Trust Decision Model and Trust Evaluation Model for Quality Web Service Identification in Web Service Lifecycle Using QSW Data Analysis

In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust, calculated based on available direct attributes in quality web service (QWS) data sets. After getting training of such evaluation and decision strategies, developers and customers, both will use the knowledge and improve the QoS. This research provides web-based learning about web service quality which will be utilized for prediction, recommendation and the selection of trusted web services in the pool of web services available globally. In this research, the authors include designs to make decisions about the trustworthy web services based on classification, correlation, and curve fitting to improve trust in web service prediction. In order to empower the web services life cycle, they have developed a quality assessment model to incorporate a security and performance policy.

[1]  Ioana Manolescu,et al.  Model-driven design and deployment of service-enabled web applications , 2005, TOIT.

[2]  Lina Yao,et al.  Achieving High Availability of Web Services Based on A Particle Filtering Approach , 2012, Int. J. Next Gener. Comput..

[3]  Tushar Sharma,et al.  Designite - A Software Design Quality Assessment Tool , 2016, 2016 IEEE/ACM 1st International Workshop on Bringing Architectural Design Thinking Into Developers' Daily Activities (BRIDGE).

[4]  B. Snaith,et al.  Emergency ultrasound in the prehospital setting: the impact of environment on examination outcomes , 2011, Emergency Medicine Journal.

[5]  Dimitris Christodoulakis,et al.  CESM: a Perceived Software Quality Assessment Tool , 1999 .

[6]  Ayaz Isazadeh,et al.  QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm , 2017, The Journal of Supercomputing.

[7]  Thomas Risse,et al.  Selecting skyline services for QoS-based web service composition , 2010, WWW '10.

[8]  Jinjun Chen,et al.  Towards a trust evaluation middleware for cloud service selection , 2017, Future Gener. Comput. Syst..

[9]  Dheerendra Singh,et al.  Analysis for security implementation in SDLC , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[10]  G. Raj,et al.  Survey on trust establishment in cloud computing , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[11]  Per Runeson,et al.  Supporting Regression Test Scoping with Visual Analytics , 2014, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation.

[12]  Eyhab Al-Masri,et al.  QoS-based Discovery and Ranking of Web Services , 2007, 2007 16th International Conference on Computer Communications and Networks.

[13]  Reijo Savola,et al.  Trust and Cloud Services - An Interview Study , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[14]  Lóránt Farkas,et al.  Telecom strategies for service discovery in microservice environments , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[15]  Nizar Bouguila,et al.  Trust and Reputation of Web Services Through QoS Correlation Lens , 2016, IEEE Transactions on Services Computing.

[16]  N. Jaisankar,et al.  A Review on Various Trust Models in Cloud Environment , 2017 .

[17]  Gaurav Raj,et al.  QoS implementation in Web Services selection and ranking using data analysis , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[18]  Dheerendra Singh,et al.  Security Testing of Web Applications: Issues and Challenges , 2014 .

[19]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[20]  Lei Wang,et al.  Two-stage approach for reliable dynamic Web service composition , 2016, Knowl. Based Syst..

[21]  M.I.P. Salas,et al.  Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security , 2014, CLEI Selected Papers.