• 제목/요약/키워드: trustworthy service

검색결과 55건 처리시간 0.035초

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템 (T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET)

  • 한인성;정홍식;박무성
    • 전자공학회논문지
    • /
    • 제50권1호
    • /
    • pp.51-63
    • /
    • 2013
  • MANET의 기반 연구 기술들의 결과를 토대로 현실 속에서 MANET을 활용하기 위한 응용으로써 다양한 서비스 발견 및 전달 기법들이 제안되고 있다. 본 논문에서는 MANET에서의 메시지 오버헤드의 최소화와 안정적인 서비스 발견 및 네트워크의 확장성을 보장하기 위한 T-Chord(Trustworthy-based Chord) 링 시스템을 제안한다. T-Chord 링 시스템은 모바일 환경에서 이동 노드들이 제공하는 서비스들을 효율적으로 관리하기 위해 P2P 오버레이 네트워크 기법을 이용한 서비스 발견 시스템으로, MANET에서 이동 노드들은 이동성을 갖으며 서비스 요청 노드, 서비스 제공 노드 그리고 서비스 전달 노드로써 동작하기 위해 이동 노드들의 Trustworthy 평가와 분산된 서비스 정보의 수집, P2P 오버레이 네트워크의 구성을 통한 O(Log N) 성능을 제공하는 Chord 알고리즘 모듈로 내부 시스템을 구성하였다. 시스템의 성능 평가는 NS2 시뮬레이터를 이용하여 기존의 서비스 발견 기법들과 서비스 발견 메시지 오버헤드, 서비스 발견 및 전달의 효율성, 네트워크의 확장성 측면에서 성능을 비교 평가하고 분석함으로써 MANET에서 효과적인 서비스 발견 및 전달의 우수함을 입증하였다.

The Influence of Service Recovery Justice on Intention to Recommend for Retailer

  • SHIN, Yongsun;KIM, Moonseop
    • 유통과학연구
    • /
    • 제18권2호
    • /
    • pp.91-98
    • /
    • 2020
  • Purpose: This research aimed to suggest retailing companies some ways to enhance customer satisfaction with service recovery and recommendation intention towards these companies. For this purpose, current study examined the relationships among service recovery justice, service failure severity, customer trust, recovery satisfaction and intention to recommend and the moderating role of ego-resilience. Research design, data and methodology: Current study developed a structural equation model in which perceived service recovery justice is a predictor, service failure severity, customer trust, recovery satisfaction are mediators, intention to recommend is a dependent variable and the ego-resilience is a moderator between the perceived service recovery justice and the customer trust and the recovery satisfaction. Data were collected from customers who experienced service failures from retailers. A total of 400 questionnaires were collected and 365 samples were used for analysis after deleting data having missing value. SPSS 25.0 and AMOS 24.0 were used to test the validity, reliability, and structural equation modeling. Results: Empirical results showed that the perceived service recovery justice had a negative influence on the perceived service failure severity and a positive influence on the customer trust and the recovery satisfaction. These results indicate that when customers perceive the service recovery justice more highly, they perceive the service failure less severe but they perceive the retailer more trustworthy and are satisfied with service recovery. In addition, the customer trust and the recovery satisfaction had a positive influence on the intention to recommend. These results indicate that when customers perceive the retailer more trustworthy and are satisfied with service recovery, they are more intend to recommend the retailer. Moreover, the influence of the perceived service recovery justice on the customer trust and the recovery satisfaction was moderated by the ego-resilience. Conclusions: This study contributed to the service recovery literature by proving the relationship among service recovery justice, service failure severity, customer trust, recovery satisfaction and intention to recommend. Moreover, current research introduced the ego-resilience into service recovery research area and revealed the moderation role of the ego-resilience. Managerially, this research suggested retailing companies some ways to effectively recover from service failure.

Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network

  • Tang, Yanan;Gao, Hui;Su, Xin;Lv, Tiejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.2831-2847
    • /
    • 2017
  • In this paper, a joint destination-relay selection and antenna mode selection scheme for full-duplex (FD) relay network is investigated, which consists of one source node, N FD amplify-and-forward (AF) relays and M destination nodes. Multiple antennas are configured at the source node, and beamforming technique is adopted. Two antennas are employed at each relay, one for receiving and the other for transmitting. Only one antenna is equipped at each destination node. In the proposed scheme, the best destination node is firstly selected according to the direct links between the source node and destination nodes. Then the transmit and receive mode of two antennas at each relay is adaptively selected based on the relaying link condition. Meanwhile, the best relay with the optimal Tx/Rx antenna configuration is selected to forward the signals. To characterize the performance of the proposed scheme, the closed-form expression of the outage probability is derived; meanwhile, the simple asymptotic expressions are also obtained. Our analysis shows that the proposed scheme obtains the benefits of multi-relay diversity and multi-destination diversity. Moreover, extra space diversity in the medium SNR region can be achieved due to the antenna selection at the relay. Finally, Monte-Carlo simulations are provided to consolidate the analytical results, and show the effectiveness of the proposed scheme.

Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

  • Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4305-4323
    • /
    • 2014
  • In this paper, we investigate the degrees of freedom (DOF) of the Y channel consisting of three single-antenna users and a two-antenna common access relay, where each user intends to exchange independent messages with the other two users with the assistance of the relay. We show that the DOF of this particular scenario is 1.5. In order to prove this result, we firstly derive a DOF upper bound based on cut-set bound by allowing cooperation among users, which shows that the total DOF is upper bounded by 1.5. Then we propose a novel transmission scheme based on asymmetric signal space alignment (ASSA) to demonstrate the achievability of the upper bound. Theoretical evaluation and numerical results confirm that the upper bound can be achieved by utilizing ASSA, which also proves the optimality of the ASSA-based scheme in terms of DOF. Combining the upper bound and achievability, we conclude that the exact DOF is 1.5. Moreover, we present a novel iterative joint beamforming optimization (I-JBO) algorithm to further improve the sum rate. Numerical simulations have been provided to demonstrate the convergence speed and performance advantage of the I-JBO algorithm.

로봇의 외형 구체화 정도 및 반응속도에 따른 로봇 인상 평가 (Evaluating Impressions of Robots According to the Robot's Embodiment Level and Response Speed)

  • 강다현;곽소나
    • 디자인융복합연구
    • /
    • 제16권6호
    • /
    • pp.153-167
    • /
    • 2017
  • 오늘 날 많은 로봇들이 탁상용으로 개발되면서, 사용자들은 작업환경에서 로봇과 음성을 기반으로 상호작용을 한다. 그러나 현재 기술적 한계로 인하여, 대안이 필요한 실정이다. 이에 생체신호 중 무조건 반사를 활용하여 사용자와 상호작용을 하는 로봇을 디자인하고자 본 연구를 설계하였다. 본 연구에서는 생체신호를 로봇에 보다 효과적으로 적용하기 위하여, 로봇 외형의 구체화 정도와 로봇의 반응 속도에 따라 사용자가 느끼는 로봇에 대한 전체적 서비스평가와 인지된 로봇의 지능, 적합성, 신뢰성, 사회성을 평가하였다. 실험 결과 로봇의 외형이 구체화되지 않은 2D로봇보다 외형이 구체화된 3D 로봇이 인지된 지능과 적합성이 긍정적으로 평가되었고, 반응 속도가 느릴 때보다 반응 속도가 빠를 때 전체적 서비스평가와 인지된 로봇의 지능, 적합성, 신뢰성, 사회성에서 긍정적으로 평가되었다. 또한 서비스, 신뢰성, 사회성 평가에서 로봇 외형의 구체화 정도와 로봇 반응 속도에 따른 교호효과가 있었다.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

신뢰적인 개방형 공유 인증 프로토콜 프레임워크 (A Framework for Trustworthy Open Shared Authentication Protocol)

  • 박승철
    • 정보처리학회논문지C
    • /
    • 제18C권6호
    • /
    • pp.389-396
    • /
    • 2011
  • 최근 들어 현재의 인터넷에서 널리 사용되고 있는 서비스 제공자 중심적인(service provider-centric) 고립형(isolated) 인증 모델의 사용자 편의성 부족, 고비용 구조, 그리고 프라이버시 보호 어려움 등의 문제를 해결하기 위해 단일 사인온(single sign-on) 기반의 공유 인증에 대한 연구가 활발하게 진행되어 왔다. 인증 제공자(authentication provider)의 인증 결과가 다수의 인터넷 서비스 제공자(service provider)에 의해 공유되는 공유 인증(shared authentication) 모델이 실제 인터넷 환경에 적용되기 위해서는 사용자, 서비스 제공자, 그리고 인증 제공자간의 인증 보증 수준(level of authentication assurance)과 인증 정보 보호 수준(level of authentication information protection)에 대한 신뢰가 매우 중요하다. 본 논문은 사용자 중심적인(user-centric) 동작과 개방형 신뢰 제공자 네트워크(trust provider network)와 결합된 신뢰적이고 프라이버시 보호가 가능한 공유 인증 프로토콜에 대한 프레임워크를 제시한다. 제안된 공유 인증 프로토콜 프레임워크는 상호동작 가능한 개방형의 신뢰적인 인증 서비스를 제공함으로써 기존 공유 인증 연구들과 차별화된다.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.