SlideShare a Scribd company logo
1 of 18
Download to read offline
Trustworthiness Monitoring of Dynamic
Service Compositions

Hisain Elshaafi, Dmitri Botvich, Jimmy McGibney
Outline

• Trust and trustworthiness.
• Aniketos – secure and trustworthy composite
  services.
• Operation of service (re)composition and
  trustworthiness monitoring.
• Trustworthiness prediction and aggregation.
• Experiments.
• Conclusion and future work.
Trust and Trustworthiness
• Trust:
   – a relationship between two or more entities
   – indicates the contextual expectations from an entity
     towards another
   – regarding accomplishing an action at a certain quality.
• Trustworthiness (TW):
   – the level of trust that the trusting entity has in another.
• Reputation:
   – the information available about an entity from various
     sources
   – such as QoS and user ratings
   – can be used to determine its TW.
Trustworthy Composite Services
• Composition techniques must be able to identify which
  component Web Services (WSs) are trustworthy:
   – helps consumer confidence, and
   – provides a safe environment for businesses to dynamically
     interact and carry out transactions
• The composition techniques must be able to maintain
  the most trustworthy and cost efficient Composite
  Service (CS).
• Therefore, addressing trust is essential for the success
  and adoption of the services paradigm.
• FP7 Integrated Project
• Sept 2010 – Feb 2014
• Aniketos addresses establishing and maintaining
  trustworthy and secure service compositions during
  design and run-time.
• Including runtime monitoring and adaptation of services.
• The adaptation is needed due to:
   – changing operational, business or threat environments or
   – changes in service quality and behaviour.
Operation of WS (Re)composition

• A component WS that is below the satisfactory TW level can
  be replaced with another WS offering the same capability but
  with better TW.
• The Cost Engine
  determines the cost of the
  CS as a result of the
  change.
• This ensures that a
  balance is maintained
  between both TW and
  cost efficiency of the WS.
Trustworthiness Monitoring
• Incoming events are evaluated by a rules engine to
  generate WS ratings.
• The rules calculate the
  rating for the event and
  add other attributes
  including the time-stamp
  and the type of event.
• Ratings are stored and
  can be used by the trust
  engine to calculate the
  overall TW level of the
  WS.
Trustworthiness of a Composition

• The calculation of TW level depends on the
  structure of the business process.
Trustworthiness Aggregation
WS Trustworthiness Prediction

• Trustworthiness level is determined by two
  values; trust score and confidence score.
• Trust score is a dynamically weighted moving
  average of the rating scores.
• The weighting is based on the recency of the
  ratings.
WS Trustworthiness Prediction (cont.)

• Confidence score is calculated as a product of quantity
  confidence and quality confidence:
   – Quantity confidence indicates the number and the recency of
     ratings on which trust score is based.



   – Quality confidence indicates the stability of the ratings values;
     frequent fluctuations result in low confidence.
Experiments
• Decline of trust score of component service s1 leads to
  decline of CS trust score.
Experiments (cont.)
• Decline of confidence score of component service s1
  leads to decline of CS trust score
Experiments (cont.)
• Decline of trust (or confidence) score in different types of
  constructs:
        Loop                       Exclusive Choice
Experiments (cont.)
• Decline of trust (or confidence) score in different types of
  constructs:
                     Discriminator
Experiments (cont.)

• Performance comparison to FIRE algorithm:
Conclusion and Future Work
• Approach to maintaining TW of dynamic composite
  services.
• Calculation of TW and cost depends on the construction
  of the composite service.
• Develop optimisation mechanisms and algorithms for
  dynamic WS composition and adaptation.
• Taking into account multiple objectives including TW,
  cost and pricing.
• Maintaining trustworthiness through resource
  management
• Thanks!
       • Questions?
• Contact: helshaafi@tssg.org




                                18

More Related Content

Similar to Wewst11 trustworthiness monitoring of dynamic service compositions v2

BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONSBALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
akhilkumarreddybanda
 

Similar to Wewst11 trustworthiness monitoring of dynamic service compositions v2 (20)

ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
 
The how, why and what of ITIL® certifications
The how, why and what of ITIL® certificationsThe how, why and what of ITIL® certifications
The how, why and what of ITIL® certifications
 
Service Validation Introduction v1.0TJ
Service Validation Introduction v1.0TJService Validation Introduction v1.0TJ
Service Validation Introduction v1.0TJ
 
PPT For Cloud Solution Provider.pptx
PPT For Cloud Solution Provider.pptxPPT For Cloud Solution Provider.pptx
PPT For Cloud Solution Provider.pptx
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
Service level management
Service level managementService level management
Service level management
 
ITIL Service Strategy
ITIL Service StrategyITIL Service Strategy
ITIL Service Strategy
 
Who is naalium
Who is naaliumWho is naalium
Who is naalium
 
Itilservicetransition 161212153303
Itilservicetransition 161212153303Itilservicetransition 161212153303
Itilservicetransition 161212153303
 
ITIL Service Transition
ITIL Service TransitionITIL Service Transition
ITIL Service Transition
 
Evaluation and Rating program for Construction Quality and Task Completion
Evaluation and Rating program for Construction Quality and Task CompletionEvaluation and Rating program for Construction Quality and Task Completion
Evaluation and Rating program for Construction Quality and Task Completion
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management
 
Validation of Customer Survey
Validation of Customer SurveyValidation of Customer Survey
Validation of Customer Survey
 
Cloud Navigator
Cloud NavigatorCloud Navigator
Cloud Navigator
 
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONSBALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
BALANCING PERFORMANCE,ACCURACY,AND PRECISION FOR SECURE CLOUD TRANSACTIONS
 
RCMG Corporate Profile
RCMG Corporate ProfileRCMG Corporate Profile
RCMG Corporate Profile
 
Quality function deployment alitalia's qfd implementation
Quality function deployment alitalia's qfd implementationQuality function deployment alitalia's qfd implementation
Quality function deployment alitalia's qfd implementation
 
Quality Mangement Assignment
Quality Mangement AssignmentQuality Mangement Assignment
Quality Mangement Assignment
 

More from Aniketos EU FP7 Project (10)

Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
 
20120709 cyber patterns2012
20120709 cyber patterns201220120709 cyber patterns2012
20120709 cyber patterns2012
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
 
Dynamic monitoring of composed services
Dynamic monitoring of composed servicesDynamic monitoring of composed services
Dynamic monitoring of composed services
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Wewst11 trustworthiness monitoring of dynamic service compositions v2

  • 1. Trustworthiness Monitoring of Dynamic Service Compositions Hisain Elshaafi, Dmitri Botvich, Jimmy McGibney
  • 2. Outline • Trust and trustworthiness. • Aniketos – secure and trustworthy composite services. • Operation of service (re)composition and trustworthiness monitoring. • Trustworthiness prediction and aggregation. • Experiments. • Conclusion and future work.
  • 3. Trust and Trustworthiness • Trust: – a relationship between two or more entities – indicates the contextual expectations from an entity towards another – regarding accomplishing an action at a certain quality. • Trustworthiness (TW): – the level of trust that the trusting entity has in another. • Reputation: – the information available about an entity from various sources – such as QoS and user ratings – can be used to determine its TW.
  • 4. Trustworthy Composite Services • Composition techniques must be able to identify which component Web Services (WSs) are trustworthy: – helps consumer confidence, and – provides a safe environment for businesses to dynamically interact and carry out transactions • The composition techniques must be able to maintain the most trustworthy and cost efficient Composite Service (CS). • Therefore, addressing trust is essential for the success and adoption of the services paradigm.
  • 5. • FP7 Integrated Project • Sept 2010 – Feb 2014 • Aniketos addresses establishing and maintaining trustworthy and secure service compositions during design and run-time. • Including runtime monitoring and adaptation of services. • The adaptation is needed due to: – changing operational, business or threat environments or – changes in service quality and behaviour.
  • 6. Operation of WS (Re)composition • A component WS that is below the satisfactory TW level can be replaced with another WS offering the same capability but with better TW. • The Cost Engine determines the cost of the CS as a result of the change. • This ensures that a balance is maintained between both TW and cost efficiency of the WS.
  • 7. Trustworthiness Monitoring • Incoming events are evaluated by a rules engine to generate WS ratings. • The rules calculate the rating for the event and add other attributes including the time-stamp and the type of event. • Ratings are stored and can be used by the trust engine to calculate the overall TW level of the WS.
  • 8. Trustworthiness of a Composition • The calculation of TW level depends on the structure of the business process.
  • 10. WS Trustworthiness Prediction • Trustworthiness level is determined by two values; trust score and confidence score. • Trust score is a dynamically weighted moving average of the rating scores. • The weighting is based on the recency of the ratings.
  • 11. WS Trustworthiness Prediction (cont.) • Confidence score is calculated as a product of quantity confidence and quality confidence: – Quantity confidence indicates the number and the recency of ratings on which trust score is based. – Quality confidence indicates the stability of the ratings values; frequent fluctuations result in low confidence.
  • 12. Experiments • Decline of trust score of component service s1 leads to decline of CS trust score.
  • 13. Experiments (cont.) • Decline of confidence score of component service s1 leads to decline of CS trust score
  • 14. Experiments (cont.) • Decline of trust (or confidence) score in different types of constructs: Loop Exclusive Choice
  • 15. Experiments (cont.) • Decline of trust (or confidence) score in different types of constructs: Discriminator
  • 16. Experiments (cont.) • Performance comparison to FIRE algorithm:
  • 17. Conclusion and Future Work • Approach to maintaining TW of dynamic composite services. • Calculation of TW and cost depends on the construction of the composite service. • Develop optimisation mechanisms and algorithms for dynamic WS composition and adaptation. • Taking into account multiple objectives including TW, cost and pricing. • Maintaining trustworthiness through resource management
  • 18. • Thanks! • Questions? • Contact: helshaafi@tssg.org 18