“Time–Location–Frequency”–aware Internet of things service selection based on historical records

The advertised quality of an Internet of things service is not always trustable due to the exaggerated quality propagation and dynamic network environment. Therefore, it is more trustable to evaluate the Internet of things service quality based on the historical execution records of service. However, an Internet of things service often has multiple historical records whose invocation time and location are different, which makes it necessary to weigh each historical record of an identical Internet of things service. Besides, for different candidate Internet of things services, their invocation frequencies are often varied, which may also affect the final service selection decision of target user. In view of the above two challenges, a novel service selection approach “Time–Location–Frequency”–aware Service Selection Approach is put forward in this article. In Time–Location–Frequency–aware Service Selection Approach, we first weigh each historical record of an Internet of things service, based on its service invocation time and location; afterward, we weigh each candidate Internet of things service based on its invocation frequency; finally, with the derived two kinds of weights, we evaluate each candidate Internet of things service and return the quality-optimal one to the target user. At last, through a set of experiments deployed on a real service quality data set WS-DREAM, we validate the feasibility of our proposal.

[1]  Keqing He,et al.  Integrating implicit feedbacks for time-aware web service recommendations , 2017, Inf. Syst. Frontiers.

[2]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[3]  Ling Shao,et al.  A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..

[4]  Zibin Zheng,et al.  Web Service Recommendation via Exploiting Location and QoS Information , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Elisa Bertino,et al.  Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.

[6]  Zibin Zheng,et al.  WSPred: A Time-Aware Personalized QoS Prediction Framework for Web Services , 2011, 2011 IEEE 22nd International Symposium on Software Reliability Engineering.

[7]  Bin Gu,et al.  Bi-Parameter Space Partition for Cost-Sensitive SVM , 2015, IJCAI.

[8]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Xingming Sun,et al.  Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation , 2016, IEICE Trans. Inf. Syst..

[10]  Gang Chen,et al.  Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.

[11]  Sai Ji,et al.  Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[12]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[13]  Jiguo Yu,et al.  Time-Aware IoE Service Recommendation on Sparse Data , 2016, Mob. Inf. Syst..

[14]  Christine Julien,et al.  Challenges of satisfying multiple stakeholders: quality of service in the internet of things , 2011, SESENA '11.

[15]  Xingming Sun,et al.  Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.

[16]  Zhenpeng Liu,et al.  A Prediction QOS Approach Reputation-Based in Web Services , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[17]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[18]  Minjie Zhang,et al.  A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..

[19]  Jian Wang,et al.  Leveraging Auxiliary Knowledge for Web Service Clustering , 2016 .

[20]  Enhua Wu,et al.  Robust dense reconstruction by range merging based on confidence estimation , 2016, Science China Information Sciences.

[21]  Xingming Sun,et al.  Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder , 2016, IEEE Transactions on Broadcasting.

[22]  Xingming Sun,et al.  Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.

[23]  Xiaohui Hu,et al.  Time Aware and Data Sparsity Tolerant Web Service Recommendation Based on Improved Collaborative Filtering , 2015, IEEE Transactions on Services Computing.

[24]  Sam Kwong,et al.  Efficient Motion and Disparity Estimation Optimization for Low Complexity Multiview Video Coding , 2015, IEEE Transactions on Broadcasting.

[25]  Xiaodong Liu,et al.  A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.

[26]  Hua Wang,et al.  A Evaluation Method for Web Service with Large Numbers of Historical Records , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[27]  MengChu Zhou,et al.  A Novel Method for Calculating Service Reputation , 2013, IEEE Transactions on Automation Science and Engineering.

[28]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[29]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[30]  Bin Gu,et al.  Incremental learning for ν-Support Vector Regression , 2015, Neural Networks.

[31]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[32]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[33]  Jinjun Chen,et al.  Weighted principal component analysis-based service selection method for multimedia services in cloud , 2014, Computing.

[34]  Mingdong Tang,et al.  Location-Aware Collaborative Filtering for QoS-Based Service Recommendation , 2012, 2012 IEEE 19th International Conference on Web Services.

[35]  Ching-Hsien Hsu,et al.  Collaboration reputation for trustworthy Web service selection in social networks , 2016, J. Comput. Syst. Sci..

[36]  Tinghuai Ma,et al.  Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..

[37]  Yuming Zhou,et al.  A Context-Aware Service Selection Approach Based on Historical Records , 2015, 2015 International Conference on Cloud Computing and Big Data (CCBD).

[38]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[39]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[40]  Peng Jin,et al.  Fast reference frame selection based on content similarity for low complexity HEVC encoder , 2016, J. Vis. Commun. Image Represent..

[41]  Jamal Bentahar,et al.  A survey on trust and reputation models for Web services: Single, composite, and communities , 2015, Decis. Support Syst..

[42]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[43]  Jinjun Chen,et al.  A QoS-aware Web Service Selection Method Based on Credibility Evaluation , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[44]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[45]  Xingming Sun,et al.  Structural Minimax Probability Machine , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[46]  Todd G. Shields,et al.  The Vanishing Marginals, the Bandwagon, and the Mass Media , 1994, The Journal of Politics.

[47]  Chengsheng Yuan,et al.  Fingerprint liveness detection based on multi-scale LPQ and PCA , 2016, China Communications.