An Efficient Bounded Model Checking Approach for Web Service Composition

With the development of service-oriented architecture, Web service composition has become more important for mitigating potential security vulnerabilities. When the scale of services increases, it will lead to the problem of state explosion. Symbolic model checking is a common method used to alleviate the problem of state-space explosion. However, for a large Web service composition system, the number of services is large, and the corresponding state space may exceed the magnitude of the symbolic model checking that can verify it. As it alleviates the state-space explosion problem, bounded model checking was utilized in the present study to verify the properties of the service composition system. Bounded model checking searches for bounded counterexamples in a limited local space and reduces the state space. This study verifies the composition of semantic Web services described by OWL-S and proposes a timed service model (TSM) to formally model the service composition system. Furthermore, the auto-mapping relationship between the OWL-S service description and the model is established. For more efficient verification, this study uses SMT-based (SMT: satisfiability modulo theory) encoding in the TSM. Finally, a public emergency service composition system was built to verify the proposed model and the efficiency of the proposed algorithm.

[1]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[2]  Eunhee Kim,et al.  Bounded Model Checking of Hybrid Systems for Control , 2015, IEEE Transactions on Automatic Control.

[3]  Li Yang,et al.  A trust-based collaborative filtering algorithm for E-commerce recommendation system , 2018, Journal of Ambient Intelligence and Humanized Computing.

[4]  Lucas C. Cordeiro,et al.  ESBMC-GPU A context-bounded model checking tool to verify CUDA programs , 2018, Sci. Comput. Program..

[5]  Dongqing Xie,et al.  DF Relaying Networks With Randomly Distributed Interferers , 2017, IEEE Access.

[6]  Brij B. Gupta,et al.  Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT , 2018, IEEE Access.

[7]  Yu Xue,et al.  Efficient business process consolidation: combining topic features with structure matching , 2016, Soft Comput..

[8]  Alvaro Soria,et al.  AI-based Web Service Composition: A Review , 2016 .

[9]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[10]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[11]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[12]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[13]  Bożena Woźna-Szcześniak,et al.  SAT-based Bounded Model Checking for Weighted Deontic Interpreted Systems , 2016 .

[14]  Liehuang Zhu,et al.  Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things , 2019, IEEE Access.

[15]  Maryam Omid,et al.  Context-Aware Web Service Composition based on AI Planning , 2017, Appl. Artif. Intell..

[16]  Xiaojiang Du,et al.  Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.

[17]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[18]  Ji Wang,et al.  Counterexample-Preserving Reduction for Symbolic Model Checking , 2013, ICTAC.

[19]  Lijun Wu,et al.  Symbolic model checking for discrete real-time systems , 2017, Science China Information Sciences.

[20]  Manuel Mucientes,et al.  An Integrated Semantic Web Service Discovery and Composition Framework , 2015, IEEE Transactions on Services Computing.

[21]  George K. Karagiannidis,et al.  Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.

[22]  Ruimao Zhang,et al.  Cost-Effective Active Learning for Deep Image Classification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Jinqiao Shi,et al.  Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.

[24]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[25]  Jie Wu,et al.  Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..

[26]  Bixin Li,et al.  Incremental Verification of Evolving BPEL-Based Web Composite Service , 2016 .

[27]  Qing Wang,et al.  Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..

[28]  Albert Y. Zomaya,et al.  A Survey of Mobile Device Virtualization , 2016, ACM Comput. Surv..

[29]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[30]  Mianxiong Dong,et al.  FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[31]  Chen Liang,et al.  Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.

[32]  Changzhen Hu,et al.  Hybrid Recommendation Algorithm Based on Latent Factor Model and PersonalRank , 2018 .

[33]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[34]  Yu Zhang,et al.  Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..

[35]  Yue Zhang,et al.  APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..

[36]  Yuanzhang Li,et al.  DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[37]  Jan van Eijck,et al.  Symbolic model checking for Dynamic Epistemic Logic - S5 and beyond , 2018, J. Log. Comput..

[38]  Ching-Hsien Hsu,et al.  Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler , 2017, J. Syst. Archit..

[39]  Zhang Changyou,et al.  Proactive service selection based on acquaintance model and LS-SVM , 2016 .

[40]  Michael Leuschel,et al.  Proof assisted bounded and unbounded symbolic model checking of software and system models , 2017, Sci. Comput. Program..

[41]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[42]  Kais Klai,et al.  On the Verification of Opacity in Web Services and Their Composition , 2017, IEEE Transactions on Services Computing.

[43]  Yu Xue,et al.  Approximate normalized cuts without Eigen-decomposition , 2016, Inf. Sci..

[44]  Jing Zhang,et al.  Automatic Combination Technology of Fuzzy CPN for OWL-S Web Services in Supercomputing Cloud Platform , 2017, Int. J. Pattern Recognit. Artif. Intell..

[45]  Jing Guo,et al.  Efficient encoding for bounded model checking of timed automata , 2017 .