliciting Probabilistic Estimates from Multiple Suppliers with Unknown Costs and Limited Precision. Proceedings of the 11th International Workshop on Agent-Mediated Electronic Commerce, pp. II 1-124.
17. Gintis, H. 2000. Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction. Princeton University Press.
18. Harmon, A. 2004. Amazon Glitch Unmasks War of Reviewers. The New York Times. https://www.nytimes.com/2004/02/14/us/amazon-glitch-unmasks-war-of-reviewers.html Last access on 4th August 2011.
19. Hennig-Thurau, T., Gwinner, K. P., Walsh, G. and Gremler, D. D. 2004. Electronic Word-of-Mouth via Consumer-Opinion Platforms: What Motivates Consumers to Articulate Themselves on the Internet? Journal of Interacting Marketing 18 (1), 38-52.
20. Hu, N., Pavlou, P. and Zhang, J., 2006. Can Online Reviews Reveal a Product's True Quality? Proceedings of the ACM Conference on Electronic Commerce, pp. 324-330.
21. Johnson, S., Pratt, J. and Zeckhauser, R. 1990. Efficiency Despite Mutually Payoff- Relevant Private Information: The Finite Case. Econometrica 58(1): 873-900.
22. Jøsang, A., Ismail, R., and Boyd, C. 2007. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2): 618-644.
23. Jurca, R. and Faltings, B. 2003. An Incentive-Compatible Reputation Mechanism. Proceedings of the IEEE Conference on ECommerce, Newport Beach, CA, USA.
24. Jurca, R. and Faltings, B. 2004. CONFESS: An Incentive Compatible Reputation Mechanism for the Online Hotel Booking Industry. Proceedings of the IEEE Conference on E-Commerce, San Diego, CA, USA, pp. 205-212.
25. Jurca, R. and Faltings, B. 2007. Collusionresistant, incentive-compatible feedback payments. Proceedings of ACM Conference on Electronic Commerce, pp. 200-209.
26. Jurca, R. and Faltings, B. 2009. Mechanisms for Making Crowds Truthful. Journal of Artificial Intelligence Research 34(1): 209-253. 27. Kamvar, S.D., Schlosser, M.T. and Garcia-Molina, H. 2003. The Eigentrust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, pp. 640-651.
28. Kandori, M. and Matsushima, H. 1998. Private Observation, Communication and Collusion. Econometrica 66(3): 627-652.
29. Karta, K. 2005. An Investigation on Personalized Collaborative Filtering for Web Service Selection. Master’s Thesis, The University of Western Australia.
30. Keates, N. 2007. Deconstructing TripAdvisor. The Wall Street Journal, pp. W1. https://online.wsj.com/article/SB118065569116920710.html Last access on 4th August 2011.
31. Klein, M., Plakosh, D. and Wallnau, K. 2008. Using the Vickrey-Clarke-Groves Auction Mechanism for Enhanced Bandwidth Allocation in Tactical Data Networks. Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2008-TR-004.
32. Kagel, J.H. and Roth, A.E. 1995. Handbook of Experimental Economics. Princeton University Press.
33. Li, Z., Su, S. and Yang, F. 2007. WSrep: A Novel Reputation Model for Web Services Selection. N.T. Nguyen et al. (Eds.), pp. 199- 208.
34. Liu, J. and Issarny, V. 2007. An Incentive Compatible Reputation Mechanism for Ubiquitous Computing Environments. International Journal of Information Security 6(5): 297-311.
35. Liu, Y., Ngu, A. and Zheng, L. 2004. QoS Computation and Policing in Dynamic Web Service Selection. Proceedings of the 13th World Wide Web Conference, pp. 66-73.
36. Liu, Y., Yang, Y. and Sun, Y. L. 2008. Detection of Collusion Behaviors in Online Reputation Systems. Proceedings of Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, pp.1368-1372.
37. Malik, Z. and Bouguettaya, A. 2009. A. Rater Credibility Assessment in Web Services Interactions. World Wide Web Journal 12 (1): 3-25.
38. Maximilien, E. M. and Singh, M. P. 2005. Multiagent System for Dynamic Web Services Selection. Proceedings of the 1st Workshop on Service-Oriented Computing and Agent-Based Engineering (SOCABE at AAMAS), Utrecht, Netherlands, pp. 25-29.
39. Miller, J. 2003. Game Theory at Work: How to Use Game Theory to Outthink and Outmaneuver Your Competition. McGraw- Hill.
40. Miller, N., Resnick, P. and Zeckhauser, R. 2005. Elicit Honest Feedback: The Peer- Prediction method. Management Science 51(1): 1359 – 1373.
41. Moscibroda, T. and Schmid, S. 2009. On mechanism design without payments for throughput maximization. Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM ‘09), Rio de Janeiro, Brazil.
42. Nguyen, H. T., Zhao W. and Yang, J. 2010. A Trust and Reputation Model Based on Bayesian Network for Web Services. Proceedings of the 8th IEEE International Conference on Web Services (ICWS), Miami, Florida, USA, pp. 251-258.
43. OASIS: UDDI (V3.0.2). 2004. https://www.uddi.org/pubs/uddi_v3.htm Last access on 4th August 2011.
44. Osborne, M. and Rubinstein, A. 1994. A Course in Game Theory. MIT Press.
45. Park, J. and Schaar M. V. D. 2010. Pricing and Incentives in Peer-to-Peer Networks. Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM ‘10), San Diego, CA, USA.
46. Park, S., Lui, L. Pu, C., Srivatsa, M. and Zhang, J. 2005. Resilient Trust Management for Web Service Integration. Proceedings of the 3th International Conference on Web Services, pp. 499-506.
47. Resnick, P. and Zeckhauser, R. 2002. Trust among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System. M.R. Baye (Ed.), The Economics of the Internet and E-Commerce, volume 11 of Advances in Applied Microeconomics. Elsevier Science, pp. 127- 157.
48. Sen, S. and Sajja, N., 2002. Robustness of Reputation-based Trust: Boolean Case. Proceedings of the 1st International Joint Conference on Autonomous agents and multiagent systems, pp. 288-293.
49. Shetty, S., Padala, P. and Frank, M.P. 2003. A Survey of Market-Based Approache to Distributed Computing. Technical Report Number: TR03013.
50. Sicard, S., Boyer, F. and Palma, N.D. 2008. Using Components for Architecture- Based Management: the Self-repair Case. Proceedings of the 30th International Conference on Software Engineering, Leipzig, Germany, pp. 101-110.
51. Spanoudakis, G. and LoPresti, S. 2009. Web Service Trust: Towards a Dynamic Assessment Framework. Proceedings of the International Conference on Availability, Reliability and Security, pp. 33-40.
52. Straffin, P. D. 1993. Game Theory and Strategy. The Mathematical Association of America.
53. Talwar, A., Jurca, R. and Faltings, B. 2007. Understanding User Behavior in Online Feedback Reporting. Proceedings of the ACM Conference on Electronic Commerce. San Diego, USA, pp. 134-142.
54. Tan, L., Chi, C-H. and Deng, J. 2008. Quantifying Trust Based on Service Level Agreement for Software as a Service. Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, pp. 116-119.
55. Truong, H. L., Samborski, R. and Fahringer, T. 2006. Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services. Proceedings of the 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, Netherlands, pp.65.
56. Vu, L-H., Hauswirth, M. and Aberer, K. 2005. Towards P2P-based Semantic Web Service Discovery with QoS Support. Proceedings of Business Process Management Workshops, pp.18-31.
57. Wang, P., Chao, K., Lo, C. and Li, Y. 2008. QoS-Aware Service Selection under Consumer's Reputation. Proceedings of the IEEE International Conference on e-Business Engineering, pp. 627 – 632.
58. Wang, Y. and Vassileva, J. 2007. Toward Trust and Reputation Based Web Service Selection: A Survey. International Transactions on Systems Science and Applications 3(2): 118–132.
59. Wang, Y., Hori, Y. and Sakurai, K. 2008. Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. Journal of Computer Science and Technology 23(1): 129-140.
60. Wichart, R., Robinson, R., Indulska, J. and Jøsang, A. 2005. SuperstringRep: Reputation-enhanced Service Discovery. Proceedings of the 28th Australian Conference on Computer Science, pp. 49-57.
61. Withby, A., Jøsang, A. and Indulska, J. 2004. Filtering Out Unfair Ratings in Bayesian Reputation Systems. Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi Agent Systems, New York, USA, pp. 106-117.
62. Witkowski, J. 2009. Elicit Honest Reputation Feedback in a Markov Setting. Proceeding of the 21st International Joint Conference on Uncertainty in Artificial Intelligence (IJCAI’09), Pasadena, California, USA, pp. 330-335.
63. Witkowski, J. and Parkes D. C., 2011. Peer Prediction with Private Beliefs. Proceedings of the 1st Workshop on Social Computing and User Generated Content, pp. 1-5.
64. Xiong, L. and Liu, L. 2004. PeerTrust: Supporting Reputation-Based Trust for Peer to-Peer Electronic Communities. Knowledge and Data Engineering, 16(7): 843-857.
65. Yang, M., Feng, Q., Dai, Y. and Zhang, Z. 2007. A Multi-Dimensional Reputation System Combined with Trust and Incentive Mechanism in P2P File Sharing Systems. Proceedings of the 27th International Conference on Distributed Computing Systems Workshops, Toronto, Canada, pp 29.
66. Yang, Y., Feng, Q., Sun, Y. and Dai, Y. 2008. RepTrap: A Novel Attack on Feedbackbased Reputation Systems. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, pp. 1-11.
67. Yang, Y., Sun, Y., Kay, S. and Yang, Q. 2009. Defending Online Reputation Systems against Collaborative Unfair Raters through Signal modeling and Trust. Proceedings of the 24th ACM Symposium on Applied Computing, pp. 1308.
68. Yin, K., Zhou, B., Zhang, S. and Chen, Y.08. An Effective Approach to Select Trustable Web Services. : Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-6.
69. Zhang, G., Zhang, H. and Wang, Z. 2009. A QoS-Based Web Services Selection Method for Dynamic Web Service Composition. Proceedings of the 1st International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China, pp. 832-835.
70. Zhao, H., Yang, X. and Li, X. 2011. An Incentive Mechanism to Reinforce Truthful Reports in Reputation Systems. Journal of Network and Computer Applications (JNCA), Elsevier, 2011 (in press).
71. Zohar, A. and Rosenschein, J. S. 2008. Mechanisms for Information Elicitation. Journal of Artificial Intelligence Research 172(16): 1917-1939.