Next Article in Journal
Applying Neural Networks with Time-Frequency Features for the Detection of Mental Fatigue
Previous Article in Journal
Driving-Style Assessment from a Motion Sickness Perspective Based on Machine Learning Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secured MCDM Model for Crowdsource Business Intelligence

by
Musiri Kailasanathan Nallakaruppan
1,*,
Ishita Johri
1,
SivaRamaKrishnan Somayaji
1,
Surbhi Bhatia
2,*,
Areej A. Malibari
3 and
Aliaa M. Alabdali
4
1
School of Information Technology and Engineering, Vellore Institute of Technology, Vellore P.O. Box 632014, India
2
Department of Information Systems, College of Computer Science and Information Technology, King Faisal University, P.O. Box 400, Al-Hasa 31982, Saudi Arabia
3
Department of Industrial and Systems Engineering, College of Engineering, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
4
Faculty of Computing & Information Technology, King Abdulaziz University, P.O. Box 344, Rabigh 21911, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Submission received: 29 December 2022 / Revised: 15 January 2023 / Accepted: 18 January 2023 / Published: 23 January 2023
(This article belongs to the Topic Multi-Criteria Decision Making)

Abstract

:
In the current era, there are a plethora of mobile phone companies rendering different features. It is challenging to distinguish the best and create correlations among them. However, this can be accomplished through crowdsourcing. Crowdsourcing is the process of gathering information from multiple sources, and we use the AHP (Analytic Hierarchy Process) process to determine which company’s model is the best among many. The weight value of each model is compared to the assigned values, and if one of the company product weights is greater than the assigned weight, that product is the best. Eventually, we can use this process to select the most preferred and best mobile phone model from among all other models. Gray Relational Analysis (GRA) is one of the most popular models, employing a grey co-efficient that estimates the data items by ranking. This model defines a process’s situation or state as black with no information and white with perfect information. In this work, AHP initially assumes criteria weights and assigns rank with the CR (Consistency Ratio) of 1.5%. The criteria weights are re-assigned based on the outcomes, and the CR remains constant as 1.5%. This work also provides an environmental-based attribute access control system, which adds the strength to the system by providing security and the integrity. So, this proposed work performs as a decision support system combined with the security enhancements, and hence it becomes a complete framework to provide a solution to a target application. The novelty of the proposed work is the combination of the crowdsourcing with the recommender system on a secured framework.

1. Introduction

Recommendation systems help users find meaningful and actionable information from large amounts of unorganized data. To meet a user’s needs or quickly find information that might be of interest to the user, these systems [1] filter and analyze vast amounts of information to help a particular user purchase a product. Users’ preferences can be used to predict and identify certain items. They are successfully used to support various decision-making processes, which helps people to find content of interest among the many options available. Crowdsourcing is the process by which the users can obtain goods, services and ideas from a large group of people. It divides the work between the workers to simplify the process and achieve the result easily. A critical need for real-time recommendations has emerged in crowdsourcing systems. On the one hand, users want effective recommendations of the top-most phones in terms of their use and features, and on the other hand, requesters want trustworthy recommendations of the best mobile phone models for their tasks in terms of cost and warranty. There is a difference between crowdsourcing and outsourcing. Crowdsourcing comes from less specific and more public groups, whereas outsourcing comes from specific or named groups. The Internet is the main source of crowdsourcing because users can obtain more sources and ideas from the internet. The advantages of crowdsourcing include speed, quality, scalability and flexibility. By crowdsourcing, the users obtain the weight value of the products. The weight value of the company’s product is checked with the assigned weight value. The weights are then compared; higher assigned weights provide the best product, while those with a lower assigned weight value are not the best products. As part of the decision-making process, the AHP helps by calculating the weight values. The weight values of the products collected via crowdsourcing which are then inputted to the AHP process to determine which is the best product among the different company products [2]. Such a structure is susceptible to deliberate misuse of the system’s resources, including asset destruction, theft, modification, invasion of privacy, interruption of operations, unauthorized use of assets and even bodily harm to personnel who have dataset rights. There is always danger, even if the company and all of its systems abide by the contracts, rules and regulations that may be relevant. Hence, a system such as this needs to be protected against any interference [3]. We propose a far-reaching access control technique that permits record owners to peruse and compose information while likewise upholding system-level encryption-related exercises. It is an extensive system which permits jobs to be coordinated progressively, in addition to fostering the job based admittance control model. Less advantaged positions are found at the lower part of the ordered progression, while the most elevated jobs are found at the top.

1.1. Contributions of the Paper

The system’s goal is to close the gap between recommender systems and crowdsourcing. Depending on the recommendation algorithm and context settings utilized, it will employ various recommendation methods, apply them in accordance with the present situation of known weights, and provide various alternatives for privacy-preserving recommendations. The proposed methodology maps explicit EBAACM model jobs to explicit arrangements of qualities, and higher jobs can acquire all authorizations from lower jobs. Here, jobs basically refers to the role or position a user holds. Various external attributes are also taken into consideration. This creates a safe transaction system for each digital identity of the user. Therefore, the system has comprehensive security for its data. The crowd sourcing and recommender systems are combined in this research, resulting in the proposed advance system and its success. This work also includes the provision of an environmental-based attribute access control system, which contributes to the robustness of the system by guaranteeing both its safety and its integrity. Therefore, the work that is being presented functions as a decision-support system, and when combined with the security advancements, it turns into a comprehensive framework that could serve as a solution to a specific application. The innovative aspect of the work that has been proposed here is the coupling of crowdsourcing with a recommender system within a protected environment.

1.2. Organization of the Paper

The format of the paper plan is as follows: An introduction to crowdsourcing and mobile sales prediction model can be found in Section 1. Section 2 provides an overview of the many prediction techniques employed by recommender systems in a variety of situations, some of which may involve crowdsourcing. With AI being used in the articles, Section 3 focuses on recent research on crowdsourcing. Analytical hierarchy procedure and gray relation analysis is covered in Section 4; the experimental results are covered in Section 5. According to observations and suggestions, Section 6 introduces the model’s safety and trustworthiness and also concentrates on the algorithm and how it contributes to strong security. Section 7 concludes the paper with a quick overview of its main ideas, suggestions for future investigations and other related observations.

1.3. Roles of AHP and GRA

Due of the multi-dimensionality and units of choice criteria, this research used fuzzy and rough number MCDM methods. It may be difficult to quantify the many aspects of a phone’s design that play a role in deciding which model is ideal, since these aspects often exist in more than one unit or dimension. Distinct membership functions in rough and fuzzy numbers eliminate bias in decision making. During the judging process, fuzzy and rough numbers decrease bias but increase computational labor. Fuzzy AHP (F-AHP) applications have been a milestone in evaluating weights for choice criteria as a result of the computational approach of a Fuzzy System. Fuzzy GRA (F-GRA) has also been effective because of its capacity to create comparable sequences and provide the sense of comparing options with a reference series [1]. The AHP provides subjective analysis where the opinions are acquired from experts in the relevant field of interest. On the other hand, the GRA is a completely independent objective-based ranking solution. This does not depend upon the weight importance, but only depends on the min–max composition and gray relation between them with the other values in the dataset. In the proposed work, we apply both AHP and GRA to ensure that the balance is achieved in the prediction of the subjective and objective analysis of these fuzzy systems. The final criteria importance of GRA is estimated through sensitivity analysis and the corresponding importance is re-assigned in AHP as weight importance. The consistency ration of AHP is compared before and after the change in criteria weights. If it remains the same, then the results are validated for the problem.

1.4. Advantages of AHP and GRA

There are various advantages in both AHP and GRA. These advantages are listed below in the different subsections.

1.4.1. Advantages of AHP

  • Simplicity.
  • Versatility.
  • Many criteria can be selected.
  • Easy to use.
  • Consistency check for working on collaborative projects.

1.4.2. Advantages of GRA

  • Weight independent and AHP independent.
  • Complete objective solution.
  • Simple and easy to apply.
  • No limitations on the sample size
  • Normal distribution of data.
  • Simple computation.

2. Literature Survey

In recent years, it has become important to determine the index weight reasonably. Otherwise it will have a bad influence on the objectivity and authenticity of the results. AHP and GRA processes are used to find the weight and then the best one is selected [4].
Based on the earlier data gathered by the platform during crowdsourcing, the researchers derive an incentive management approach based on mathematical optimization that executes business processes in a cost-optimal way considering their deadlines [5]. Crowdsourcing is a new business concept which involves different integrations of a job provider, a crowd worker and a crowdsourcing web-based platform, and it describes the existing business model of crowdsourcing and critical analysis for each business model [6]. The lightweight bricks are in high demand in the market. To meet this demand, they use AHP process and a decision tree for production decision making. AHP has a four-step developing hierarchy such as normalization, creating the pairwise comparison matrix, weight estimation and the synthesis and logical consistency test [7]. Enterprise brand concerns are between both the producer and the customer in the market, since the branding process issues are the perceived quality, brand knowledge, brand credibility, brand image and brand identity [8]. Service industries meet many intangible factors with tangible objects. Intangible factors such as innovative ideas, new service attributes, learning principles and self-service technologies have a great impact on business success and customer satisfaction, so the AHP and GRA is used to assign the local and global hierarchical priorities among the different categories of service quality attributes [9,10]. In this study, the authors use crowdsourcing to gather the information, and then the AHP process and GRA process is used to divide the large quantity of gathered information into small sub elements and identify which is the most preferable company using the weights.
In [11], presents a label aggregation strategy for hierarchical classification techniques. To demonstrate the value of introducing a hierarchical organizational structure and to increase the accuracy of label aggregation, an experiment was conducted using a real crowdsourcing problem of hierarchical classification. To create a more precise and nuanced interpretation, the proposed method in [12] shows how crowdsourcing, service experience visualization, and cluster analysis can all be used together. A cluster analysis of different values was used to find groups of participants who differ in their confusion and payment method ratings. Three of the five clusters found contained individuals exhibiting susceptibility to different types of disorders. This was surprising, as internal research from the telecom companies showed that the level of annoyance was greatly influenced by whether or not customers paid for the service. However, one of these three clusters contained individuals who were not sensitive to payment differentials and were relatively reconciled with non-collection. The interactive context-aware recommender system established by this study [13] advances the concept of human–computer interaction in traditional CAR. A car rental website built using the proposed iCAR technology is shown as a demonstration to confirm its feasibility and usefulness. The same information is used in this iCAR to help users find the vehicle that best suits their needs. iCAR used three-dimensional information, such as user, item and contextual information to enhance the accuracy of traditional CAR systems and provide users with more accurate recommendation results. The authors also plan to apply it to other industries, such as online shopping and travel package recommendations, to improve the results.
In [14], the authors describes the development, application and evaluation of ForeXGBoost, a car sales forecasting tool with high forecasting accuracy which requires little computing power. After exhaustive research to assess the impact of various variables on vehicle sales through information gathering and data association, the most meaningful items from the feature set are selected for prediction. Numerous tests confirm ForeXGBoost’s ability to combine low overhead with high prediction accuracy. In [15], the authors describe the Sturgis formulation, which is used to replace the iterative behavior of fuzzy logic within the prediction method. AFER (average forecasting mistakes rate) and SSM (suggest squared mistakes) are the metrics used. The effects showed that the ANFIS set of rules outperformed the bushy time series with AFER values much less than 15% and errors greater than 20%. ANFIS-MSE values notably decreased compared to fuzzy time series.
The research carried out by [16] aimed to reveal patterns of influence of certain factors on car sales in the European market and functional patterns for predicting future sales. Global aggregate indicators and indicators for specific regions or clusters were used to build mathematical prediction models and linear regressions. This means that applying the model to the test sample data yields good predictive accuracy. In [1], the authors propose the Gaussian process latent variable model factorization (GPLVMF) method, which is a nonlinear dimensionality reduction technique. The GPLVMF model is solved using a variational inference approach. There are two contributions when it comes to setting up the recommender system: fixing the real-valued latent space to use a real-valued context and handling the bias effects by setting a non-zero mean function.
The choice of a relevant machine tool is the most crucial challenge in the manufacturing industry, as it will affect the overall performance. The present multi-criteria decision-making (MCDM) method for choosing machine tools mostly emphasizes the subjective viewpoint. Wang et al. [17] deployed a modified hybrid MCMD model for the right machine tool selection. First, the proposed method uses an integrated weight strategy that combines subjective weights obtained through the fuzzy decision-making trial and evaluation laboratory (FDEMATEL), with objective weights gained through entropy weighing (EW). Then, the authors apply defuzzification VIKOR to obtain the ranking choice.
Due to the overwhelming number of service providers (SP) in crowdsourcing, the management of information is a rising issue. Shixin Xie et al. [18] intend to present an evaluation framework for quality of service (QoS) for SPs in KI-C to accurately and thoroughly characterize the QoS of SPs, which can help with the effective selection of qualified SPs. In order to use the collective intelligence of a large number of people, a task may be outsourced to an online marketplace for crowdsourcing. The crowdsourcing process saves time and money because of concurrent task execution and online labor markets. Everyone finds it difficult to choose the right jobs with the relevant labels and give them to the right workers during a crowdsourcing exercise. In this study [19], the authors have suggested a mechanism for allocating the task to the workers. To give the task to the most qualified worker, a multicriteria-based task assignment (MBTA) mechanism is developed. This mechanism employs methods for allocating weight to the factors and rating the workers. 5G technology, which is widely employed in the domains of medicine, transportation, energy and other industries, has developed quickly in recent years. 5G base stations, which are the essential components of the 5G network, enable wireless signal transfer between wired and wireless terminals, as well as wireless coverage. However, issues such as poor user experience and limited coverage area commonly arise as the number of 5G base stations gradually grows. Therefore, it is essential to assess the overall performance of 5G base stations in order to identify any issues that may have arisen during base-station installation. First, the operational performance, financial performance, environmental effect and social influence perspectives are used to build the performance evaluation [20] index system. Then, a unique hybrid multicriteria decision-making (MCDM) model based on the difference-quotient gray relational analysis (DQ-GRA) technique and the Bayesian best–worst method is implemented.

Literature Summary

A summary of relevant existing research works is provided in Table 1. In any Information and Communication system, authentication and authorization [21] are the major metrics to be taken care of to achieve an accurate performance of the system. Thus, in our proposed work, we have deployed an attribute-based access control system for better working efficacy. Recommender systems are typically information-filtering systems used to suggest relevant information to a user. There are various context-aware recommendation systems which are used for decision making in different scenarios [13]. This proposal uses a recommendation system to select the best mobile model based on various decision-support methods.

3. Recent Research on Crowdsourcing with AI

With the use of the internet, a large number of individuals can contribute information to a task or project through the practise of crowdsourcing.
Depending on the project, crowdsourced contributors can be either compensated or gratuitous. However, in the realm of artificial intelligence, most crowdsourcing work is an automated service. In machine learning, crowdsourcing comprises allowing the mass deployment of products and services. For machines to execute NLP and NLU tasks such as classification, feature engineering and decision-support system and text categorization, data labeling is helpful. The comparative analysis of various applications is presented in Table 2.

3.1. Crowdsourcing with Deep Learning

With the advancement in the web, most websites and social media use crowdsourcing to curtail the time and cost. The authors of [24] implemented a Bayesian network embedded with deep learning (DL) when inculcating the learning from the target crowd from different annotators. This framework uses low-rank structure in annotations. For learning, each annotator’s expertise is used to infer true labels from meager annotations. After inferring the true labels, the DL model is trained to improvise the learning process.

3.2. Crowdsourcing for Gesture Control in Smart Phones

Nowadays, smartphones have features which render better user interaction. Some smartphones use gesture-based inputs; tapping is one of the most frequently used features. Mobile vendors are striving hard to develop these gesture controls in accordance with user preferences. The authors of [25] developed a method for determining the tapping feature of a mobile by aggregating data using surveys and crowdsourcing. The authors implemented a deep neural network upon the data collected to find out users’ preference between a tappable and a non-tappable element. The authors also deployed a tappable technique called TapShoe, which auto-identifies disparities of tappability feature of an element.

3.3. Crowdsourcing for Crop Yield

Remote sensing imagery data are used to detect the plant health in a crop field. The challenge of this imagery data for creating crop-type maps is the deficiency of ground-truth labels. The work in [26] deployed convolution neural networks (CNNs) to generate the crop-type map using crowdsourced data, Sentinel-2 and remote sensing imagery. The farmer-generated images were used to calculate the crop-type labels which were inputted to the CNN model. However, the data had lot of noise and lacked location accuracy. After this, the data were pre-processed and the imagery data from remote sensing units were deployed in CNN for training to generate points in the crop field. The authors concluded that the CNN differentiates rice, cotton and “other” crops with 74% accuracy and provides better results than the random forest method.

3.4. Comparative Analysis

Three recent related research works were compared with the prescribed work. The first work is on the Bayesian network embedded with the Deep Learning for annotation purposes. The second work under comparison was gesture detection using artificial intelligence, and the third work under comparison was image analysis through sentinel-2 imagery. Apart from the accuracy levels, the prescribed work provides recommendations for privacy and security through an environment-based attribute access control model which provides recommendations for privacy and security in a crowd-sourcing domain, which is the prime highlight of the work. Thus, the prescribed work is a multi-dimensional solution in comparison with recent works on crowdsourcing.

4. Architecture of the System

The smartphone market is expanding worldwide due to a variety of factors, including rising disposable income, the development of telecom infrastructure, the appearance of smartphones designed with affordability in mind and an increase in the number of product launches. It is challenging for the user or buyer to stay true to his demands and purchase a suitable phone while taking into account all the characteristics required, what with so many models with such a variety of features entering the mainstream. A strong framework that essentially operates by giving weights to the features that a customer might take into account while making a decision is recommended as a solution to this problem. Using the AHP (Analytic Hierarchy Process), we were able to identify the best phone model after compiling all the pertinent data from various online resources. The system’s decision is based on a fuzzy weights system in which the weight value of each company’s product is compared to the weight value that has been assigned to it. The comparison identifies the top model at an intermediate level. One of the most popular models of gray system theory is the Gray Relational Analysis (GRA), which Deng Julong created. In this instance, GRA makes use of a particular idea: dividing the data into two categories, black or white, and identifying any areas of uncertainty that could be resolved effectively. Five attributes—name, model, pricing, feature and warranty—are taken into account throughout the recommender system’s decision-making process when employing calculated weights. The more significant quantitative characteristic that makes up the standardized matrix is determined by pairwise comparison and AHP scaling. In addition, GRA aids in the creation of the normalization and deviation matrices and the calculation of the gray relationship coefficient. For the intelligent decision support system, priority is determined in terms of a percentage and is ranked in order of priority. Sensitive data are processed by the system, making them susceptible to different cyberattacks and modification risks. Consequently, a role-based framework is advocated for system security. Users can range in privilege from low roles to high roles. Additionally, this confirms whether the environment in which the system functions has static or dynamic features. To provide a safe environment, the robust framework first employs the idea of a digital identity number and cryptographic operations. A unique identification is then generated for each operation and each stated role in the hierarchy using hashing techniques, maybe followed by double hashing. Key certificates produced by Certified Authorities (CA) and Proxy, which essentially serves as a semi-trusted server for data encryption and re-encryption, are additional functionality aspects of the system. It has a PKI key and an X.509 certificate to authenticate other system modules, which elaborates operation. Furthermore, a decision is made based on the role environment, which may include details about the external conditions, such as access times, working and non-working hours, geographies and other dynamic elements of the access-control scenario that may be paired with system properties. The overall architecture of the system is presented in Figure 1.

4.1. Analytical Hierarchy Process

The Analytic Hierarchy Process (AHP) is based on dividing a highly advanced problem into small sub-elements, then organizing and combining them to form an orderly hierarchical structure, and determining the relative importance of the elements through pairwise comparison and standardized comparison [27].
y = [ a j w j ] n / w l
AHP is a decision-making process which is used to decide the best product with the help of the previously outlined criteria [28]. Here, we will select the best product based upon the weights of the criteria which have been calculated. We have taken five criteria in this paper, i.e., 1. Name, 2. Model, 3. Features, 4. Cost, 5. Warranty.

4.2. Gray Relational Analysis

Gray Relational Analysis (GRA) is also called Deng’s Gray Analysis Model [22,29]. It is one of the most widely used models. It uses a specific concept of information. This model defines the situation or state of a process with no information as black and with the perfect amount of information as white. The gray system has part of the information known and part of the information unknown. The good and quality information is the process in which black changes to gray and then to white. However, uncertainty [30] always exists, in the middle, somewhere in the end, and somewhere in the gray area [31]. In some processes, without information, no solution can be defined for a system. Meanwhile, a system with information has a unique solution. Gray analysis does not provide the best solution, but it does provide the techniques to determine the good solution. The GRA model is a good solution to real-world problems [32].
The Gray Relational Analysis has three steps: 1. Normalization matrix, 2. Deviation sequence matrix, 3. Gray Relation Coefficient.
In this paper, we have collected the dataset, which consists of one hundred attributes. We have taken the same criteria as in the AHP, i.e., Name, Model, Features, Cost and Warranty. Then, we have calculated and analyzed the maximum and minimum values for the criteria in the collected dataset. After that, we have calculated the normalization matrix. By using the normalization matrix, we calculate the deviation sequence matrix; lastly, we have calculated the gray relation coefficient.
In the dataset which we have collected, there are many mobile products with different types of models, features, cost and warranty. It is hard to choose which is the best product among them. However, by using the GRA process, we can normalize the dataset and we can find the best product [23]. The best product is selected based on the rank. The mobile product which is ranked first among all of the products will be considered the best mobile product.

5. Results

The result section contains Expert Review, Pair-wise comparison, Normalization, Weight estimation and ranking for AHP. This section also estimates the normalization, estimation of the grey relation co-efficient, estimation of gray relation grades and ranks for GRA. The simulation of the selection of alternatives is presented in the Figure 2. The Expert review based importance and the corresponding scale is presented in the Table 3.

5.1. Steps of AHP Experimentation

5.1.1. Weight Normalization of AHP

The weighted normalized matrix in Equation (1) and the individual attributes a j are trained with weights w j and normalized based on the order of importance.
Comparison of criteria is based on the importance we give. There are nine levels of importance in the AHP scale. Scale one indicates equal importance of both the criteria, three moderate importance, five strong importance, seven very strong importance, and nine extreme importance (two, four, six and eight are values in between).

5.1.2. Pairwise Comparisons

Pairwise comparison is a process of comparing entities in pairs to determine which entity has a greater amount of quantitative property. The pairwise comparison matrix table is the output which is based on the criteria priority we have provided. In the pairwise comparison matrix, the diagonals always get values of only one [33]. Based on the pairwise comparison table, a standardized matrix has been obtained. This table represents the weights of the criteria. The weight value is the average of attributes in the rows. Then, we represent the priorities in percentage. Based on the priority which has the highest percentage, we assign the rank. As per the analysis of the dataset which we have taken, the criteria which are named features get the highest priority, so we assign features that are more important than the other criteria. We conclude that the criteria features are the first priority to select the best product based on the output of the AHP process.The pair-wise comparison matrix is presented in the Table 4. The ranking of the alternatives is presented in the Table 5. (The standardized matrix is determined from the pairwise comparison table by dividing the attributes with the sum of that column. For example, 1/15 = 0.06, 1 attribute of the first column; 15-sum of the first column. This is similar to the way we create the standardized matrix).
C I = λ n / n 1
The consistency ration of the model CI is measured with the above Equation2, where n is the number of samples of the AHP matrix. The consistency matrix obtained for the prescribed work is 2.8. It should be less than 20 for the better and consistent importance matrix with correlation among the attributes.

5.2. Estimation of the GRA Parameters

5.2.1. Normalization of GRA

After collecting or generating the dataset, we have found maximum and minimum values for the taken criteria in the collected dataset. We have generated a normalization matrix for the collected dataset. The normalization matrix has two formulas: 1. the higher the better, 2. the lower the better. They are expressed in the Equations (3) and (4).
x = ( x i ( k ) min ( x i ( k ) ) / ( max ( x i ( k ) ) min ( x i ( k ) ) )
x = ( max ( x i ( k ) ) x i ( k ) / ( max ( x i ( k ) ) min ( x i ( k ) ) )
min xi(k) is the current attribute, max xi(k) is the maximum value of the criteria, min xi(k) is the minimum value of the criteria. The maximum and minimum values of all the criteria have been calculated for each and every column. The normalized GRA matrix is presented in the Table 6. Normalization is the process of making the collected dataset into a normal set; it also looks like a simplified regular dataset [34]. In this process, we have used three criteria, i.e., model, features, warranty, and lower the better for one criteria, i.e., cost.

5.2.2. Estimation of the Deviation Sequence

After calculating the normalization matrix, we have found maximum and minimum values for the criteria in the normalization matrix. Based on the normalization matrix, the deviation sequence matrix has been calculated. The maximum and minimum values in the deviation sequence matrix are known as delta maximum and delta minimum. We have also taken the zeta delta max value as 0.5, which is a constant value for all of the criteria.
Deviation Sequence Matrix is expressed as
x = x i ( k ) x i ( k )
min xi(k) is the current attribute, max xi(k) is the maximum value of the criteria, which has been calculated for each and every column.The estimated values of the deviation sequence are tabulated in Table 7.

5.2.3. Estimation of the Gray Relational Sequence

After calculating the deviation sequence matrix, we have found delta maximum and delta minimum values for the criteria in the deviation sequence matrix. We also have another value, which is called zeta delta max, in the deviation sequence matrix. Based on the deviation sequence matrix, the grey relation coefficient table has been calculated as per the below Equation (6).
x = ( δ x i ( k ) + ξ δ x i ( k ) ) / ( x i ( k ) + ξ δ x ( k )
δ min xi(k) is the minimum value of the criteria, ξ δ max xi(k) is the constant value which is 0.5, xi(k) is the current attribute. Using the gray relation coefficient table, we have found the grade. The grade is the average value of all the criteria. Based on the grade values, the rank has been determined. The rank decides which is the best company product among all other products. The Grey Relational Grade is expressed in the Equation (7).
G R G = 1 / n [ w k ξ i ( k ) ]
The above equation defines the Gray Relational Grades which provides the grades required for the ranking of the GRA process and the final results regarding the ranking of values are calculated using Equation (7). The final GRA ranks are represented in Table 8. The estimation of the deviation sequence is represented in Table 9. The appendix section contains the detailed description of GRA implementation in Table A1, Table A2, Table A3, Table A4.

6. Discussion

This section describes security mechanisms that can be applied to the dataset during the pre-recommendation and post-recommendation process. This ensures the encryption of the desired attribute on the dataset to provide security to withstand unauthorized access by competitors and others. This section describes the access-based security model followed by the implementation of the Environment-Based Attribute Access Control model algorithm.

6.1. Access-Based Security Control Mechanism

Safeguarding assets becomes a top priority for a system such as the one we have proposed. Access might be limited to certain users as a remedy for this. Given that it is reliable, a system that can identify authorized users and bar access to illicit items can be effective [35]. To aid this, we propose a comprehensive access control strategy that supports read and written access for record actors, as well as enforcing framework-level encryption-related activities. To further develop the role-based access control model, we support role hierarchies that allow roles to be organized hierarchically. Less privileged positions are at lower levels of the hierarchy and highest roles are at the top, as described in the algorithm below. Our approach maps specific roles in the EBAACM model to specific sets of attributes adding on to it, and higher roles could inherit all permissions from lower roles. For example, someone who contributes significantly to configuring and approving phone features has a higher role than someone who only pulls information from the system. Additionally, the owner of the system who maintains the dataset has higher priority than anyone else simply exploiting certain feature comparison through the model. Based on our system, the model has few process steps which help achieve robustness, which are described as follows:
  • Environment specification—Static or Dynamic state space (completely based on role hierarchy)
  • For each user who logs in and utilizes the system for their own needs, a digital ID should be created. A user or someone who wants to be part of a fuzzy ecosystem generates a random number s k as a private key, generates the corresponding p k as a public key and chooses a secure hash function followed by double hashing the public key.
    H : { 0 , 1 } { 0 , 1 } λ
    This is a unique identifier for each user to track their operations and transactions.
  • The proposed model defines attributes for the role-based access control model [21]. The model also defines who owns the data and who is the user of the data. Each entity requesting access to a record can be evaluated against a specially designed hierarchy according to specific criteria or its position.
  • Environment-Based Attribute Access Control model (EBAACM). This algorithm designed to protect the environment, as discussed further.
  • External attributes are defined, such as time of operation, location, working hours with the dataset, etc.
  • The Certificate Authority (CA) is a trusted authority that issues public key certificates (X.509 certificates) [36] to all entities, including users, AAs, data owners and proxies. Key pairs and certificates are used to sign transactions, encrypt private keys and authenticate entities within the system.
  • Proxy is a semi-trusted server responsible for decrypting and re-encrypting data [37]. In our design, the proxy server has its own PKI key pair and installed X.509 certificates that are used to authenticate other system modules.

6.2. Environment-Based Attribute Access Control Model (EBAACM) Algorithm

The dataset must be protected and authenticated; hence, rigorous data access control permissions must be set. A secure environment-based attribute access-control paradigm is suggested for the same reason. The environment must first be initialized in order to set the security services of the model we constructed. The framework ecosystem has been split into two categories: static and dynamic. Users with the lowest role, such as those looking for recommendations, access information in a static environment. This audience will only be permitted to obtain legal information; no other transactions will be permitted. In a dynamic state, different operations are carried out by employees according to the importance accorded to each position. They have a variety of tasks to complete, such as updating and adding to datasets. The static and dynamic environments are connected to certain environmental characteristics that relate to access times, working and non-working hours, locations, or dynamic elements of the access control scenario. The architecture of the system is represented in Figure 3. These are linked to the security-related rules created for the corporation. By initially stating the kind of account the user owns, all of the above is implemented, along with a more reliable security procedure. The development of a digital identity is the first step in this process. Adding to this, some characteristics help to determine a person’s intent and the environment’s integrity. The key used to guarantee safe data transmission between the server and the client is s k . The user shares its digital account identity and the symmetric key s k and the corresponding data information can be obtained by decrypting the key s k . Various functions used in the algorithm, such as hasIssueRole, renounceIssueRole and parExtension, help the framework in achieving a secured space to function. After the digital identity is authenticated and a role is identified for it, the model can access the framework accordingly. Each of the entity’s transactions is taken into account, along with its authorization. Therefore, a secured environment for the fuzzy framework is achieved. The environment based access control algorithm is represented in Table 10.

6.3. Sensitivity Analysis

The GRA results are not weight normalized but min and max normalized. Hence, the sensitivity analysis is first carried out on the AHP implementation, where the weight change can be followed up with a change in the Consistency Ratio (CR) and the final ranking. However, as per the original assessment of the AHP method based on the expert opinion, the features were ranked as per the importance: Features > Cost > Warranty > Model.
This assumption produced a consistency ratio of 1.5% for the attributes under subjective weight assumptions.The original feature importance distribution is shown in Figure 4.
The sensitivity analysis for GRA is discussed with the Figure 5. The diagram shows how the attributes contribute to the estimation of the Gray Relational Grade and the final ranking. The rank is expressed in the X-axis and the corresponding values of the grade are represented in the Y-axis in terms of percentage. As per the contribution, the feature importance follows the following order: Warranty > Cost > features > Model.
The Warranty is the primary contributing factor for the highest rank, comprising 70%, followed by cost at around 50%, then features and model around 35% and 20%, respectively.

6.4. Validation

The GRA results are not subjective but objective, and are estimated from the Gray Relational co-efficient after normalization through min–max analysis. However, as per the original assessment of AHP method based on an expert opinion, the features were ranked as per the importance, as follows: Features > Cost > Warranty > Model. This assumption produced a consistency ratio of 1.5% for the attributes under subjective weight assumptions. However, post-GRA process, the AHP weights were re-assigned based on the outcomes obtained from the GRA ranking and sensitivity analysis. The change in importance is presented in the Table 11. The order of weights and the final ranking is represented along with the features in Figure 6.
The revised weight distribution and the importance are shown in the Figure 6. From this observation, we understand that the consistency ratio remains as 1.5%, which is similar to the one which we received at the initial implementation of AHP through the inputs received from the subject-matter experts. This validates the results even after the change of weights produced a similar consistency ratio and does not impact the prediction made by GRA. The output weights match the subject weights; thus, the results are balanced with the original subjective assumption.

6.5. Limitations of the Proposed System

The limitations of the proposed work are listed below,
  • The AHP results are subjective, but GRA results are not subjective.
  • There may be a need to re-assign the weights of AHP after the estimation of GRA.
  • In such a case, there may be a change in the Consistency Ratio based on the weight change.
  • So, we need to deploy different MCDM techniques if the consistency ratio changes.
  • This work deals only with attribute-based encryption, which may be extended to data or transaction-based encryption.

7. Conclusions and Further Work

There are many research papers on the basis of AHP and GRA, which represent the production process of the products. However, in this paper we have found the best process of all. We have used both AHP and GRA processes along with security mechanism implemented for the dataset. As per the AHP process, we have concluded that the features of the product are more important than the other criteria. So, on the basis of output of the AHP process, we conclude that the features are important to select the product. The whole framework is secured using the EBAACM algorithm that utilizes an access control methodology and various other essential environmental factors to set access permissions for all digitally identified users.

Future Directions

  • The business intelligence enhancements can be deployed across various MCDM models such as VIKOR, WASPAS, MOORA.
  • The sensitivity analysis of various MCDM models can be compared to improve our understanding of the real competitive advantage of business intelligence.
  • Attribute-based security mechanisms can be enhanced with the transaction-based encryption with policies.
  • Deep learning models can be used for the decision-support systems with real-time business-related big data analysis.
The intricacy of context data will be a topic of future investigation. In this direction, crowdsourcing can be used to gather structured and unstructured data from many sources with more individualized qualities and metadata. Due to the computational requirements of even a moderately sized problem, the system presented in this investigation places significant constraints on the scope of the research. One limitation of AHP is that the modeling process itself is inherently subjective. That means the approach cannot say for sure that the verdicts are correct. Moreover, once the datasets gathered via crowdsourcing technique grow more complicated, numerous unsolved security issues may hinder the performance of the system. This will make it possible to better understand users and deliver more individualized outcomes. Utilizing vast quantities of context data, more effort is required in terms of safeguarding user privacy in addition to data security, while still maintaining adequate recommender systems speed and accuracy.

Author Contributions

Conceptualization, M.K.N. and I.J.; methodology, M.K.N., I.J.; software, M.K.N.; validation: S.S.; formal analysis, M.K.N.; investigation S.B. and A.M.A.; resources, M.K.N. and I.J.; data curation, A.A.M.; writing—original draft preparation, M.K.N., I.J., S.S.; writing—review and editing; S.S., A.M.A. and S.B.; visualization, I.J.; supervision, S.S.; project administration, S.B.; funding acquisition, S.B. and A.A.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Acknowledgments

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R151), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Experimental Analysis of the GRA

GRA Implementation Steps

This section contains detailed implementation tables for GRA. The sample of the same had already been provided in the main document. This section contains tables related to GRA Normalization, Estimation of the deviation sequence, Estimation of the Grey Relational co-efficient and finally the grey relational grades and ranks.
Table A1. GRA Normalized Matrix.
Table A1. GRA Normalized Matrix.
ModelFeaturesCostWarranty
00.80.3095230
00.650.7776530
0.50.550.9617730.5
10.650.205150
0.50.70.1533210
100.5122910
010.2775121
10.450.9490370.5
00.950.8770440.5
0.50.550.0252540
00.350.6214940
10.4501
0.50.750.3726580
10.750.8939590.5
010.3646011
0.50.10.2246650.5
0.50.350.2158280
100.8450980
0.50.450.3253560
00.50.1472571
10.050.802040.5
010.8797730
10.450.9121091
00.20.6072640
0.500.3042820
10.410
00.150.2216760.5
0.50.250.9276391
0.50.80.5888980.5
00.40.50640.5
10.60.3496780
00.30.5721340
10.450.3158041
10.50.169370.5
00.750.5001620.5
00.70.4963940.5
0.50.20.3782030.5
00.90.6603931
110.3794160.5
10.80.0436851
00.10.7941780
10.950.8643090
10.450.8130861
10.70.5537891
10.60.8556671
10.550.2665310
10.80.7653721
Table A2. EStimation of Deviation Sequence.
Table A2. EStimation of Deviation Sequence.
ModelFeaturesCostWarranty
10.20.6904771
0.50.30.5005960.5
10.350.2223471
0.50.450.0382270.5
00.350.794851
0.50.30.8466791
010.4877091
100.7224880
00.550.0509630.5
10.050.1229560.5
0.50.450.9747461
10.650.3785061
00.5510
0.50.250.6273421
00.250.1060410.5
100.6353990
0.50.90.7753350.5
0.50.650.7841721
010.1549021
0.50.550.6746441
10.50.8527430
00.950.197960.5
100.1202271
00.550.0878910
10.80.3927361
0.510.6957181
00.601
10.850.7783240.5
0.50.750.0723610
0.50.20.4111020.5
10.60.49360.5
00.40.6503221
10.70.4278661
00.550.6841960
00.50.830630.5
10.250.4998380.5
10.30.5036060.5
0.50.80.6217970.5
10.10.3396070
000.6205840.5
00.20.9563150
10.90.2058221
00.050.1356911
00.550.1869140
00.30.4462110
00.40.1443330
00.450.7334691
Table A3. Ranking through Grey Relational Co-Efficient.
Table A3. Ranking through Grey Relational Co-Efficient.
ModelFeaturesCostWarrantyGrey GradeRank
10.7142860.68061710.8487261
10.5555560.77599610.8328882
10.476190.85049810.8316723
10.8333330.41324110.8116444
10.476190.72789310.8010215
10.50.70338710.8008476
10.6250.52842310.7883567
0.3333330.7692310.96776310.7675828
10.50.56216310.7655419
10.7142860.34333210.76440510
10.9090910.7865450.3333330.75724211
10.50.52154710.75538712
10.6666670.8250270.50.74792313
110.4461960.50.73654914
10.7692310.8225870.3333330.73128815
10.476190.42222810.72460416
10.476190.9075020.50.72092317
0.33333310.53900910.71808618
10.3846150.47346610.7145219
10.476190.33333310.70238120
10.465460.3333330.80.6999721
10.45454510.3333330.6969722
0.50.476190.80131610.69437723
0.33333310.44037410.69342724
0.50.40.87357410.69339325
0.3333330.8333330.59551710.69054626
0.33333310.40900210.68558427
0.3333330.4545450.93507110.68073728
0.50.5882350.62568310.67847929
0.50.7142860.9932880.50.67689330
10.7142860.4885040.50.67569831
10.5555560.8074820.3333330.67409332
0.50.6250.57055510.67388933
0.3333330.6666670.68863610.67215934
10.4347830.8759270.3333330.66101135
10.3448280.7449460.50.64744336
10.7142860.3747620.50.64726237
0.50.4166670.66938710.64651438
0.50.6250.9569320.50.64548339
10.3448280.7163740.50.640340
0.3333330.9090910.8026250.50.63626241
0.50.4545450.55668610.62780842
10.50.4806220.50.62015643
0.33333310.8061560.3333330.61820644
10.50.6283390.3333330.61541845
0.50.5263160.9289750.50.61382346
0.50.3846150.55233110.60923747
Table A4. Estimation of Deviation Sequence.
Table A4. Estimation of Deviation Sequence.
ModelFeaturesCostWarranty
10.20.6904771
0.50.30.5005960.5
10.350.2223471
0.50.450.0382270.5
00.350.794851
0.50.30.8466791
010.4877091
100.7224880
00.550.0509630.5
10.050.1229560.5
0.50.450.9747461
10.650.3785061
00.5510
0.50.250.6273421
00.250.1060410.5
100.6353990
0.50.90.7753350.5
0.50.650.7841721
010.1549021
0.50.550.6746441
10.50.8527430
00.950.197960.5
100.1202271
00.550.0878910
10.80.3927361
0.510.6957181
00.601
10.850.7783240.5
0.50.750.0723610
0.50.20.4111020.5
10.60.49360.5
00.40.6503221
10.70.4278661
00.550.6841960
00.50.830630.5
10.250.4998380.5
10.30.5036060.5
0.50.80.6217970.5
10.10.3396070
000.6205840.5
00.20.9563150
10.90.2058221
00.050.1356911
00.550.1869140
00.30.4462110
00.40.1443330
00.450.7334691

References

  1. Huang, W.; Da Xu, R.Y. Gaussian process latent variable model factorization for context-aware recommender systems. Pattern Recognit. Lett. 2021, 151, 281–287. [Google Scholar] [CrossRef]
  2. El-Araby, A.M.; Sabry, I.; El-Assal, A. Multi-criteria decision making approaches for facilities planning problem. In Proceedings of the 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 23–25 October 2021; pp. 47–50. [Google Scholar]
  3. Mansour, R.F. Blockchain assisted clustering with intrusion detection system for industrial internet of things environment. Expert Syst. Appl. 2022, 207, 117995. [Google Scholar] [CrossRef]
  4. Guo, X.; Omar, M.H.; Zaini, K.M.; Liang, G.; Lin, M.; Gan, Z. Multiattribute access selection algorithm for heterogeneous wireless networks based on fuzzy network attribute values. IEEE Access 2022, 10, 74071–74081. [Google Scholar] [CrossRef]
  5. He, H.R.; Liu, Y.; Gao, J.; Jing, D. Investigating business sustainability of crowdsourcing platforms. IEEE Access 2022, 10, 74291–74303. [Google Scholar] [CrossRef]
  6. Lin, L.; Shen, H.; Liu, S.; Xu, L.; Cheng, X. On the cybernetics of crowdsourcing innovation: A process model. IEEE Access 2022, 10, 27255–27269. [Google Scholar] [CrossRef]
  7. Dehghan-Dehnavi, S.; Fotuhi-Firuzabad, M.; Moeini-Aghtaie, M.; Dehghanian, P.; Wang, F. Decision-making tree analysis for industrial load classification in demand response programs. IEEE Trans. Ind. Appl. 2020, 57, 26–35. [Google Scholar] [CrossRef]
  8. Liu, Y. Enterprise brand marketing strategy under the background of artificial intelligence. In Proceedings of the 2021 International Conference on Forthcoming Networks and Sustainability in AIoT Era (FoNeS-AIoT), Nicosia, Turkey, 27–28 December 2021; pp. 115–119. [Google Scholar]
  9. Can, G.F.; Toktaş, P.; Pakdil, F. Six sigma project prioritization and selection using AHP–CODAS integration: A case study in healthcare industry. IEEE Trans. Eng. Manag. 2021. [Google Scholar] [CrossRef]
  10. Gupta, A.K.; Gupta, N. Strategic sourcing–selection of suppliers using delphi-ahp approach. In Proceedings of the 2021 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 13–16 December 2021; pp. 1194–1197. [Google Scholar]
  11. Ponomarev, A. An iterative approach for crowdsourced semantic labels aggregation. In Proceedings of the Computational Methods in Systems and Software; Springer: Cham, Switzerland, 2020; pp. 887–894. [Google Scholar]
  12. Chignell, M.; Kealey, R.; DeGuzman, C.; Zucherman, L.; Jiang, J. A case study in visualizing disruptions to service quality. Procedia Comput. 2017, 111, 95–104. [Google Scholar] [CrossRef]
  13. Wang, C.-S.; Lin, S.-L.; Yang, H.-L. Impersonate human decision making process: An interactive context-aware recommender system. J. Intell. Inf. Syst. 2016, 47, 195–207. [Google Scholar] [CrossRef]
  14. Xia, Z.; Xue, S.; Wu, L.; Sun, J.; Chen, Y.; Zhang, R. Forexgboost: Passenger car sales prediction based on xgboost. Distrib. Parallel Databases 2020, 38, 713–738. [Google Scholar] [CrossRef]
  15. Zuhdi, A.F.; Taufani, A.R.; Firmansah, A.; Horng, G.J. Car sales prediction system based on fuzzy time series and adaptive neuro fuzzy inference system. In Proceedings of the 2020 International Computer Symposium (ICS), Tainan, Taiwan, 17–19 December 2020; pp. 272–277. [Google Scholar]
  16. Savych, O.; Molchanova, E.; Fedorchenko, A.; Kovtoniuk, K. Modeling of key marketing parameters of development of the eu car market and its clusterization. In Proceedings of the 2021 11th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 15–17 September 2021; pp. 364–367. [Google Scholar]
  17. Li, H.; Wang, W.; Fan, L.; Li, Q.; Chen, X. A novel hybrid MCDM model for machine tool selection using fuzzy DEMATEL, entropy weighting and later defuzzification VIKOR. Appl. Soft Comput. 2020, 91, 106207. [Google Scholar] [CrossRef]
  18. Xie, S.; Wang, X.; Yang, B.; Li, L.; Yu, J. Evaluating and visualizing QoS of service providers in knowledge-intensive crowdsourcing: A combined MCDM approach. Int. J. Intell. Comput. Cybern. 2021, 15, 198–223. [Google Scholar] [CrossRef]
  19. Huiqi, Z.; Khan, A.; Qiang, X.; Nazir, S.; Ali, Y.; Ali, F. MCDM Approach for Assigning Task to the Workers by Selected Features Based on Multiple Criteria in Crowdsourcing. Sci. Program. 2021, 2021, 4600764. [Google Scholar] [CrossRef]
  20. Liang, M.; Li, W.; Ji, J.; Zhou, Z.; Zhao, Y.; Zhao, H.; Guo, S. Evaluating the Comprehensive Performance of 5G Base Station: A Hybrid MCDM Model Based on Bayesian Best-Worst Method and DQ-GRA Technique. Math. Probl. Eng. 2022, 2022, 4038369. [Google Scholar] [CrossRef]
  21. Fragkos, G.; Johnson, J.; Tsiropoulou, E.E. Dynamic role-based access control policy for smart grid applications: An offline deep reinforcement learning approach. IEEE Trans. Hum. Mach. Syst. 2022, 52, 761–773. [Google Scholar] [CrossRef]
  22. Huang, S.-C.; Liu, H.; Chen, B.-H.; Fang, Z.; Tan, T.-H.; Kuo, S.-Y. A gray relational analysis-based motion detection algorithm for real-world surveillance sensor deployment. IEEE Sens. J. 2018, 19, 1019–1027. [Google Scholar] [CrossRef]
  23. Mostafa, A.M. An mcdm approach for cloud computing service selection based on best-only method. IEEE Access 2021, 9, 155072–155086. [Google Scholar] [CrossRef]
  24. Yang, J.; Drake, T.; Damianou, A.; Maarek, Y. Leveraging crowdsourcing data for deep active learning an application: Learning intents in alexa. In Proceedings of the 2018 World Wide Web Conference, Lyon, France, 23–27 April 2018; pp. 23–32. [Google Scholar]
  25. Swearngin, A.; Li, Y. Modeling mobile interface tappability using crowdsourcing and deep learning. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK, 4–9 May 2019; pp. 1–11. [Google Scholar]
  26. Wang, S.; Di Tommaso, S.; Faulkner, J.; Friedel, T.; Kennepohl, A.; Strey, R.; Lobell, D.B. Mapping crop types in southeast India with smartphone crowdsourcing and deep learning. Remote. Sens. 2020, 12, 2957. [Google Scholar] [CrossRef]
  27. Santos, P.H.D.; Neves, S.M.; Sant’Anna, D.O.; de Oliveira, C.H.; Carvalho, H.D. The analytic hierarchy process supporting decision making for sustainable development: An overview of applications. J. Clean. Prod. 2019, 212, 119–138. [Google Scholar] [CrossRef]
  28. Gyani, J.; Ahmed, A.; Haq, M.A. Mcdm and various prioritization methods in ahp for css: A comprehensive review. IEEE Access 2022, 10, 33492–33511. [Google Scholar] [CrossRef]
  29. Xie, W.; Xu, Z.; Ren, Z.; Herrera-Viedma, E. Expanding grey relational analysis with the comparable degree for dual probabilistic multiplicative linguistic term sets and its application on the cloud enterprise. IEEE Access 2019, 7, 75041–75057. [Google Scholar] [CrossRef]
  30. Youssef, A.E. An integrated mcdm approach for cloud service selection based on topsis and bwm. IEEE Access 2020, 8, 71851–71865. [Google Scholar] [CrossRef]
  31. Song, Y.; Peng, Y. A mcdm-based evaluation approach for imbalanced classification methods in financial risk prediction. IEEE Access 2019, 7, 84897–84906. [Google Scholar] [CrossRef]
  32. Kuo, Y.; Yang, T.; Huang, G.-W. The use of grey relational analysis in solving multiple attribute decision-making problems. Comput. Ind. Eng. 2008, 55, 80–93. [Google Scholar] [CrossRef]
  33. Maceika, A.; Bugajev, A.; Šostak, O.R.; Vilutiene, T. Decision tree and ahp methods application for projects assessment: A case study. Sustainability 2021, 13, 5502. [Google Scholar] [CrossRef]
  34. Altintas, K.; Vayvay, O.; Apak, S.; Cobanoglu, E. An extended gra method integrated with fuzzy ahp to construct a multidimensional index for ranking overall energy sustainability performances. Sustainability 2020, 12, 1602. [Google Scholar] [CrossRef] [Green Version]
  35. Qiu, J.; Tian, Z.; Du, C.; Zuo, Q.; Su, S.; Fang, B. A survey on access control in the age of internet of things. IEEE Internet Things J. 2020, 7, 4682–4696. [Google Scholar] [CrossRef]
  36. Kinkelin, H.; von Seck, R.; Rudolf, C.; Carle, G. Hardening x. 509 certificate issuance using distributed ledger technology. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–6. [Google Scholar]
  37. Hussain, S.; Ullah, I.; Khattak, H.; Adnan, M.; Kumari, S.; Ullah, S.S.; Khan, M.A.; Khattak, S.J. A lightweight and formally secure certificate based signcryption with proxy re-encryption (cbsre) for internet of things enabled smart grid. IEEE Access 2020, 8, 93230–93248. [Google Scholar] [CrossRef]
Figure 1. Overall Architecture of the System.
Figure 1. Overall Architecture of the System.
Applsci 13 01511 g001
Figure 2. MCDM selction through AHP process for the alternatives.
Figure 2. MCDM selction through AHP process for the alternatives.
Applsci 13 01511 g002
Figure 3. Architecture of the Environment-Based Attribute Access Control model(EBAACM) Algorithm.
Figure 3. Architecture of the Environment-Based Attribute Access Control model(EBAACM) Algorithm.
Applsci 13 01511 g003
Figure 4. Attributes with Weight Representation in AHP.
Figure 4. Attributes with Weight Representation in AHP.
Applsci 13 01511 g004
Figure 5. Attributes with Weight Representation in AHP.
Figure 5. Attributes with Weight Representation in AHP.
Applsci 13 01511 g005
Figure 6. Attributes with Weight Representation in AHP.
Figure 6. Attributes with Weight Representation in AHP.
Applsci 13 01511 g006
Table 1. Summary of existing works.
Table 1. Summary of existing works.
Ref. NoMethodsAdvantagesResearch Challenges
[5]Framework for sustainability of crowdsourcing in business processA well-interconnected framework for crowdsourcing from the business perspectiveLack of an identity-management policy for access control
[13]Context-aware recommender SystemProviding the appropriate car for the users using contextual informationThe system lacks sensitivity analysis
[22]A smart motion detection approach based on gray relational analysis is appliedEfficient motion detection performance is achievedOverhead cost for video rendering has to be considered
[23]Best-only method is deployed to overcome the challenges in choosing the most relevant cloud service providerThe method is better than AHP and BWM for reducing computational complexityThe method does not provide a recommendation based on resource cost and availability zones.
[21]A modified Role-based Access Control model is deployed, along with deep reinforcement learningThe access control policy is dynamic so that the users adhere to the security standardsThe method fails to address the computational overhead for the access policy deployed.
[20]A hybrid multicriteria decision-making (MCDM) model based on the Bayesian best–worst method (BBWM) is implemented for the performance of 5G base stationsBetter coverage range with less cost of infrastructureSignal interference and authorization is not considered
Table 2. Comparative Analysis of the proposed work with Recent developments of the Crowd-Sourcing Applications.
Table 2. Comparative Analysis of the proposed work with Recent developments of the Crowd-Sourcing Applications.
S. NoApplicationTechnologyStrengthAI UsageSecurityRanking
1.Crowdsourcing with deep learningCrowdsourcing for Learning of annotatorslearning through annotator with expertise inferring true labels from meager annotations.Deep Convolution neural networksNoNo
2.Crowdsourcing for gesture control in smart phones.Crowdsourcing for analysing the tapping features of the mobile phonesDetermining the tapping feature of a mobile by aggregating data using surveys and crowdsourcing.Gesture control and sensingNoNo
3.Crowdsourcing for crop yieldCrowdsourcing with Image sensing through CNNSentinel-2 with remote sensing imageryCNN with sentinel-2 for remote sensing of imagesNoNo
4.Proposed systemGRA for grading, AHP for weight training, attribute-based access control security mechanism in CrowdsourcingRecommendations with AHP, ranking with GRA, security with attribute-based access control mechanismsAHP and GRA for ranking and recommendationsYesYes
Table 3. AHP Weight based on Expert Review.
Table 3. AHP Weight based on Expert Review.
ComparisonsImportance in Scale
Name with model2
Name with features5
Name with cost4
Name with warranty3
Model with features4
Model with cost3
Model with warranty2
Features with cost2
Features with warranty3
Cost with warranty2
Table 4. Pairwise Comparison Matrix.
Table 4. Pairwise Comparison Matrix.
NameNameModelFeaturesCostWarranty
Name10.500.200.250.33
Model2.0010.250.330.50
Features5.004.0012.003.00
Cost4.003.000.5012.00
Warranty3.002.000.330.501
Sum1510.52.284.086.83
Table 5. AHP Ranking of Alternatives.
Table 5. AHP Ranking of Alternatives.
NameModelFeaturesCostWarrantyPriorityRank
0.060.040.080.060.045.60%5
0.130.090.10.080.079.40%4
0.330.380.430.490.4341.20%1
0.260.280.210.240.2925.60%2
0.20.190.140.120.1415.80%3
Table 6. GRA Normalized Matrix.
Table 6. GRA Normalized Matrix.
ModelFeaturesCostWarranty
00.80.3095230
00.650.7776530
0.50.550.9617730.5
10.650.205150
0.50.70.1533210
100.5122910
010.2775121
10.450.9490370.5
00.950.8770440.5
0.50.550.0252540
00.350.6214940
10.4501
0.50.750.3726580
10.750.8939590.5
Table 7. Estimation of Deviation Sequence.
Table 7. Estimation of Deviation Sequence.
ModelFeaturesCostWarranty
10.20.6904771
0.50.30.5005960.5
10.350.2223471
0.50.450.0382270.5
00.350.794851
0.50.30.8466791
010.4877091
100.7224880
00.550.0509630.5
10.050.1229560.5
0.50.450.9747461
10.650.3785061
00.5510
0.50.250.6273421
Table 8. Ranking through Gray Relational Co-Efficient.
Table 8. Ranking through Gray Relational Co-Efficient.
ModelFeaturesCostWarrantyGray GradeRank
10.7142860.68061710.8487261
10.5555560.77599610.8328882
10.476190.85049810.8316723
10.8333330.41324110.8116444
10.476190.72789310.8010215
10.50.70338710.8008476
10.6250.52842310.7883567
0.3333330.7692310.96776310.7675828
10.50.56216310.7655419
10.7142860.34333210.76440510
10.9090910.7865450.3333330.75724211
10.50.52154710.75538712
10.6666670.8250270.50.74792313
110.4461960.50.73654914
10.7692310.8225870.3333330.73128815
Table 9. Estimation of Deviation Sequence.
Table 9. Estimation of Deviation Sequence.
ModelFeaturesCostWarranty
10.20.6904771
0.50.30.5005960.5
10.350.2223471
0.50.450.0382270.5
00.350.794851
0.50.30.8466791
010.4877091
100.7224880
00.550.0509630.5
10.050.1229560.5
0.50.450.9747461
10.650.3785061
00.5510
0.50.250.6273421
00.250.1060410.5
Table 10. Environment-Based Attribute Access Control model(EBAACM) Algorithm.
Table 10. Environment-Based Attribute Access Control model(EBAACM) Algorithm.
StepSteps of Algorithm
1Establish user authorization.
2function hasIssueRole(role, account) public view
3require(account! = address(0), “Roles: this account is the zero address”);
4return role.bearer[account];
5end function
6Assign authorization to user account
7function addIssueRole(role, account) public onlyOwner
8require(!has(role, account), “Roles: this account already has role”);
9role.bearer[account] = false;
10end function
11Dataset authority revokes role authorization
12function renounceIssueRole(role, account) public onlyOwner
13require(has(role, account), “Roles: this account does not have role”);
14role.bearer[account] = false;
15Extending the access structure externally
16function par Extension(role, account)
17require(has(system parameters, role, extended role), “Roles: this account role has been extended”);
18role.bearer[account] = false;
19end function
Table 11. AHP Weight based on Expert Review.
Table 11. AHP Weight based on Expert Review.
ComparisonsImportance in Scale
Model with Name2
Features with Name3
Cost With Name4
Warranty With Name5
Features with model2
Cost with model3
Warranty with model4
Cost with features2
Warrant with features3
Warranty with cost2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nallakaruppan, M.K.; Johri, I.; Somayaji, S.; Bhatia, S.; Malibari, A.A.; Alabdali, A.M. Secured MCDM Model for Crowdsource Business Intelligence. Appl. Sci. 2023, 13, 1511. https://0-doi-org.brum.beds.ac.uk/10.3390/app13031511

AMA Style

Nallakaruppan MK, Johri I, Somayaji S, Bhatia S, Malibari AA, Alabdali AM. Secured MCDM Model for Crowdsource Business Intelligence. Applied Sciences. 2023; 13(3):1511. https://0-doi-org.brum.beds.ac.uk/10.3390/app13031511

Chicago/Turabian Style

Nallakaruppan, Musiri Kailasanathan, Ishita Johri, SivaRamaKrishnan Somayaji, Surbhi Bhatia, Areej A. Malibari, and Aliaa M. Alabdali. 2023. "Secured MCDM Model for Crowdsource Business Intelligence" Applied Sciences 13, no. 3: 1511. https://0-doi-org.brum.beds.ac.uk/10.3390/app13031511

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop