ServiceTrust: Supporting Reputation-Oriented Service Selection

  • Qiang He
  • Jun Yan
  • Hai Jin
  • Yun Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5900)


Service transactions, although attached with service level agreements, may still fail due to various reasons, intentionally or accidentally, in the open and volatile service-oriented environment. In service selection, consumers often need to estimate the trustworthiness of the provider with limited prior experience and knowledge about them. Moreover, the service-oriented environment exposes consumers to unique threats including malicious reputation manipulation and quality-of-service (QoS) abuse. This paper presents ServiceTrust – a novel trust management approach to support reputation-oriented service selection by quantifying and comparing the trustworthiness of providers based on their historic performance over service transactions. ServiceTrust combines a consumer’s and other consumers’ personal trust to estimate the provider’s trust value. Our experimental results demonstrate that ServiceTrust can significantly increase the success rate of service transactions and is effective in resisting malicious reputation manipulation and QoS abuse.


Service-oriented computing Web services service selection trust service reputation 


  1. 1.
    Ardagna, D., Pernici, B.: Adaptive Service Composition in Flexible Processes. IEEE Transactions on Software Engineering 33(6), 369–384 (2007)CrossRefGoogle Scholar
  2. 2.
    Blau, P.: Exchange and Power in Social Life. John Wiley & Sons, New York (1964)Google Scholar
  3. 3.
    Chou, Y.-l.: Statistical Analysis: With Business and Economic Applications. Holt, Rinehart and Winston (1969)Google Scholar
  4. 4.
    Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing Reputable Servents in a P2P Network. In: Proceedings of 11th International Conference on World Wide Web, pp. 376–386. ACM Press, Honolulu (2002)Google Scholar
  5. 5.
    Damiani, E., Vimercati, D.C.D., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of 9th ACM Conference on Computer and Communications Security, pp. 207–216. ACM Press, Washington (2002)CrossRefGoogle Scholar
  6. 6.
    Doyle, S.X., Roth, G.T.: Selling and Sales Management in Action: The Use of Insight Coaching to Improve Relationship Selling. Journal of Personal Selling & Sales Management 12(1), 59–64 (1992)Google Scholar
  7. 7.
    Gefen, D.: E-Commerce: the Role of Familiarity and Trust. Omega 28(6), 725–737 (2000)CrossRefGoogle Scholar
  8. 8.
    He, Q., Yan, J., Yang, Y., Kowalczyk, R., Jin, H.: Chord4S: A P2P-based Decentralised Service Discovery Approach. In: Proceedings of IEEE International Conference on Services Computing, pp. 221–228. IEEE Computer Society, Honolulu (2008)CrossRefGoogle Scholar
  9. 9.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  10. 10.
    Jin, L.-j., Machiraju, V., Sahai, A.: Analysis on Service Level Agreement of Web Services. Technical Report, HP Laboratories (2002),
  11. 11.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of 12th International World Wide Web Conference, pp. 640–651. ACM Press, Budapest (2003)Google Scholar
  12. 12.
    Ko, J.M., Kim, C.O., Kwon, I.-H.: Quality-of-Service Oriented Web Service Composition Algorithm and Planning Architecture. Journal of Systems and Software 81(11), 2079–2090 (2008)CrossRefGoogle Scholar
  13. 13.
    Lam, S.K., Riedl, J.: Shilling Recommender Systems for Fun and Profit. In: Proceedings of 13th International Conference on World Wide Web, pp. 393–402. ACM Press, New York (2004)CrossRefGoogle Scholar
  14. 14.
    Luhmann, N.: Trust and Power. Wiley, Chichester (1979)Google Scholar
  15. 15.
    Marsh, S.P.: Formalising Trust as a Computational Concept, in Department of Mathematics and Computer Science Stirling, Scotland, UK, University of Stirling (1994)Google Scholar
  16. 16.
    McKnight, D.H., Choudhury, V., Kacmar, C.: Trust in E-Commerce Vendors: A Two-Stage Model. In: Proceedings of 21st International Conference on Information Systems, pp. 532–536. ACM Press, Brisbane (2000)Google Scholar
  17. 17.
    Mitchell, W.: Dual Clocks: Entry Order Influences on Incumbent and Newcomer Market Share and Survival When Specialized Assets Retain Their Value. Strategic Management Journal 12(2), 85–100 (1991)CrossRefGoogle Scholar
  18. 18.
    Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  19. 19.
    Ross, S.M.: Introduction to Probability and Statistics for Engineers and Scientists. Academic Press, Cleveland (2000)zbMATHGoogle Scholar
  20. 20.
    Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks. In: Proceedings of 14th International Conference on World Wide Web, pp. 422–431. ACM Press, Chiba (2005)CrossRefGoogle Scholar
  21. 21.
    Swan, J.E., Nolan, J.J.: Gaining Customer Trust: A Conceptual Guide for the Salesperson. Journal of Personal Selling & Sales Management 5(2), 39–48 (1985)Google Scholar
  22. 22.
    Wang, Y., Lin, K.-J.: Reputation-Oriented Trustworthy Computing in E-Commerce Environments. IEEE Internet Computing 12(4), 55–59 (2008)CrossRefGoogle Scholar
  23. 23.
    Wang, Y., Varadharajan, V.: A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. In: Zhou, X., Su, S., Papazoglou, M.P., Orlowska, M.E., Jeffery, K. (eds.) WISE 2004. LNCS, vol. 3306, pp. 730–735. Springer, Heidelberg (2004)Google Scholar
  24. 24.
    Wang, Y., Wong, D.S., Lin, K.-J., Varadharajan, V.: Evaluating Transaction Trust and Risk Levels in Peer-to-Peer E-Commerce Environments Information Systems and E-Business Management 6(1), 25–48 (2008)Google Scholar
  25. 25.
    Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)CrossRefGoogle Scholar
  26. 26.
    Yu, B., Singh, M.P., Sycara, K.: Developing Trust in Large-Scale Peer-to-Peer Systems. In: Proceedings of 1st IEEE Symposium on Multi-Agent Security and Survivability, pp. 1–10. IEEE CS Press, Philadelphia (2004)Google Scholar
  27. 27.
    Yu, B., Singh, M.P., Sycara, K.: A Reputation-Based Approach for Choosing Reliable Resources in Peer to Peer Networks. In: Proceedings of 9th ACM Conference on Computer and Communications Security, pp. 207–216. ACM Press, Washington DC (2002)Google Scholar
  28. 28.
    Zeng, L., Benatallah, B., Dumas, M., Kalagnanam, J., Sheng, Q.Z.: Quality Driven Web Services Composition. In: Proceedings of 12th International Conference on World Wide Web, Budapest, Hungary, pp. 411–421 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Qiang He
    • 1
    • 2
  • Jun Yan
    • 3
  • Hai Jin
    • 1
  • Yun Yang
    • 2
  1. 1.School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhanChina
  2. 2.Faculty of Information and Communication TechnologiesSwinburne University of TechnologyMelbourneAustralia
  3. 3.School of Information Systems and TechnologyUniversity of WollongongWollongongAustralia

Personalised recommendations