A quality model for social networks populated with web services

This paper presents the development and evaluation of a $$\mathcal {Q}$$Qo$$\mathcal {SN}$$SN (standing for $$\mathcal {Q}$$Quality of $$\mathcal {S}$$Social $$\mathcal {N}$$Network) model for social networks populated with Web services. These Web services are given the opportunity to select the networks in which they would like to sign in taking into account their concerns (in fact their providers’ concerns) like better protection to their details and better exposure to potential users. To support Web services selection, the $$\mathcal {Q}$$Qo$$\mathcal {SN}$$SN model is built upon four criteria including robustness, trust, fairness, and traceability. The computation of these criteria uses a cryptographic technique known as secure multi-party computation. Different experiments showing how the networks react to Web services’ actions (e.g., attack, join, and kick out) are also presented in the paper.

[1]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[2]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Silvio Micali,et al.  The round complexity of secure protocols , 1990, STOC '90.

[5]  Athman Bouguettaya,et al.  Infrastructure for E-Government Web Services , 2003, IEEE Internet Comput..

[6]  Somesh Jha,et al.  Automatic generation and analysis of NIDS attacks , 2004, 20th Annual Computer Security Applications Conference.

[7]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[8]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[9]  Selmin Nurcan,et al.  BPM and Social Software , 2008, Business Process Management Workshops.

[10]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.

[11]  Selmin Nurcan,et al.  Introduction to the First International Workshop on Business Process Management and Social Software (BPMS2 2008) , 2008, Business Process Management Workshops.

[12]  Mary-Anne Williams,et al.  A social network approach in Semantic Web Services Selection using Follow the Leader behavior , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.

[13]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[14]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[15]  Arun Iyengar,et al.  Combining Quality of Service and Social Information for Ranking Services , 2009, ICSOC/ServiceWave.

[16]  Zakaria Maamar,et al.  Can Enterprises Capitalize on their Social Networks , 2010 .

[17]  Ravi S. Sandhu,et al.  Social-Networks Connect Services , 2010, Computer.

[18]  M. B. Blake,et al.  Trust-based Dynamic Web service Composition using Social Network Analysis , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).

[19]  Hakim Hacid,et al.  Towards a Social Network Based Approach for Services Composition , 2010, 2010 IEEE International Conference on Communications.

[20]  Simon N. Foley,et al.  Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria , 2010, Secur. Commun. Networks.

[21]  Terry Rout Studies on the assessment process: usage of objective evidence in assessing process capability , 2010 .

[22]  Zakaria Maamar,et al.  Using Social Networks for Web Services Discovery , 2011, IEEE Internet Computing.

[23]  Hector Garcia-Molina,et al.  Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.

[24]  Zakaria Maamar,et al.  Towards a Method for Engineering Social Web Services , 2011, ME.

[25]  Zakaria Maamar,et al.  Social Engineering of Communities of Web Services , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.

[26]  Michael Prilla,et al.  Key challenges for enabling agile BPM with social software , 2011, J. Softw. Maintenance Res. Pract..

[27]  Zakaria Maamar,et al.  LinkedWS: A novel Web services discovery model based on the Metaphor of "social networks" , 2011, Simul. Model. Pract. Theory.

[28]  Zakaria Maamar,et al.  Why Web Services Need Social Networks , 2011, IEEE Internet Computing.

[29]  Claudio Orlandi,et al.  Is multiparty computation any good in practice? , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[30]  Michael Luck,et al.  Specifying and implementing social Web services operation using commitments , 2012, SAC '12.

[31]  Lina Yao,et al.  Towards a User-Centric Social Approach to Web Services Composition, Execution, and Monitoring , 2012, WISE.

[32]  Parisa Ghodous,et al.  Towards a $\mathcal{Q}$ uality of $\mathcal{S}$ ocial $\mathcal{N}$ etwork ( $\mathcal{Q}$ o $\mathcal{SN}$ ) Model in the Context of Social Web Services , 2012, IESS.

[33]  Incheon Paik,et al.  Improving efficiency of service discovery using Linked data-based service publication , 2013, Inf. Syst. Frontiers.

[34]  Quan Z. Sheng,et al.  When Clouds Start Socializing: The Sky Model , 2013, Int. J. E Bus. Res..

[35]  Lina Yao,et al.  Commitments to Regulate Social Web Services Operation , 2014, IEEE Transactions on Services Computing.

[36]  H. Khider,et al.  Business Process Management and Social Software , 2014 .