Trusted Service Provider Discovery Based on Data, Information, Knowledge, and Wisdom

被引:6
作者
Lei, Yu [1 ]
Duan, Yucong [2 ]
机构
[1] Inner Mongolia Univ, Dept Comp Sci, Hohhot, Inner Mongolia, Peoples R China
[2] Hainan Univ, Sch Comp & Cyberspace Secur, Haikou, Hainan, Peoples R China
关键词
Knowledge graphs; trusted service discovery; reasoning; PROTECTION; FRAMEWORK; SYSTEM;
D O I
10.1142/S0218194021400015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data, information, knowledge, and wisdom forms a progressive relationship. Information is formed by data collation. Knowledge is filtered, refined, and processed from relevant information. Wisdom is based on knowledge and is accumulated through experience. This paper uses the progressive relationship of service data, information, knowledge, and wisdom to explain the expression of service knowledge graph. It is an increasingly challenging demand to discover trusted Cloud service providers with service data, information, and knowledge. We propose an efficient method of trusted service provider discovery based on service knowledge graphs, called PDG (Provider Discovery based on Graphs), to ensure that each service instance of composite services in Cloud systems is trustworthy. PDG evaluates the outputs of service providers in service classes with the help of additional service information. According to the additional service information, service knowledge is generated and trusted service providers can be found easily. PDG improves the accuracy of processing results by automatically replacing data provided by untrusted service providers with results provided by trusted service providers.
引用
收藏
页码:3 / 19
页数:17
相关论文
共 47 条
[11]  
Duan YC, 2019, 2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), P133, DOI [10.1109/SNPD.2019.8935653, 10.1109/snpd.2019.8935653]
[12]   Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources [J].
Duan, Yucong ;
Sun, Xiaobing ;
Che, Haoyang ;
Cao, Chunjie ;
Li, Zhao ;
Yang, Xiaoxian .
IEEE ACCESS, 2019, 7 :99161-99176
[13]   Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture [J].
Duan, Yucong ;
Lu, Zhihui ;
Zhou, Zhangbing ;
Sun, Xiaobing ;
Wu, Jie .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 81 :323-335
[14]   Estimating the Complexity of Software Services Using an Entropy Based Metric [J].
Feuerlicht, George ;
Hartman, David .
SERVICE-ORIENTED COMPUTING - ICSOC 2015 WORKSHOPS, 2016, 9586 :15-23
[15]   On service discovery in mobile social networks: Survey and perspectives [J].
Girolami, Michele ;
Chessa, Stefano ;
Caruso, Antonio .
COMPUTER NETWORKS, 2015, 88 :51-71
[16]  
HUANG YM, 2018, ENTROPY-SWITZ, V20, DOI DOI 10.3390/E20110858
[17]   Research on cloud manufacturing service discovery based on latent semantic preference about OWL-S [J].
Jiao, Hejun ;
Zhang, Jing ;
Li, Jun Huai ;
Shi, Jinfa .
INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2017, 30 (4-5) :433-441
[18]  
Krötzsch M, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P5309
[19]   A Decentralized Trustworthy Context and QoS-Aware Service Discovery Framework for the Internet of Things [J].
Li, Juan ;
Bai, Yan ;
Zaman, Nazia ;
Leung, Victor C. M. .
IEEE ACCESS, 2017, 5 :19154-19166
[20]   Complexity and Entropy Analysis of a Multi-Channel Supply Chain Considering Channel Cooperation and Service [J].
Li, Qiuxiang ;
Chen, Xingli ;
Huang, Yimin .
ENTROPY, 2018, 20 (12)