{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:54:21Z","timestamp":1770141261098,"version":"3.49.0"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"crossref","award":["DP220101823 and LE220100078"],"award-info":[{"award-number":["DP220101823 and LE220100078"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>We propose a novel end-to-end trust management framework for crowdsourced Internet of Things (IoT) services. The framework targets three main aspects:<jats:italic>trust assessment<\/jats:italic>,<jats:italic>trust information credibility and accuracy<\/jats:italic>, and<jats:italic>trust information storage<\/jats:italic>. We harness the<jats:italic>usage patterns<\/jats:italic>of IoT consumers to offer a trust assessment that<jats:italic>adapts<\/jats:italic>to IoT consumers\u2019 uses. Additionally, our framework ascertains the<jats:italic>credibility<\/jats:italic>and<jats:italic>accuracy<\/jats:italic>of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the<jats:italic>contextual fairness<\/jats:italic>between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the<jats:italic>integrity<\/jats:italic>and<jats:italic>availability<\/jats:italic>of trust information.<\/jats:p>","DOI":"10.1145\/3600232","type":"journal-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T11:00:28Z","timestamp":1685617228000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An End-to-end Trust Management Framework for Crowdsourced IoT Services"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0372-4736","authenticated-orcid":false,"given":"Mohammed","family":"Bahutair","sequence":"first","affiliation":[{"name":"University of Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1254-8092","authenticated-orcid":false,"given":"Athman","family":"Bouguettaya","sequence":"additional","affiliation":[{"name":"University of Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844130"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3052219"},{"key":"e_1_3_1_5_2","article-title":"Just-in-time memoryless trust for crowdsourced IoT services","author":"Bahutair Mohammed","year":"2020","unstructured":"Mohammed Bahutair, Athman Bouguettaya, and Azadeh Ghari Neiat. 2020. Just-in-time memoryless trust for crowdsourced IoT services. arXiv:2005.14413. Retrieved from https:\/\/arxiv.org\/abs\/2005.14413.","journal-title":"arXiv:2005.14413"},{"key":"e_1_3_1_6_2","first-page":"1","volume-title":"Proceedings of the International Workshop on Self-aware Internet of Things","author":"Bao Fenye","year":"2012","unstructured":"Fenye Bao and Ing-Ray Chen. 2012. Dynamic trust management for internet of things applications. In Proceedings of the International Workshop on Self-aware Internet of Things. ACM, 1\u20136."},{"key":"e_1_3_1_7_2","first-page":"1","volume-title":"Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM\u201912)","author":"Bao Fenye","year":"2012","unstructured":"Fenye Bao and Ray Chen. 2012. Trust management for the internet of things and its application to service composition. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM\u201912). IEEE, 1\u20136."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.007"},{"key":"e_1_3_1_9_2","first-page":"1","volume-title":"Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN\u201918)","author":"Bulut Eyuphan","year":"2018","unstructured":"Eyuphan Bulut, Steven Hernandez, Aashish Dhungana, and Boleslaw K. Szymanski. 2018. Is crowdcharging possible? In Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN\u201918). IEEE, 1\u20139."},{"issue":"37","key":"e_1_3_1_10_2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin et\u00a0al. 2014. A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014). https:\/\/ethereum.org\/en\/whitepaper\/.","journal-title":"White Paper"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS110303056C"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.061"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101882"},{"key":"e_1_3_1_16_2","first-page":"382","volume-title":"International Workshop on Artificial Neural Networks","author":"Engelbrecht Andries Petrus","year":"1995","unstructured":"Andries Petrus Engelbrecht, Ian Cloete, and Jacek M. Zurada. 1995. Determining the significance of input parameters using sensitivity analysis. In International Workshop on Artificial Neural Networks. Springer, 382\u2013388."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_1_19_2","first-page":"9","volume-title":"Proceedings of the IEEE 8th International Conference on Cloud Computing","author":"Habak Karim","year":"2015","unstructured":"Karim Habak, Mostafa Ammar, Khaled A. Harras, and Ellen Zegura. 2015. Femto clouds: Leveraging mobile devices to provide cloud service at the edge. In Proceedings of the IEEE 8th International Conference on Cloud Computing. IEEE, 9\u201316."},{"issue":"2004","key":"e_1_3_1_20_2","first-page":"41","article-title":"A comprehensive foundation","volume":"2","author":"Haykin Simon","year":"2004","unstructured":"Simon Haykin and Neural Network. 2004. A comprehensive foundation. Neural Netw. 2, 2004 (2004), 41.","journal-title":"Neural Netw."},{"key":"e_1_3_1_21_2","first-page":"1059","volume-title":"Proceedings of the ACM Conference on Ubiquitous Computing","author":"Huang Ke","year":"2012","unstructured":"Ke Huang, Chunhui Zhang, Xiaoxiao Ma, and Guanling Chen. 2012. Predicting mobile application usage using contextual information. In Proceedings of the ACM Conference on Ubiquitous Computing. ACM, 1059\u20131065."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_1_23_2","first-page":"1","volume-title":"Proceedings of the IEEE Symposium on Computers and Communication (ISCC\u201914)","author":"Kantarci Burak","year":"2014","unstructured":"Burak Kantarci and Hussein T. Mouftah. 2014. Mobility-aware trustworthy crowdsourcing in cloud-centric internet of things. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC\u201914). IEEE, 1\u20136."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2263379"},{"key":"e_1_3_1_25_2","article-title":"Composing energy services in a crowdsourced IoT environment","author":"Lakhdari Abdallah","year":"2020","unstructured":"Abdallah Lakhdari, Athman Bouguettaya, Sajib Mistry, and Azadeh Ghari Neiat. 2020. Composing energy services in a crowdsourced IoT environment. IEEE Trans. Serv. Comput. (2020).","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-030-03596-9_24","volume-title":"Proceedings of the International Conference on Service-Oriented Computing","author":"Lakhdari Abdallah","year":"2018","unstructured":"Abdallah Lakhdari, Athman Bouguettaya, and Azadeh Ghari Neiat. 2018. Crowdsourcing energy as a service. In Proceedings of the International Conference on Service-Oriented Computing. 342\u2013351."},{"key":"e_1_3_1_27_2","first-page":"362","volume-title":"Proceedings of the IEEE International Conferences on Big Data and Cloud Computing, Social Computing and Networking, and Sustainable Computing and Communications (BDCloud-SocialCom-SustainCom\u201916)","author":"Lakhdari Abdallah","year":"2016","unstructured":"Abdallah Lakhdari, Aicha Chorana, Hadda Cherroun, and Abdelmounaam Rezgui. 2016. A link strength based label propagation algorithm for community detection. In Proceedings of the IEEE International Conferences on Big Data and Cloud Computing, Social Computing and Networking, and Sustainable Computing and Communications (BDCloud-SocialCom-SustainCom\u201916). IEEE, 362\u2013369."},{"key":"e_1_3_1_28_2","first-page":"203","volume-title":"Concurrency: The Works of Leslie Lamport","author":"Lamport Leslie","year":"2019","unstructured":"Leslie Lamport, Robert Shostak, and Marshall Pease. 2019. The Byzantine generals problem. In Concurrency: The Works of Leslie Lamport. 203\u2013226."},{"key":"e_1_3_1_29_2","first-page":"1222","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"25","author":"Liu Guanfeng","year":"2011","unstructured":"Guanfeng Liu, Yan Wang, and Mehmet Orgun. 2011. Trust transitivity in complex social networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 25. 1222\u20131229."},{"issue":"2","key":"e_1_3_1_30_2","first-page":"152","article-title":"Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks","volume":"6","author":"Liu Guanfeng","year":"2011","unstructured":"Guanfeng Liu, Yan Wang, Mehmet A. Orgun, and Ee-Peng Lim. 2011. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. 6, 2 (2011), 152\u2013167.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359636"},{"key":"e_1_3_1_32_2","first-page":"38","volume-title":"International Conference on Web Information Systems Engineering","author":"Malik Zaki","year":"2007","unstructured":"Zaki Malik and Athman Bouguettaya. 2007. Evaluating rater credibility for reputation assessment of web services. In International Conference on Web Information Systems Engineering. Springer, 38\u201349."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.17"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.5555\/1655815"},{"key":"e_1_3_1_35_2","article-title":"The stellar consensus protocol: A federated model for internet-level consensus","volume":"32","author":"Mazieres David","year":"2015","unstructured":"David Mazieres. 2015. The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation 32 (2015). https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf.","journal-title":"Stellar Development Foundation"},{"key":"e_1_3_1_36_2","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto. 2019. Bitcoin: A Peer-to-peer Electronic Cash System. Technical Report. Manubot."},{"issue":"1","key":"e_1_3_1_37_2","first-page":"5","article-title":"Incentive-based crowdsourcing of hotspot services","volume":"19","author":"Neiat Azadeh Ghari","year":"2019","unstructured":"Azadeh Ghari Neiat, Athman Bouguettaya, and Sajib Mistry. 2019. Incentive-based crowdsourcing of hotspot services. ACM Trans. Internet Technol. 19, 1 (2019), 5.","journal-title":"ACM Trans. Internet Technol."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2672738"},{"key":"e_1_3_1_39_2","first-page":"18","volume-title":"Proceedings of the IEEE 23rd International Symposium onPersonal Indoor and Mobile Radio Communications (PIMRC\u201912)","author":"Nitti Michele","year":"2012","unstructured":"Michele Nitti, Roberto Girau, Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2012. A subjective model for trustworthiness evaluation in the social internet of things. In Proceedings of the IEEE 23rd International Symposium onPersonal Indoor and Mobile Radio Communications (PIMRC\u201912). IEEE, IEEE, 18\u201323."},{"key":"e_1_3_1_40_2","first-page":"138","volume-title":"Advanced Data Mining Techniques (1st ed.)","author":"Olson David L.","year":"2008","unstructured":"David L. Olson and Dursun Delen. 2008. Advanced Data Mining Techniques (1st ed.). Springer Publishing Company, Incorporated, 138."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036106"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060488"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.001"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(96)00002-9"},{"issue":"3","key":"e_1_3_1_46_2","first-page":"138","article-title":"Your apps give you away: Distinguishing mobile users by their app usage fingerprints","volume":"2","author":"Tu Zhen","year":"2018","unstructured":"Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, and Depeng Jin. 2018. Your apps give you away: Distinguishing mobile users by their app usage fingerprints. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 2, 3 (2018), 138.","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiq. Technol."},{"key":"e_1_3_1_47_2","article-title":"An endorsement-based trust bootstrapping approach for newcomer cloud services","author":"Wahab Omar Abdel","year":"2020","unstructured":"Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok, Azzam Mourad, and Gaith Rjoub. 2020. An endorsement-based trust bootstrapping approach for newcomer cloud services. Inf. Sci. (2020).","journal-title":"Inf. Sci."},{"issue":"5","key":"e_1_3_1_48_2","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/TSC.2014.2320262","article-title":"Reputation measurement and malicious feedback rating prevention in web service recommendation systems","volume":"8","author":"Wang Shangguang","year":"2014","unstructured":"Shangguang Wang, Zibin Zheng, Zhengping Wu, Michael R. Lyu, and Fangchun Yang. 2014. Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans. Serv. Comput. 8, 5 (2014), 755\u2013767.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_1_49_2","first-page":"55","volume-title":"Proceedings of the ACM Workshop on Cloud Computing Security","author":"Wang Weichao","year":"2009","unstructured":"Weichao Wang, Zhiwei Li, Rodney Owens, and Bharat Bhargava. 2009. Secure and efficient access to outsourced data. In Proceedings of the ACM Workshop on Cloud Computing Security. 55\u201366."},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971707"},{"key":"e_1_3_1_51_2","first-page":"106","volume-title":"Proceedings of the 7th International Workshop on Trust in Agent Societies","volume":"6","author":"Whitby Andrew","year":"2004","unstructured":"Andrew Whitby, Audun J\u00f8sang, and Jadwiga Indulska. 2004. Filtering out unfair ratings in bayesian reputation systems. In Proceedings of the 7th International Workshop on Trust in Agent Societies, Vol. 6. 106\u2013117."},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348567"},{"key":"e_1_3_1_54_2","first-page":"1","volume-title":"Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS\u201916)","author":"Zimmermann Torsten","year":"2016","unstructured":"Torsten Zimmermann, Jan R\u00fcth, Hanno Wirtz, and Klaus Wehrle. 2016. Maintaining integrity and reputation in content offloading. In Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS\u201916). IEEE, 1\u20138."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:31Z","timestamp":1750272931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3600232"],"URL":"https:\/\/doi.org\/10.1145\/3600232","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,21]]},"assertion":[{"value":"2022-07-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}