A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology

Web services have the advantage of being able to generate new value-added services based on existing services. To effectively compose Web services, the composition process necessitates that the services that will participate in a given composite service are more trustworthy than those that provide similar functionality. The trust mechanism appears to be a promising way for determining service selection and composition. Existing trust evaluation approaches do not take into account customer expectations. Based on fuzzy set theory and probability theory, this work proposes a unique Web service trust evaluation approach that is notable for its ability to provide personalized service selection based on customer expectations and preferences. The proposed approach defines trust as a fuzzy notion that is related to prior experiences and ratings, and expresses trust in two different forms. This work mainly solves two key issues in Web service trust architectures, bootstrapping trust for the newcomer services and deriving trust for composite services. The proposed approach combines the solutions to numerous issues in a natural way. The case study and approaches comparison demonstrate that the proposed approach is feasible.


Introduction
Currently, many organizations deploy various applications for business management. Rather than developing new solutions in-house, these applications are frequently constructed by integrating components produced by outside firms [1][2][3]. Web services are self-contained application components created on many platforms and advertised, hosted, and accessed via the Internet [4][5][6]. An elementary Web service is a network-accessible process that performs a defined task. When two or more elementary Web services are combined, a new Web service is created that performs a complex composite task that no single elementary service can accomplish alone [7][8][9]. In this case, the new Web service that contains the elementary Web services is called the composite service, and these elementary Web services are called the component services. The process of creating composite services can be performed iteratively, with one composite service serving as a component of a more complicated composite service. The true power of Web services, as demonstrated above, is their ability to be dynamically integrated into composite services, performing new tasks and conducting new business transactions [10][11][12].
To create a successful composite service, the correct component services need to be selected [2]. In the sector of Web services, how to select desirable Web services and composite appropriate Web services has been a major issue. Both for direct interactions and for specifying composite services, service selection is critical. The rapid growth of the Internet has resulted in a massive increase in the number of Web services, posing a challenge to consumers' ability to quickly and precisely locate their desirable services [13][14][15]. Furthermore, an increasing number of Web services from diverse service providers provide the same functionality [16]. Businesses today must comprehend not just what a Web service can do but also how well the Web service can do it. How to select the desired component services and recommend the satisfactory composite services are very important issues [17]. The non-functional characteristics of Web services, such as QoS (Quality of Service) and trust, are very essential criteria when selecting and composing the desirable Web services [18][19][20][21].
The QoS determines the performance of a Web service [22], so the QoS is regarded as the most important non-functional criterion for service selection and composition [23][24][25]. However, the QoS that a given Web service will supply is not predictable and foreseeable due to dynamic changes in network performance [3,8,17,[26][27][28]. Furthermore, various customers may be concerned with different QoS attributes, and different customers may assign different priority to the same QoS attributes [12,29,30]. To replace QoS-aware service selection and composition procedures, the attention has recently shifted to social techniques based on trust or reputation. The trust mechanism provides a smart and accurate solution to the issue of service selection and composition [2,31].
Trust in a Web service represents a certain level of confidence that the service will perform as expected [2]. Trust should be applicable to both elementary and composite services. Trust is based on a consumer's past interactions with or observations of a Web service, either directly with the customer or as reported by other customers. Each customer in a community can function as a rater, giving a service a rating based on his/her interactions with it. Individuals' ratings on the quality of a service are reflected in trust, which is customized and subjective. The higher a service's quality, the more trust the consumer has in it. Trust can be used to assess the overall quality of a service [32]. A trust model for Web services integrates past experiences or interactions to generate trust, allowing customers to identify good from bad services based on customers' ratings, and assisting customers in forecasting and selecting the best quality services [33,34].
Because trust can only exist in a risky and uncertain environment, where certain parts of the application are not within our control, trust is inherently uncertain. Our previous work defined trust in Web services using a mathematical model based on fuzzy theory and probability theory, and presented a customer-centric trust evaluation model for personalized service selection [35]. However, our previous work did not consider bootstrapping trust for the newcomer services and deriving trust for the composite services, which are two key issues in Web service trust architectures. This work will improve the previous work to form a complete Web service trust evaluation approach.
This work combines the solutions to numerous issues to develop a comprehensive and unified Web service trust evaluation approach. A motivation example is discussed in Section 2. The present research on bootstrapping trust for the newcomer services and deriving trust for the composite services are investigated in Section 3. The integrated trust evaluation approach is described in Section 4. Through a case study, Section 5 describes the proposed approach's practical applicability. This work compares the proposed approach to existing approaches in Section 6. Section 7 of the work finishes with an overview of the vast potentials of such an approach.

Motivation
First and foremost, a motivating case is offered to emphasize this work's motivation. Service-oriented architecture (SOA) systems have capabilities to dynamically compose Web services [6,36], including the following: • Service tracking to detect all available services and their rating information; • Service planning to design a composite service's execution process; • Service selection to determine the optimum service for each task node in a composite service process; • Service composition to generate a new service that performs the expected complex task by compositing the selected component services; • Service execution to perform the expected complex task according to the optimal composed plan.
A service workflow, i.e., a composite service, includes a set of tasks [37]. According to service planning, there may be more than one way to build a composite service [36]. Figure 1 depicts a composite service that can take one of two paths: Task 1 , Task 2 , Task 3 , Task 5 or Task 1 , Task 4 , Task 5 . Each task Task i may be performed by any elementary service in service class S i . The rating information of each elementary service is shown in Table 1.  Assume that Alice and Bob both need to select desired services in order to build the composite service. Table 1 shows that Alice and Bob are faced with the following three service selection scenarios:

1.
Alice and Bob have used and rated all of the candidate services (for example, in service class S 1 ). They can make decisions directly based on their own ratings. Of course, they can also make decisions based on ratings from previous customers who have used these services.

2.
Alice and Bob have never used any of the candidate services and have no knowledge of how well they perform (for example, in service class S 2 ). Only ratings submitted by other consumers who have used these services can help them make decisions.

3.
Alice and Bob have used some of the candidate services, but they have no knowledge of the performance of others (for example, in the service class S 4 ). They can make decisions based on ratings submitted by other consumers who have used these services, similar to the second scenario.
In this motivating example, there are three issues that should be noted. The first issue is to bootstrap trust for new Web services. s 3 is a new Web service in service class S 2 . No consumer has interacted with it, and no rating exists of its past behavior. Consequently, consumers are unable to evaluate its trustworthiness. A mechanism for assigning trust to new services must be specified so that they can compete for market share with existing services. The second issue is to reduce the influence of subjectivity and contingency when the ratings are few. In service class S 4 , there are only three ratings on s 7 , while there are 1540 ratings on s 8 . These three ratings cannot completely and effectively reflect the performance of s 7 , so consumers need to reduce the decision-making risk caused by the subjective and contingency when ratings on services are few. This issue is closely related to the first issue. The third issue is deriving trust for composite services. The composite service has two alternative paths, so customers need to choose one to execute. Choosing the option to implement the composite service is actually a decision to implement a more trustworthy composite service. Another mechanism must be defined to derive trust for composite services, allowing customers to select them as elementary services.
Our previous work has modeled the uncertainty of trust and implemented personalized service selection. This work will improve our previous work and address the following issues: 1.
How do new services without past experience and customer ratings take part in the competition; 2.
How to derive the trust value of a composite service according to the trust values of its component services while ensuring that the resultant trust values have the same properties.

Related Work
Trust in Web services is a critical prerequisite for their widespread acceptance in an open and dynamic network environment [10,38]. To ensure Web service trust, a set of trust criteria and frameworks should be supplied. Academics have different perspectives on trust, so studies were based on distinct perspectives [39]. Some academics investigated policy-based Web service trust, while others investigated reputation-based Web service trust. Mahmud and Usman conducted a systematic literature review with the aim of identifying and classifying existing studies on trust establishment and estimation in services [40]. This work's major goal is to investigate reputation-based trust in Web service, so here we mainly survey the relevant literature on reputation-based trust evaluation approaches for Web services. A reputation-based trust system can be used to identify suitable services or service providers based on past experiences or consumer ratings and gauge customer satisfaction with Web services [41].
Web services are typically represented and defined over three main architectures: single, composite, and communities [33], and this work deals with both single and composite architectures. Trust evaluation research in the single architecture focuses on bootstrapping trust, rating credibility, trust dynamics, and the processes of developing and upgrading trust or reputation. Our previous work has addressed issues other than bootstrapping trust.
Bootstrapping trust for a newcomer Web service means assigning an initial trust value for it [42], which is a key issue in Web service trust models [43,44]. Because historical information on newcomer Web services is unavailable, bootstrapping trust becomes a significant difficulty that most existing Web service trust models overlook [44,45]. Malik and Bouguettaya looked at a variety of ways for bootstrapping new Web service reputations equitably and properly, as well as their shortcomings [44]. Existing bootstrapping trust solutions fall into three main categories: default, punishment-based, and adaptive [46]. The default value-based approach assigns a default trust value to each newcomer service, while the punishment-based approach assigns a low trust value to newcomer services. Both these two approaches have drawbacks; if the initial trust value is high, existing services will be disadvantaged, while a low initial trust value will prevent newcomer services from competing. The adaptive bootstrapping trust approaches assign the initial trust value of a newcomer service by measuring the similarity between the newly deployed service and some existing services. The adaptive bootstrapping is the current resident bootstrapping trust solution. Nguyen et al. presented a trust bootstrapping approach with three auxiliary mechanisms, including inheritance, recommendation, and assurance mechanisms, which is distinguished by the fact that the bootstrapping mechanisms are combined with existing trust models to maximize the accuracy of the trust assessment process in the initial stage [45]. This approach is based on the characteristics and nature of the newcomer Web service itself, as well as the community, in order to apply appropriate bootstrapping mechanisms so that the assigned initial trust value is truly indicative of the newcomer's capabilities. Yahyaoui and Zhioua introduced a new approach to bootstrap Web service trust by observing Web service interactions with customers over a certain time horizon [42]. The observation sequence is modeled as a Hidden Markov Model and matched with a predefined trust model to evaluate the behavior of such a Web service. The predefined trust model is a specification of the possible behavior of the Web service. Based on the matching results, an initial trust value is assigned to the Web service. Wahab and his colleagues suggested a peer-reviewed solution [46]. The trust bootstrapping mechanism is made up of a machine learning method for obtaining endorsements for newcomer services, a dishonesty-resistant endorsement aggregation technique, and a credibility updating mechanism for endorsers. Wu et al. presented a new technique to reputation bootstrapping in which artificial neural networks are utilized to learn correlations between existing service attributes and performance and then extend them to generate a provisional reputation when evaluating new and unknown services. The reputation bootstrapping also includes the reputations of previously published services from the same provider [47]. The above-mentioned bootstrapping trust methods are all adaptive methods, and the common shortcoming of these methods is that they require some priori information, but the bootstrapping trust problem is precisely caused by the lack of information.
The trust evaluation problem of composite services is a major focus of composite architecture research. It is important to involve trust in Web service composition when generating trustworthy composite Web services [48]. Yang et al. proposed a trust management system based on understanding and trust policies that are built on experience [49]. The trust of the participating Web services is assessed based on previous experiences, allowing the composite service's trust to be determined based on the evaluation of each Web service and the composite service's aggregation topology. Paradesi et al. conceptualized behavior-based trust of Web services with a mathematical model that matches many of the intuitions one has about trustworthy Web services [50]. The model allows modeling the uncertainty of people's initial trust or distrust of Web services when there is no prior experience dealing with them. As the number of experiences with Web services increases, the level of certainty increases, although the proportion of positive experiences may remain fixed. Furthermore, when the same number of positive and negative experiences are gained, certainty is lowest. They also showed how the trust model for a single service may be used to derive trust for compositions. Yahyaoui suggested a trust-based game theoretical model with the goal of simulating the rivalry between services desiring to be assigned tasks and selecting the best candidate [51]. Web services utilize a Bayesian model to calculate a trust value for any other service willing to collaborate with them and then play a game to choose the best candidates. Kim et al. proposed a trust model that allows for the discovery and composition of services depending on their trustworthiness [52]. To determine the trustworthiness of services and service providers, the model relied on both direct and indirect consumer experience. Consumers can obtain a very trustworthy service that meets their quality and functional needs by using composing services. Gao et al. presented a formal service composition architecture for service selection [23]. They offered a subjective probability-theory-based trust evaluation approach for service composition plans, as well as a trust-oriented genetic algorithm to generate a near-optimal service composition plan with QoS limitations. Karimian et al. proposed a formulation for computing trust based on the transferable belief model using the basic concepts of belief combination and transferability [53]. Customer ratings of different interactions are combined to form a direct trust value. Trust in composite services is modeled over time using the generalized Bayes theorem in the transferable belief model, which takes into account the structure of each component in the service. Guo et al. proposed a trust-based service composition framework that uses a static program analysis approach to analyze the trust dependency between component services in a composite service. Based on this, the rating and trust dependency information is aggregated into a global trust calculation for the composite service [20]. It is important to note that a composite service can be used as a component of another more complex composite service. These current approaches to deriving trust for composite services lack the ability to generalize further.
Although there are already many approaches to serve bootstrapping trust for the newcomer services and deriving trust for the composite services, these existing trust evaluation approaches are limited in their scope of addressing issues. Their shortcomings are mainly as follows: Researchers have begun to recognize that Web service trust is an important attribute to measure and evaluate. Based on exploration and analysis of trust literature and extension of the online trust principles, Aljazzaf et al. presented some trust principles that form the basis of trust in Web services [54]. After a comprehensive reference to other literature [55,56], we believe that a Web service trust model should consider at least the following trust principles: • Trust is based on information: There is a need to know information about a Web service to establish trust. • Dynamic nature of trust: Trust is dynamic and changes over time and with future experiences. This requires a continuous evaluation of Web services' trustworthiness. • Trust and identity: Trust depends on identity. Having identity enables the past experience of the interactions to be built on and mapped to that identity. • Trust is based on context: Trust is not a fixed value connected with a Web service; rather, it is dependent on the performance of the service and only applies in a certain context at a specific time. • Categories of trust semantics: Semantic characteristics of trust ratings are important to interpret the meaning of those measurements.
• Individual and collective ratings: Considering individual and collective ratings to predict the trust in Web services helps the customer to make a better selection decisions. • Customer expectations: Trust is not absolute but a matter of degree. Therefore, a trust-based system helps the customer to select a Web service based on the customer's expectations. • Trust development phases: Trust in Web services should consider the three trust development phase (initial trust establishment, trust improvement, and trust stabilization). • Trust approaches: Using a hybrid of multiple trust methods results in a better and more robust method to model trust in Web services.
Our previous work has addressed some of the above Web service trust principles. This work is a further extension of the previous work and will address all the above principles. To facilitate description, we firstly defines some symbols, as shown in Symbol description list 1.
Symbol description list 1: 1. s i (i = 1, . . . , I) represents a concrete element in a service market.

3.
Direct trust is personal and subjective, representing an individual's rating on a Web service. t s l→i , which is in the range of [0, 1], represents customer c l 's direct trust in service s i .

4.
Indirect trust is the collective view of a Web service's character or standing. The collective view synthesizes the ratings submitted by the customers who have been interacted with the service. T i , which is called indirect trust in s i , represents the aggregation of individual direct trust in s i and is processed as a random variable in the range of [0, 1]. t s l→i is given subjectively by c l according to his/her historical interactions with s i , which evolves over time and with new interactions. If c l has engaged with s i and has given it a rating, t l→i = null; otherwise, t l→i = null. c l must keep updating his/her rating on s i in response to the successive QoS of s i supplied to him/her. The subjective evaluation disparities in the ratings on s i submitted by different customers represent the cognitive differences and preferences of these customers. T i is relatively objective and represents a collective evaluation of a group of customers. The ratings on s i submitted by customers are seen as samples of the random variable T i . In theory, T i should be continuous.
Due to the differences in characteristics between direct and indirect trust, this work expresses direct and indirect trust in distinct forms. This work tries to combine these two trust expressive forms to create a stronger and more comprehensive way for evaluating trust in Web services.
The process of selecting a service has evolved into a comparison of Web service trust. Because direct trust values are expressed as determinate values with a fairly basic comparison procedure, this work does not go into detail. It is worth noting that indirect trust values are random variables that can't be directly compared as determinate values. The statistical features of indirect trust values should be compared by service customers when comparing candidate services. s a and s a are two Web services that perform the same task with the indirect trust values T a and T a . Both T a and T a are continuous random variables with values in the [0, 1] range. To compare random variables T a and T a , a variety of methods can be employed, the most popular of which is to compare the expected values of T a and T a , that is, In this work, a novel random variable comparison method is employed, as indicated in Symbol description list 2.
Symbol description list 2:

5.
Expected trust level α is the lowest degree of trust that a consumer can expect from a Web service's competency in real-world situations. 6.
If Pr(T a α) > Pr(T a α), it is said that T a is greater than T a and s a is more trustworthy than s a for an expected trust level α ∈ [0, 1]. These two relationships are symbolically represented by the formulas ∇ α (T a ) > ∇ α (T a ) and ∇ α (s a ) ∇ α (s a ), respectively. 7.
The probability density functions of T a and T a are f a (x) and f a (x), respectively.
In different contexts, there may be different trust evaluation strategies [57], and different customers have different trust expectations for Web services, so the expected trust level α should be determined by the specific context and customer requirements. By setting different expected trust levels, the service comparison method enables personalized service selection because, for different expected trust levels, the results of the service comparison may be different.
This method of comparison seems very abstract, but in fact, we use it all the time. Many e-commerce sites such as Amazon now have customer ratings of the items they buy. These ratings are generally set at five levels, one to five stars. Customers who want to buy the items can refer to these ratings. Some customers pay attention to the proportion of four-star and above ratings, while others pay more attention to the proportion of five-star ratings. This reflects that different customers have different expectations of the items.

Deriving Trust for Composite Services
A composite service' trustworthiness is determined by the trustworthiness of its underlying component services [58]. A service composition system that may use the trustworthiness of separate components to evaluate the composite service's derived trustworthiness is currently a work in progress. This is due in part to the lack of a flexible trust evaluation paradigm. This challenge is addressed by the trust evaluation approach given in this work.
"A chain is no stronger than its weakest link", says an English proverb. Any system has a common characteristic in that different parts contribute differently to the system's performance, but the weakest part often determines the overall system's reliability. The whole is only as reliable as its weakest part. Similarly, a composite service is only as trustworthy as its least trustworthy component service.
In order to evaluate the trustworthiness of composite services, this work investigates four types of typical control flows that are frequently encountered in service compositions (see Figure 2) [9,19,50,[59][60][61]. For the sake of simplicity, this work considers a composition of two Web services, s i and s j , with the indirect trust values, T i and T j , respectively. T i and T j are continuous random variables with probability density functions f i (x) and f j (x), respectively, in the range [0, 1]. 1 0 f i (x) dx = 1 and 1 0 f j (x) dx = 1 are simple to find. s C stands for the composite service, and T C stands for its indirect trust value. It is reasonable to assume that T C is a continuous random variable with the probability density function f C (x) as well.
(a) Sequential Flow: Define as a sequence operator. s C = s i s j represents that the composite service s C executes the component service s i before moving on to the component service s j . In a sequential flow (see Figure 2a), each component service must be executed. According to the previously described idea about how to evaluate the trustworthiness of composite services, f C (x) can be computed as follows: The above formula shows that the composite service is only as trustworthy as its least trustworthy component service. (b) Concurrent Flow: Define as a parallel operator. s C = s i s j represents that the composite service s C executes both component service s i and component service s j concurrently. In a concurrent flow (see Figure 2b), like a sequential flow, each of the component services must be executed, existing only in the difference of execution sequence. As a result, f C (x) is computed in the same way as f C (x) for a sequential flow, i.e.: (c) Conditional Flow: Define ⊕ as a choice operator. s C = s i ⊕ s j represents that the composite service s C behaves as either component service s i or service s j . As shown in Figure 2c, any one of the component services is executed in a conditional flow. For example, let s i and s j be followed with executed probabilities, p 1 and p 2 (p 1 + p 2 = 1), respectively. By examining the composite task, these probability can be anticipated. f C (x) can be thought of as a weighted sum of f i (x) and f j (x), i.e.: (d) Iterative Flow: Define σ as an iteration operator. s C = σ n (s i ) represents that the composite service s C executes n times the component service s i . In an iterative flow, the component service must be executed similarly to a sequential flow. The difference is that the service is executed n times instead of just once (see Figure 2d). The value of n may not be constant and may vary depending on the runtime situation. The procedure for computing f C (x) is similar to that for a sequential flow, except must be applied n − 1 times iteratively, as follows: Proof of Theorem 1. In a sequential flow or concurrent flow, In an iterative flow, it is easy to see that: In the above formulae, F i (x) and F j (x) are the cumulative distribution functions of random variables T i and T j , respectively, namely, No matter what kind of control flows is deployed, we can always find 1 0 f C (x) dx = 1, i.e., the random variable T C is also in the range of [0, 1] like T i and T j . This ensures the Web service trust evaluation model maintains consistency for both elementary services and composite services. This paper has mathematically shown the methods to evaluate the trust of each flow. These evaluation methods can all be generalized to more than two component services in a straightforward way. In practice, a composition may consist of one or more of these basic control flows. No matter how complicated the composition is, the trustworthiness of the composition can be always evaluated.

Extension of Trust Evaluation Model
Customers should enter numerical values in the range of [0, 1] when rating s i . In practice, however, it is more appropriate for a consumer to express his/her direct trust in s i through a subjective qualitative evaluation rather than a quantitative evaluation. According to previous interactions with s i , customers make subjective qualitative ratings on s i initially, then convert these subjective qualitative ratings to quantitative forms. A comparison between a subjective qualitative rating and a reference value is used in the conversion. This work creates a conversion comparison table (see Table 2). Based on the semantic characteristics of these ratings, this work divides them into 11 categories, which correspond to 11 values. For example, the subjective qualitative rating "very untrustworthy" corresponds to the value 0.2, indicating that t s l→i is 0.2, and the subjective qualitative rating "rather trustworthy" corresponds to the value 0.7, indicating that t s l→i is 0.7. Note that a value in the middle, such as 0.78, indicates that s i has a subjective qualitative rating that is somewhere between "rather trustworthy" and "very trustworthy" but is closer to the latter. In doing so, T i will be treated as a discrete random variable with 101 possible values 0, 0.01, . . . , 1.00. To make the statement easier to understand, let x k symbolize the potential values of T i , namely, x k = k 100 for k = 0, 1, 2, . . . , 100. T i 's probability function is defined as follows: where x k ∈ {0, 0.01, 0.02, . . . , 1}, l ∈ {1, 2, . . . , L} and i ∈ {1, 2, . . . , I}. Cnt(t s l→i |t l→i = x k ) is the number of t s l→i when t s l→i = x k in Formula (5). Similarly, Cnt(t s l→i |t s l→i = null) is the number of t s l→i when t s l→i = null, also known as the number of actual ratings on s i . Because Cnt(t s l→i |t s l→i = null) cannot be 0, Formula (5) is applicable to the case where ratings are required on s i . In the discrete case, ∇ α (T a ) > ∇ α (T a ) is equivalent to ∑ 100 n=100α f a (x k ) > ∑ 100 n=100α f a (x k ), where α ∈ {0, 0.01, . . . , 1}. The above trust evaluation model has not taken into account the time decay of the ratings and the credibility of the raters. Older ratings are less important than newer ones since older ratings may become obsolete or meaningless as time passes. On the other hand, ratings submitted by more reliable raters are more significant. In Symbol description list 3, we have introduced some new symbols for the simplicity of expression. Symbol description list 3:

8.
η i represents the number of actual ratings on s i , i.e., η i =Cnt(t s l→i |t s l→i = null).

9.
τ represents current moment, τ l,i represents the moment when c l last updated the rating on s i , and φ l,i represents the time interval between τ and τ l,i , i.e., φ l,i = τ − τ l,i . 10. H(φ l,i ), which is in the range of [0, 1], represents a function of φ l,i . The smaller φ l,i is, the nearer the value of H(φ l,i ) to unity; the larger φ l,i is, the nearer the value of H(φ l,i ) to 0. In other words, H(φ l,i ) indicates the newness degree of t s l→i . 11. t c l→m , which is in the range of [0, 1], represents customer c l 's trust in another customer c m and also refers to the preference similarity between c l and c m in c l 's individual opinion. 12. T l→i represents personalized indirect trust in s i from c l 's perspective and is also processed as a random variable in the range of [0, 1]. t c l→m and H(φ l,i ) have completely different connotations, but they both emphasize the importance of a rating. A mechanism is needed to integrate them. Referring to the literature [62], the authors define a new function Z, which allows customers to express different preferences for the credibility of raters and the time decay of ratings. Z is defined as follows: where ξ > 0, l, m ∈ {1, 2, . . . , L} and i ∈ {1, 2, . . . , I}. ξ gauges the relative relevance of H(φ m,i ) to t c l→m in Formula (6). When ξ = 1, c l gives equal weight to H(φ m,i ) and t c l→m ; when ξ > 1, c l gives more weight to H(φ m,i ); and when ξ < 1, c l gives more weight to t c l→m . The probability function of T l→i is defined as follows: where x k ∈ {0, 0.01, 0.02, . . . , 1}, l, m ∈ {1, 2, . . . , L} and i ∈ {1, 2, . . . , I}. (7). Similarly, Sum(Z ξ (l, m, i)|t s m→i = null) is the sum of Z ξ (l, m, i) when t s m→i = null, also known as the number of c l 's calculated ratings on s i . Formula (7), like Formula (5), is applicable to the case that there must be ratings on s i . s a and s a are two Web services that perform the same task. From the perspective of c l , T l→a and T l→a are personalized indirect trust values of s a and s a , respectively. It is said that T l→a is greater than T l→a and s a is more trustworthy than s a in c l 's viewpoint if Pr(T l→a α) > Pr(T l→a α) for an expected trust level α ∈ {0, 0.01, 0.02, . . . , 1}. These two relationships are symbolically described by the equations ∇ α (T l→a ) > ∇ α (T l→a ) and ∇ α (s a ) l ∇ α (s a ) l , respectively.
Our previous work designed a trust management mechanism based on peer-to-peer network, where each customer in the community is both a provider and a requester of ratings. This mechanism makes it easy to store and manage t c l→m , t s m→i and τ m,i , and allows flexible and robust support for personalized trust evaluation.

Bootstrapping Trust for Newcomer Services
Trust in Web services is established based on the historical ratings. It is tough to give a recommendation for a new service if no ratings are available [13] because there is usually no way to judge its initial trust value [42,44,45]. As a result, the new service cannot be compared with other services. The new service should be given an initial trust value. Existing services will be disadvantaged if the initial trust value is high, whereas a low initial trust value will deter new services from competing [42]. Furthermore, if a system relies on a few ratings to establish trust, the subjectivities of the raters may have an undue influence. One of the first issues service selection must address is how to allow a new service to compete. Introducing virtual ratings can effectively solve this problem. Virtual ratings are not real user ratings, and their introduction aims at constructing the indirect trust probability distribution for a new service. The values of the virtual ratings are hypothetical, i.e., possible values of user ratings in the absence of the a priori information available.
According to the law of large numbers, the frequency of a random event, as the number of trials increases, tends to a stable value. That is, plenty of ratings on s i can effectively and objectively reflect the statistical properties of T l→i . However, the question is, how much is plenty? There is no one-size-fits-all response to this question. The statistical features of T l→i can be portrayed more effectively and objectively the more calculated ratings on s i . Plenty is a fuzzy term similar to trust in that it is not a precise amount. In order to simplify the expression, we define some new symbols in Symbol description list 4.

Symbol description list 4:
13. Γ represents the set containing all non-negative numbers, while γ l→i represents the number of c l 's calculated ratings on s i , i.e., γ l→i =Sum(Z ξ (l, m, i)|t s m→i = null) and γ l→i ∈ Γ. 14. Plenty, denoted byP, is called a fuzzy set defined on Γ, which has a membership function µP : Γ → [0, 1]. For each γ l→i ∈ Γ, γ l→i is called a fuzzy member ofP. The value µP (γ l→i ) is called the grade of membership of γ l→i inP. It is self-evident that the larger γ l→i , the more γ l→i belongs toP. The grade of membership of 0 inP is 0, and the grade of membership of +∞ inP is 1. There is no one-size-fits-all way to create fuzzy membership functions. It is possible that more than one function can be utilized as the fuzzy membership function ofP. This work simply chooses one of these based on the present application needs. The function that has been chosen is as follows: In Formula (8), β is a parameter of the membership function. If c l presets β to various values, the function curve will be varied. Smaller β values can result in faster changes, whereas bigger β values can result in slower changes. However, the curve change trend is essentially the same. One instance of this function is shown in Figure 3. The goal of introducing virtual ratings is to build the probability distribution of T l→i for the new service s i that has few or no calculated ratings. If there are too many virtual ratings on s i introduced, the calculated ratings on s i will be buried; if there are too few virtual ratings on s i introduced, virtual ratings will not be able to play the role they should. The more calculated ratings on s i , the fewer virtual ratings on s i should be introduced. Of course, fewer is in relation to the number of calculated ratings on s i . Assume that there are γ l→i calculated ratings on s i and that δ l→i virtual ratings on s i should be introduced. It is reasonable to suppose that δ l→i is associated with γ l→i and µP (γ l→i ). In the case where there are γ l→i calculated ratings on s i , this work recommends that (γ l→i + 101)β γ l→i virtual ratings on s i should be introduced, i.e.: Figure 4 depicts the relationship between the number of calculated ratings on s i and the number of virtual ratings on s i . When the number of calculated ratings on s i increases from 0, the number of virtual ratings on s i that need be introduced also increases from 101. The number of virtual ratings on s i reaches a peak as the number of calculated ratings on s i grows, then progressively drops until it is near to 0. When the number of calculated ratings on s i is minimal, constructing probability function of T l→i needs to introduce virtual ratings on s i ; when the number of calculated ratings on s i is large, these calculated ratings on s i can construct probability function of T l→i effectively without the use of virtual ratings on s i . Figure 4 shows a curve changing trend that meets our perception of this issue. The next issue is how to set values for virtual ratings on s i . There is no reason to prefer one possible value over the others. The only plausible assumption is that each possible virtual rating value is assigned the same probability. This assumption is consistent with the maximum entropy principle. The essence of maximum entropy principle is that the most reasonable inference about the unknown distribution, given the known partial knowledge, is the most uncertain or random inference, which is the unbiased choice we can make. Under this assumption, δ l→i should be evenly divided into 101 smaller numbers. The probability function of T l→i in Formula (7) can be redefined as follows:

Two Corollaries
A question to examine in service composition is how to ensure that the composite service composed of optimal component services is also optimal. Formula (1) can be rewritten as follows in the discrete case: According to Theorem 1 and Formula (11), the following equation can be found: Because ∑ 100 k=100α f l→i (x k ) 1 and ∑ 100 k=100α f l→j (x k ) 1, we can find ∑ 100 As the number of component services in a composite service grows, the composite service's trustworthiness may deteriorate. People's perceptions are compatible with this finding. The following two corollaries can be found based on the prior discussion and Theorem 1: Let s a and s a , s b and s b be Web services offering the same function with c l 's indirect trust values T l→a and T l→a , T l→b and T l→b respectively. For an expected trust level Corollary 2. Consider a composition of two Web services, s i and s j , with c l 's indirect trust values T l→i and T l→j respectively. For an expected trust level α ∈ {0, 0.01, . . . , 1}, and ∇ α (σ n (T l→i )) ∇ α (T l→i ).

Case Study
Our previous work has shown the feasibility of the proposed approach, which models the social features of trust in the sector of Web services and can be exploited to personalize service selection. This study will not repeat the feasibility of the proposed approach but will instead undertake a case study to illustrate the details of bootstrapping trust for the newcomer services and deriving trust for the composite services so that they may be graphically described. The case study is programmed with Scilab and MySQL, and executed on a MacBook Pro computer with the following confgurations: Intel Core i5-4308U CPU, 8 GB RAM, and Windows 10 operating system.
To the best of our knowledge, no dataset exists that perfectly matches the proposed approach. We used some synthetic data based on the extended Epinions dataset, which is a real-world dataset from Trustlet (http://www.trustlet.org/extended_epinions.html, accessed on 19 December 2021) [63,64]. Trustlet.org is a wiki-based platform for open trust metric research with the purpose of collecting and disseminating trust network datasets and trust metric scripts to facilitate comparing different trust metric algorithms. Epinions is a website where people can review products. Customers can sign up for free and write subjective reviews about many different types of items. The extended Epinions dataset contains 13,668,320 customer ratings of items, in addition to the time when these ratings were last modified and the trust or distrust values that one customer has for other customers. In general, the extended Epinions dataset is more suitable for the proposed approach, but some transformations and modifications are still needed.
In the extended Epinions dataset, the values of original ratings are 1-5, which we need to transform to within the interval [0, 1]. The approach we take is to first correspond and convert 1, 2, 3, 4, and 5 to 0.1, 0.3, 0.5, 0.7, and 0.9, respectively. Then, we calculate the mean and variance of the post-transformation rating values of a given item and use them to estimate the parameters of the Beta distribution. Finally, the Beta distribution is used to generate the same number of generated ratings as the original ratings. These generated ratings are the final values we need. We randomly replace the original ratings with the generated ratings. The original trust value of a customer to another customer is 1, and the original distrust value is −1. We modify the distrust value to 0 and set the non-existent trust value of a customer to another customer to 0.5.
Assume that the customer with MEMBER_ID 239694 is the current customer c l . Consider the sequential flow consisting of Task 2 and Task 3 in Figure 1. The composite task performed by the sequential flow is denoted as Task C . There are a set of candidate Web services {s 3 , s 4 , s 5 } that can be used to perform Task 2 , while there is only one candidate Web service s 6 that can be used to perform Task 3 . c l needs to select one in S 2 for deployment. s 3 is a new service so there is no actual rating on it. The only candidate service s 6 for Task 3 naturally is selected to deploy. Assume that the item with OBJECT_ID 18887577220 is s 4 , the item with OBJECT_ID 17124462212 is s 5 , and the item with OBJECT_ID 1549857 is s 6 . They have 244, 125, and 1195 actual ratings, respectively. The latest date in the extended Epinions dataset is 2003-08-12, which we have taken as the current time τ. The unit for time interval φ l,i is days, and the function H(φ l,i ) is set to 0.998 φ l,i , i.e., H(φ l,i ) = 0.998 φ l,i . The parameter ξ of Z ξ (l, m, i) is set to 0.3, indicating that c l considers t c l→m to be more important than H(φ m,i ).
After calculating according to Formula (7), the original probability distributions for T l→3 , T l→4 , T l→5 , and T l→6 are shown in Figure 5. As can be seen from Figure 5, s 3 has no actual and calculated ratings and hence cannot participate in the competition; the actual and calculated rating numbers for both s 4 and s 5 are low, which can not effectively reflect their actual quality. In this instance, we must incorporate virtual ratings into the service selection process. Comparison of the number of actual ratings, the number of calculated ratings and the number of virtual ratings about the four services is shown in Table 3. After introducing virtual ratings, the probability distributions of T l→3 , T l→4 , T l→5 , and T l→6 are shown in Figure 6. From Figure 6, it can be seen that virtual ratings' effect on the probability distribution of T l→i reduces with the increasing number of calculated ratings on s i . s 3 is at initial trust establishment phase, while s 4 and s 5 are at trust improvement phase. It can be considered that s 6 is coming to trust stabilization phase. The comparisons of s 3 , s 4 , and s 5 are shown in Table 4.
This case study shows that for different expected trust levels, the services selected in the service selection process may be different, i.e., the optimal service is relatively optimal, rather than absolutely optimal. This case study also shows that a Web service with few or no ratings can participate in the competition and has the opportunity to be selected as the optimal service. This result accords with the fact that a consumer may try to select a new service when the existing services do not meet his/her expectations well, even though there is a decision-making risk.
As mentioned above, s 6 has been selected to perform Task 3 . If c l set α = 0.7, s 4 will be selected to perform Task 2 , then there is a composite service s C = s 4 s 6 . In the same way, if c l set α = 0.8, there is a composite service s C = s 3 s 6 . The probability distributions of T l→C and T l→C that are derived according to Formula (11) are shown in Figure 7, and the comparisons of s C and s C are shown in Table 5.  When α = 0.7, there is ∇ 0.7 (T l→C ) > ∇ 0.7 (T l→C ), so c l can find ∇ 0.7 (s C ) l ∇ 0.7 (s C ) l ; when α = 0.8, there is ∇ 0.8 (T l→C ) > ∇ 0.8 (T l→C ), so c l can find ∇ 0.8 (s C ) l ∇ 0.8 (s C ) l .
From Tables 4 and 5, the following phenomena can be seen. For a given expected trust level α ∈ [0, 1] and the same service there is ∇ α (s 3 s 6 ) l ∇ α (s 4 s 6 ) l , i.e., if the component services selected are optimal, the composite services containing these component services are also optimal.
It is worth noting that our proposed bootstrapping trust approach is applicable to the case when the overall rating values of the existing services are small. Only in this case, the new service is likely to be selected as the optimal service, i.e., it indicates that customers try the new service only if they are dissatisfied with the existing services. When the overall rating values of existing services are large, the new service is inhibited from competing. This is when additional mechanisms may be needed to enable the new service to be competitive.

Comparison with Other Approaches
The Web service trust evaluation approach proposed in this work is based on a new theory and focuses on personalized trust evaluation from the customers' perspective. This work introduces an unprecedented concept of expected trust level to express the lowest degree of trust that a consumer can expect from a Web service's competency. The approach proposed in this work is based on this concept. This concept is extremely subjective, and we cannot determine in advance the expected trust level for each customer. Customers set different trust expectations and may obtain different results. So, it is not meaningful for this approach to compare accuracy, efficiency, and other indicators with other approaches. Additionally, an exact benchmark trust value for a service does not exist. Various approaches for trust evaluation usually tackle different characteristics of trust. Trust evaluation is a socialization research method, and a feasible comparison scheme for trust evaluation approaches is to compare which approach is closer to the real society and better reflects the socialization characteristics of trust.
In the sector of Web services, reputation-based trust approaches primarily address concerns such as bootstrapping trust, rating credibility, trust dynamism, and trust derivation for composite services, among others. This work defines a set of criteria for the success and efficacy of reputation-based trust approaches targeting the sector of Web services, based on the reference [33]. Table 6 summarizes these criteria. Table 6. Criteria for the trust approaches in the sector of Web services.

C1
Consider the trust dynamism.

C2
Account for both subjective and objective perspectives.

C3
Consider different degrees of ratings. C4 Consider time decay of ratings. C5 Filter unfair ratings. C6 Assess credibility of raters. C7 Bootstrap trust for the newcomer Web services. C8 Consider personalized trust evaluation. C9 Derive trust for composite services.
The approaches used for comparison were selected from articles published in refereed journals, all with different underlying principles. The common features of these selected articles are that they all consider both direct and indirect trust, and they all deal with Web service composition architectures. The approaches are compared in Table 7 using the criteria stated in Table 6.  [52] Gao et al. [23] Karimian et al. [53] 1 represents that the method supports the criterion. 2 represents that the method does not support the criterion.
The proposed approach does not take into account the filtering of unfair ratings, which could lead to collusion and deception issues. Some academics in the Web service management environment have undertaken research on identifying and filtering unfair ratings [65,66]. However, because there are no differences in their values, distinguishing between fair and unfair ratings is extremely difficult. Any type of customer rating is possible in an open environment because dynamic changes in network performance result in dynamic changes in QoS attributes. The vast majority of system participants are usually trustworthy, according to social network data [67]. The majority of the ratings will most likely be reasonable. Although this assumption is not always valid, it provides the foundation for building a trust/reputation system. A trust/reputation system would be pointless if the bulk of the ratings were unfair.
It is difficult to identify and filter out unfair ratings. Another technique to filter out unfair ratings is to assess the credibility of the raters. A trust evaluation approach should not just filter a rating if it differs from the majority opinion but should also consider whether the rating's inconsistency is attributable to real-life experience. As a result, just the rater's credibility is affected, but the rating remains [67]. Customers, for the most part, do not interact directly with one another. The association between trust and customer preference similarity has been proven in some research studies [68,69]. The trust that one customer has in another is based on their similarity in prior preferences. A rating given by a reputable customer carries more weight. This is how the issue is addressed in this work.
It is worth suggesting that the comparison of approaches here does not reflect methodological merits or demerits. Society is large and complicated, trust is full of fuzziness and randomness, these approaches all simulate only a part of trust socialization, and the effectiveness of these approaches can be tested only in the practice of real social relations.

Conclusions
This work proposes an approach to evaluate Web service trust based on uncertainty methodology. In general, the proposed trust evaluation approach adheres to trust principles and meets the expectations of service customers.
By introducing virtual ratings, this work provides a solution to bootstrapping trust. Even if a service has few or no actual and calculated ratings, it can nevertheless receive an initial trust value and participate in the competition. Furthermore, bootstrapping trust does not require any prior knowledge. Meanwhile, the bootstrapping trust mechanism can reduce decision-making risk by mitigating the negative effects of subjectivity and contingency.
The relationship between a composite service and its component services can be thought of as a whole-to-parts relationship. A composite service is only as trustworthy as its least trustworthy component service. The proposed solution follows this idea, and ensures that both elementary services and composite services are treated without any differences. In other words, the trust evaluation approach can maintain consistency for both elementary services and composite services.
This work integrates the aforementioned solutions in a natural way. The case study demonstrates the viability of the proposed approach.