Next Article in Journal
Bicluster Analysis of Heterogeneous Panel Data via M-Estimation
Next Article in Special Issue
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
Previous Article in Journal
The Fuzzy Width Theory in the Finite-Dimensional Space and Sobolev Space
Previous Article in Special Issue
A Novel Decomposition-Based Multi-Objective Symbiotic Organism Search Optimization Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cloud Services User’s Recommendation System Using Random Iterative Fuzzy-Based Trust Computation and Support Vector Regression

by
Janjhyam Venkata Naga Ramesh
1,
Syed Khasim
2,
Mohamed Abbas
3,*,
Kareemulla Shaik
2,
Mohammad Zia Ur Rahman
4 and
Muniyandy Elangovan
5,*
1
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522302, India
2
School of Computer Science & Engineering, VIT-AP University, Amaravati 522237, India
3
Electrical Engineering Department, College of Engineering, King Khalid University, Abha 61421, Saudi Arabia
4
Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522302, India
5
Department of R&D, Bond Marine Consultancy, London EC1V 2NX, UK
*
Authors to whom correspondence should be addressed.
Submission received: 25 February 2023 / Revised: 2 May 2023 / Accepted: 9 May 2023 / Published: 17 May 2023
(This article belongs to the Special Issue Fuzzy Optimization and Decision Making)

Abstract

:
Cloud computing is now a fundamental type of computing due to technological innovation and it is believed to be a benefit for mid-scale enterprises. The use of cloud computing is increasing daily, which improves service quality but also gives rise to security concerns. Finding trustworthy service can be very challenging, take a great deal of time, or produce subpar services. Due to these difficulties, the client needs a service that is dependable, suitable, time-saving, and trustworthy. As a result, from the end user’s perspective, adopting a cloud service’s trustworthiness becomes crucial. Trust is a measure of how well users’ expectations about a service’s capabilities are realized. In this research, a recommendation system for cloud service customers based on random iterative fuzzy computation (RIFTC) is proposed. RIFTC focuses on the assessment of trust using Quality of Service (QoS) characteristics. RIFTC calculates trust using the machine learning approach Support Vector Regression (SVR). RIFTC can helpfully recommend a cloud service to the end user and anticipate the trust values of cloud services.. Precision (97%), latency (51%), throughput (25.99 mbps), mean absolute error (54%), and re-call (97%) rates are used to assess how well this recommendation system performs. RIFTC’s average F-measure rate is calculated by adjusting the number of users from 200 to 300, and it is 93.46% more accurate on average with less time spent than the current methodologies.

1. Introduction

Cloud computing, which is used in contemporary computing, evolved from grid computing and service-oriented architecture. Web services were essential to the information technology sector before the widespread use of cloud computing [1]. Web services enable compatible machine-to-machine communication over the internet and provide a way to use computer services remotely, similar to how remote procedure calls work. Extensible markup language (XML) service architectures are typically represented using the Web services description language. Applications that use web services include electronic commerce, corporate systems built using Service-Oriented Architecture (SOA), and grid computing. They merely provide a detailed explanation of the products, providing the intriguing semantic properties required for flexible network activation and detection. In cloud computing, cloud servers offer all necessary hardware and software as services to consumers [2]. Figure 1 shows the cloud-based recommendation system.
The filtering approach is a technique that uses a variety of filtering characteristics to display only the commodities that are most advantageous to the recipient out of a wide range of available commodities. In the literature, there are various methods for filtering a RS, including (i) content-based (CB), (ii) CF, (iii) hybrid filtering (HB), (iv) knowledge-based (KB), and (v) context-aware (CA). For the past few years, CF has become the more widely used filtering method among these. CF bases its operations on the fact that user behaviors, purchases, ratings, and preferences are compared, and this data is then used for further analysis.
Users can access several on-demand services thanks to cloud computing, a new idea that represents a collaboration between numerous machines and services across a network. Alternatively, defined, cloud computing is a novel, entirely web-based strategy that offers a top-notch computing system that is readily accessible, scalable, and adaptable for a range of functions. Cloud computing disperses various virtualized resources across numerous networks and locals [3,4]. These virtualized resources fall into 4 different categories: Platform as a Service (PaaS), Expert as a Service (EaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS). Customers can access the software via the Internet with SaaS without any difficulty or costs. Along with hosting, hardware, provisioning, and other requirements for operating a cloud, IaaS provides several other services. In this study, the term PaaS refers to an advanced integrated environment where unique applications are developed, tested, and deployed. Individuals can access users with specialized knowledge and skills through Expert Services (EaaS). Recommender systems are one of the most often-used tools for online users looking for opinions and recommendations on various goods or destinations [5,6]. People who have similar thoughts and preferences and have previously preferred the same items can get references about other products through recommender systems. Sentiment analysis engines are created across various social media platforms as a crucial component of the user experience [7,8]. If customers wish to select the finest or most appropriate services from a wide range of available services, the availability of services in the Cloud market and their growth could provide a serious challenge [9,10]. Choosing the best Cloud storage service would be difficult as a result. The usage of recommendation systems (RS) is one of the computer-based intelligence strategies for overcoming the difficulty of choosing the finest services or products from a vast range of possibilities. In the majority of e-business fields, they may be effectively used to deliver individualized services, which is advantageous for both the provider and the customer [11]. The consumer will profit from recommender systems since the systems will offer suggestions for goods or services. This is advantageous for those who are searching for products or services. Additionally, the company will profit from the rise in sales that typically results from providing customers with more options for goods and services that they are likely to find appealing [12]. The process of deploying services in the cloud has attracted much interest from the business and academic communities because it can significantly lower the overall cost of shareholdings for the supplier of services and the interface client by removing initial expenditure and lowering the expense of maintaining hardware and software. The topic of service computing, however, clearly confronts a significant research challenge in terms of efficient service selection and recommendation as the variety and quantity of services grow. In a cloud computing environment, several factors, such as the size of the infrastructure provider, the location of the information center, marketing plan, material administration plan, the level of popularity, and the user’s location can influence a user’s decision to use a particular service [13]. Cloud computing thus functions as a kind of collaborative cloud filtering that bases conclusions on clusters of user behavior [14]. The research problem addressed in this study is the design and development of an effective cloud services user’s recommendation system that can assist users in selecting appropriate cloud services based on their specific requirements and preferences. Despite the availability of a wide range of cloud services, selecting the service that best meets the user’s needs can be challenging, and users often face difficulties in making informed decisions. The proposed recommendation system aims to address this issue by leveraging machine learning algorithms and user data to provide personalized recommendations that are tailored to the user’s unique requirements. The research will focus on developing a system that can accurately predict the user’s needs based on their usage history and feedback and offer recommendations that match their expectations in terms of performance, cost-effectiveness, and overall user experience. The success of the recommendation system will be measured based on user satisfaction, adoption rate, and the overall impact on the cloud services industry.
The proposed cloud user recommendation system utilizes Random Iterative Fuzzy based Trust Computation (RIFTC) and Support Vector Regression (SVR) to evaluate and enhance the “Quality of Service (QoS)” through personalized and relevant recommendations based on user feedback and behavior.
The remaining sections are structured as follows: Part 2 covers related works. Part 3 details the suggested method, and Part 4 discusses the results. Part 5 offers suggestions for further research and concludes the analysis.

2. Related Works

Mezni and Abdeljaoued [15] suggested deploying a collaborative filtering-based fuzzy formal concept analysis (Fuzzy FCA)-based recommendation system for cloud services. Fuzzy FCA is mathematically sound and is based on the lattice theory. It was suggested that the recommendations could be improved by setting a detailed representation of the cloud environment in the structure model [16] including users, services, ratings, etc. (users who are equivalent to an active user, their ratings of one another, the best services, etc.). Rahhali et al. [17] presented a model of a recommender system for an e-learning platform that will encourage students to choose the courses that best suit their needs. The infrastructure of the system is built on the cloud, notably Google cloud services [18]. Aznoli and Navimipour [19] reviewed cloud service recommendations and provided various suggestions.
Liu and Chen [20] created a unique Clustering-based trust-aware approach. To deliver a more customized service, QoS forecast and trustworthy cloud service proposals for the active user in Cloud Manufacturing (CMfg), they integrate the “clustering-based method” with trust-aware technology. Ding et al. [13] provided a mechanism called time-aware Service Recommendation (taSR). They also created a unique “similarity-enhanced" Collaborative Filtering (CF) method to gather the duration characteristic of client usage similarities and reduce data sparsity in the current Point in Time (PIT) framework. The concept of stochastic frontier incorporated moving estimates will then be used to forecast the QoS values in the ensuing PIT under QoS instantaneity. They assess it by contrasting the suggested course of action with the most recent best practices. Deebak and Al-Turjman [21] proposed a design for community-based recommender systems that are mindful of trust. The preferences of similar users in the target user’s neighborhoods who are dependable neighbors are combined to represent the users’ preferences. User similarity is computed with rating confidence added. Combining the ratings of connected community members yields the prediction for an item that has not yet been rated. According to experimental results on actual data sets, the suggested method performs better in terms of accuracy than alternative complements.
The proposed cloud services user’s recommendation system, which utilizes Random Iterative Fuzzy-Based Trust Computation (RIFTC) and Support Vector Regression (SVR), offers several advantages over other methods for generating personalized recommendations. RIFTC and SVR algorithms help to identify and filter out unreliable or irrelevant data, which leads to more accurate and relevant recommendations.

3. Proposed Methodology

The internet is used by a new type of computer architecture known as the Cloud to distribute resources like processing energy, memory, software, and internet solutions as architecture. The whole user interface is contained within a single window in a Web browser for the majority of cloud computing applications. The goal of various initiatives is to improve the user experience of Internet apps. One tactic is to implement the concept of cloud computing such that a browser has all the functionality of an operating system. Cloud computing is almost fully developed and keeps improving, offering significant possibilities to reduce expenses by implementing innovative options for restructuring and combining the provisioning of internet technology to be more flexible, easier, affordable, open, trustworthy, and safe. CSRS uses QoS and performance score evaluation of services offered by Cloud suppliers to determine the most favorable services from the Cloud environment. In the world of IT, recommender systems are receiving increased attention from researchers (Figure 2).

3.1. Random Iterative Fuzzy Based Trust Computation (RIFTC)

Consider a network of X binary neurons and use a 0,1 to represent the ith neuron’s activity [22]. The vector a = a 1 , a 2 . a N specifies the status of the network. Assume that Equation (1) is the stochastic difference equation that predicts that the system will evolve in discrete time.
a i t + 1 = j = 1 N J i j ω i j t a j t + ϕ i t V i
is the step function in Equation (2):
x =   1   i f   x > 0 0   i f   x < 0
The product is that of j i t ω i t , where j i t is fixed and ω i t is a random variable produced from the time-independent probability distribution P i j ( ω i j ) . Equation (4) is used to represent the connection weights. ω i j is randomly chosen from its distribution at each time step so that
ω i j t ω = ω ¯ i j
[ ω i j t ω ¯ i j ] ω i j t ω = δ i i δ j j δ t t σ ω i j 2
where ω ¯ i j and σ 2 ω i j stand for the distribution’s mean and variance, respectively. In a similar vein, ϕ i ( t ) is a random external field produced from P i j ( ω i j ) , in Equation (6)
ϕ i t = ϕ ¯ i
[ ϕ i t ϕ ¯ i ] [ ϕ i t ϕ ¯ i ] = δ i i δ t t σ i 2
The deterministic thresholds, V I , are modified randomly by ϕ I .
One interpretation of Equation (7) f α i is a random iterative map.
f α i a = [ j = 1 J i j ω i j α j + ϕ i V i ]
where α i represents the totality of the connection weights and thresholds of the i th neuron, μ i adds the probability measure to the map space in Equation (8)
= i = f i | f i : 0,1 N 0,1 i
According to Equations (9) and (10), define a measure μ on the product space.
μ i f i = j = 1 d ω i j ρ i j ω i j d ϕ i i ρ i ϕ i δ f i f α i
= = f f : 0,1 N 0,1 N , f = f 1 , f 2 , , f N
Using the result of the measures μ i in Equation (11),
μ f = i = 1 μ i f i
the random iterative map might then be used to rewrite Equation (12):
a t + 1 = F t a t = F t F t 1 F 0 a t
With F t being randomly selected from the probability distribution p at each time step. Entropy and other general characteristics of random maps on networks are covered elsewhere. We will refer to a network as a random iterative network if Equation (1), or (12), adequately describes its dynamics.
The suggested framework would use fuzzy rules to determine trust values, with subjective and objective trust values serving as fuzzy inputs and fuzzy outputs, respectively.
I.
Fuzzy inputs have three states with a 0 to 1 range: low, medium, and high.
II.
Fuzzy outputs have a range of 0 to 1 and three states: low, medium, and high.
The following, Equation (13), are some ambiguous rules:
I f G O T j t T = l o w   a n d   G S T j t T = l   t h e n   T V   T   = l o w , I f   G O T j t T   =   l o w   a n d   G S T j t T   =   m e d i u m   t h e n   T V   T   =   l o w , I f   G O T j t T   =   m e d i u m   a n d   G S T j t T   =   m e d i u m   t h e n   T V   T   =   m e d i u m , I f   G O T j t T   =   ] h i g h   a n d   G S T j t T   =   m e d i u m   t h e n   T V   T   =   m e d i u m ,
Agent for updating trust values will be performed. The task of the agent upgrading trust values updates the trust repository. Fuzzy rules are used to map three states—trust, distrust, and uncertainty—to generate the trust score. If the calculated trust score is less, the C S P j trust score maps to distrust. The C S P j trust score maps to trust if the calculated trust score is high; if not, it maps to uncertainty.

3.2. Support Vector Regression

Support Vector Regression (SVR) is a supervised machine-learning technique for addressing recurrence issues [23,24]. Regression analysis may be employed to examine the connection between one or more explanatory factors. To train a regression product that translates from intake estimator factors to output observable response parameters, SVR establishes an optimization model [25]. SVR offers certain benefits since it effectively handles high-dimensional data and strikes a balance between model complexity and forecast error. SVR modifies the Support Vector Machine (SVM) classification approach.
SVR manages regression concerns to permit real-valued function estimation while SVM classification generates binary output (for instance, continuous score on a clinical scale) [26,27]. A small to-do classification-defined hyperplane is used by SVM, a sparse kernel machine. As a result, SVR optimization is stated in regard to support factors (a compressed set of training datasets), with the enhancement service relying only on the number of support vectors and not the size of the input data [28].
SVR is superior to other regression techniques in other ways. SVR can successfully handle a nonlinear regression problem since we were able to map the original feature onto a kernel space where data can be discriminated linearly.
Unlike traditional data regression techniques, SVR develops a method to define an element’s significance in establishing the correlation between input and output. For example, a linear regression (such as finite difference analysis) implies assertions about a linear dispersion of source data without giving relevant parameters or a credibility range when the actual connection between inputs and results is complex. SVR, in contrast, is a machine learning approach that seeks to increase prediction reliability by generating a probability range for a variable’s significance to represent the link between inputs and outcomes. Only springs between data cases outside the tube are attached in SVR, and these springs attach to the tube rather than the decision boundary. As a result, the data items inside the tube have no bearing on the final answer (or to be more precise, shifting them slightly doesn’t affect the solution).
For breaching the tube constraint from above and below, they introduce various limitations in Equations (14) and (15).
m i n i m i z e w , ξ , ξ ^ 1 2 w 2 + C 2 i = 1 ( ξ i 2 + ξ i 2 )
subjected   to   w T ϕ i + b y i ε + ξ i i ;   y i w T ϕ i b ε + ξ i
The basic Lagrangian method develops in Equation (16)
L P = 1 2 w 2 + C 2 i = 1 ξ i 2 + ξ i 2 + i = 1 i w T ϕ i + b y i ε ξ i + + i = 1 ^ i y i w T ϕ i + b y i ε ξ i
Remark I: SVM may have included the restrictions that ξ i 0 and ξ i ¯ 0 . It is obvious, though, that the ultimate solution will already meet that criterion, therefore there is no need to limit the optimization to the ideal outcome. To understand this, consider the case where some ξ i is negative. Setting ξ i = 0 is preferred in this situation since it is less expensive and does not break any limitations.
They also observe that, based on the foregoing logic, they will always have at least one of the zeros. i.e., both are zero inside the tube and one is zero outside. This indicates that the answer is ξ . ξ = 0 ¯ at the solution.
Remark II: SVR sees that, unlike the SVM scenario, they don’t scale = 1. The scope of the problem is now determined by  y i , thus we haven’t over-parameterized it. They now take the initiative concerning w, b, ξ , and ξ ¯ to determine the KKT conditions shown below (there are others, of course) in Equations (17) and (18) as follows:
w = i = 1 ^ i i ϕ i
ξ i = i / C ξ l = ^ ^ i / C
Reconnecting this and leveraging the fact that now they also have α i , α l = 0 leads to the discovery of the dual problem in Equation (19)
1 2 ^ i i ^ j j K i j + 1 C δ i j + i = 1 ^ i i y i i = 1 ^ i i ϵ i = 1 I ^ i i y i = 0 i 0 ^ i = 0 i
They can infer the sparsity of the solution from the complimentary slackness conditions in Equations (20)–(22)
i w T ϕ i + b y i ε ξ i = 0
^ i y i w T ϕ i b ε ξ i = 0
ξ i ξ i ^ = 0 i ^ i = 0
where they manually added the last conditions because they didn’t seem to follow from the formulation. If the constraint ξ i ¯ = Y i W T Φ i b will be satisfied if ξ i ¯ = 0 , then the case is taking on the smallest value possible. This suggests that I will assume a positive value and that the further α i ^ is from the tube, the larger α i ^ will be (as in a compensating force). Note that I in this instance equals 0. If both ξ i > 0 and α i > 0, the situation is equivalent. When a data case is within the tube, the α i and α i ^ are always 0, which causes sparsity β i . Equation (23) is as follows:
m a x i m i z e β 1 2 i j β i β j K i j + 1 C δ i j + i = 1 β i y i i = 1 β i i = 1 β i = 0
Now, SVR alters the variables to resemble the SVM more closely and perform ridge regression in this optimization issue. Introduce β i = α i ^ α i and use α i ^ α i = 0 to write α i ^ + α i = β i
where the Equation (24) constraint is caused by the inclusion of a bias term b
y = w T ϕ X + b = i β i K x i , x + b
The slackness conditions also allow us to determine a value for b. (similar to the SVM case). Additionally, as usual, the forecast for new data cases is provided.
Consider the scenario in which the penalty is linear rather than quadratic in Equation (25).
M i n i m i z e W , ξ , ξ ^ 1 2 w 2 + C 2 i = 1 ( ξ i 2 + ξ ^ i 2 ) w T ϕ i + b y i ε + ξ i i y i w T ϕ i b ε + ξ i i ξ i 0 , ξ ^ i 2 0 i
Resulting in the dual issue in Equations (26) and (27)
m a x i m i z e β 1 2 i j β i β j K i j + 1 C δ i j + i = 1 β i y i i = 1 β i
Subjected   to   i β i = 0 ; C β i + C i
where SVR observes that, as is expected when transitioning from L 2 norm to L 1 norm, the quadratic penalty on the size of β is replaced by a box restriction.
Take into account that the quadratic programs we specified are convex optimization problems having a singular optimum solution that can be readily found using numerical approaches. It is usually said that this represents a considerable improvement over the early stages of neural networks, which were constrained by multiple local optimal solutions.

4. Results

The experiments were conducted on a Hp Pavilion dv6 laptop with an Intel core i7-2630QM processor, 4 GB of RAM and a 750 GB Hitachi hard drive. The first set focused on the computation time of the recommendations, whereas the second set focused on the quality of the generated recommendations.
The dataset consists of 522 movies, 705,309 user reviews, and ratings (from 1 to 5). The suggested movie is set up in a multi-cloud environment with various virtual machines that can access CPU, Memory, and Storage at various times for improved resource efficiency [29]. The MATLAB tool is used for the user recommendation system.
A measurement of errors between paired observations corresponding to the same occurrence is called the mean absolute error. Mean Absolute Error (MAE) is a model evaluation statistic used with regression models. The MAE provides the mean of the absolute difference between the goal value and model predictions. Divided by the absolute difference between all of the observations’ estimated and actual values, the MAE is determined from the array’s total number of observations (Equation (28)).
M A E = i = 1 n y i x i
where N presents the total number of criteria y i and x i are the actual and predicted rating values of the i th user for the j th service, respectively. MAE will be calculated with each density variation to evaluate the quality (i.e., score) of the recommended services.
Due to the low ratings density of the rating’s formal context the MAE value is gradually reduced. MAE is less than 0.15 in most cases and reaches below 0.11 by the conclusion of the experiment. Results show that, even with a low ratings density, the average quality of the top−10 recommended services is high (0.81 when the ratings formal context density is 10%). Such is the strength of Fuzzy FCA.
Figure 3 and Table 1 both illustrate how the Mean Absolute Error obtained by the suggested strategy (RIFTC+SVR) was 54% lower than that of the TRSC (99%), Clustering (85%), Cloud Rec (71%), and QoS aware selection (93%), demonstrating how efficiently the suggested system performs compared to current state-of-the-art systems.
A scalar quantity, Throughput, exists. The entire distance traveled by the data in a specific amount of time is its Throughput. Distance traveled by the data is calculated as time divided by distance, which is the Throughput of recommendation. The magnitude serves as its representation, and it lacks direction.
Table 2 shows the results of the throughput testing suggested and the actual tactics and throughput (Mbps). During our analysis of the efficiency results in relation to throughput, we discovered that the throughput of the system increases proportionately with the magnitude of the operation. Figure 4 and Table 2 show that the suggested approach (RIFTC+SVR) outperforms existing approaches TRSC (throughput = 9 Mbps), Clustering (throughput = 9.8 Mbps), Cloud Rec (throughput = 14.56 Mbps) and QoS aware selection (throughput = 11 Mbps) in terms of throughput (25.99 Mbps).
The proximity of two or more measures to one another, regardless of whether they are accurate or not, is referred to as precision. Precision is defined as the attribute of being exact. Precise measurements may be inaccurate.
The measurement precision is the range of the values that were measured. Equation (29), Precision, can be evaluated by determining the range, or difference, between the lowest and highest measured values.
P r e c i s i o n = T o t a l   P o s i t i v e   +   T o t a l   N e g a t i v e T o t a l   P o s i t i v e
Figure 5 shows how the suggested approach (RIFTC+SVR) produced results with 97% precision. TRSC (42%), Clustering (63%), Cloud Rec (81%), and QoS aware selection (62%), combined, are all higher, providing further evidence of the suggested system’s effective operation (Table 3).
Latency, a term frequently used in networking slang to refer to the full round-trip time required for a data packet to transit, is the interval of time between a user action and a web application’s response to that action. The amount of time it takes for a resource to travel between the moments the browser requests it and the moments the browser receives it is one way to gauge latency. Milliseconds, or ms, are widely used to assess latency. The time it takes for a system to reply to queries or requests for data of various volumes and complexity can be used to compare latency with datasets. The findings can then be analyzed to discover any trends or patterns and develop a means to improve performance and reduce latency. This can help to guarantee that an information processing system is capable of handling the requirements of a business or application and giving users quick access to the data they require. Figure 5 demonstrates how the recommended strategy (RIFTC+SVR) resulted in a 51% latency. Clustering (72%), Cloud Rec (98%), TRSC (95%), and QoS aware selection (93%), taken together, are all lower, offering proof of the suggested system’s successful performance (Table 4).
Recall is a performance indicator for binary classification models that quantifies the percentage of correctly detected positive cases. The recall estimation of a machine learning model may be impacted by the network payload, which is the volume of data carried over a network. To evaluate the model’s capacity to locate optimistic samples, we utilize the recall measure. The recall is computed by dividing the total number of favorable samples by the percentage of significant samples that were properly identified as positive. This ratio is then multiplied by 100. Figure 6 shows that the suggested approach (RIFTC+SVR) produced a 97% recall rate. When combined, Clustering (76%) is lower than Cloud Rec (68%), TRSC (89%), and QoS aware selection (73%). It provides evidence of the successful operation of the suggested system (Table 5, Figure 7).

5. Discussion

In order to generate individualized recommendations, RIFBTC is a machine learning-based method that blends fuzzy logic and trust computation. It iteratively improves its recommendations using user data and feedback, and user trust levels are calculated using a fuzzy-based algorithm. Subsequently, the technique uses Support Vector Regression (SVR) to forecast the user’s rating of a certain service based on their preferences and usage patterns. Nevertheless, FFCA is a formal concept analysis-based methodology that uses mathematical concepts to find connections between consumers and services. It creates recommendations by identifying the most pertinent services that match the user’s preferences and uses formal concepts to represent the user preferences and services. The approach then uses fuzzy logic to determine how relevant the service is to the user. While both approaches have merits and disadvantages, RIFBTC has some benefits over FFCA. More freedom in modeling user preferences is provided by the fuzzy logic-based trust computation method used by RIFBTC, and the iterative design process enables continuous improvement of the recommendation system. Moreover, the use of SVR enables more precise service rating prediction. Yet, the formal concept analysis-based methodology of FFCA enables a more comprehensible and open recommendation system. Mathematical concepts can be used to identify pertinent services in a more precise and organized manner. While RIFBTC’s SVR-based rating prediction is more precise than FFCA’s fuzzy logic-based degree of relevance computation, the latter may be less flexible in representing complicated user preferences. Ultimately, the choice of method will rely on the particular requirements and objectives of the recommendation system, although both RIFBTC and FFCA are workable approaches for cloud services recommendation systems. While FFCA may be more suitable for systems that prioritize interpretability and transparency, RIFBTC may be better suited for systems that prioritize accuracy and flexibility.

6. Conclusions

Cloud computing is a new computer architecture that has developed in the current digital age from distributed systems and service-oriented design. As most cloud operations are expressed in plain language, especially web services, they cannot be chosen and have no uniform description. In this paper, the design of recommender systems frequently makes use of fuzzy logic to manage the ambiguity, imprecision, and vagueness of item features and user behavior. Product suggestions are a widely used function in social networks and e-commerce platforms at present. When extreme precision is required, the task becomes more urgent. Due to this problem, the customer wants a service that is reliable, appropriate, time-saving, and trustworthy. We suggest a recommendation system for cloud service users that uses Random Iterative Fuzzy Based Trust Computation (RIFTC), which focuses on estimating trust using Quality of Service (QoS) characteristics. Support Vector Regression (SVR), a Machine Learning (ML) approach, is used by the RIFTC to calculate trust. For a cloud-based user recommendation system, the trial results are evaluated using precision, latency, throughput, and mean absolute error. The experimental findings demonstrate that our suggested system performs better than the indicated system. The RIFTC and SVR would offer a less complicated, more adaptable system that could accommodate many business applications. However, the current fuzzy system is still in development and has similar evaluator biases constraints. To increase the effectiveness of our recommendation system, we plan to examine cloud service capabilities and incorporate dynamic trust into further work.

Author Contributions

Conceptualization, J.V.N.R., S.K. and M.A.; Formal analysis, K.S., M.Z.U.R. and M.E.; Investigation, K.S., M.Z.U.R. and M.E.; Methodology, J.V.N.R., S.K. and M.A.; Resources, K.S., M.Z.U.R. and M.E.; Writing—original draft, J.V.N.R. and S.K.; Writing—review & editing, M.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University (KKU) for funding this work through the Research Group Program Under the Grant Number: (R.G.P.2/451/44).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available through email upon request to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zain, T.; Aslam, M.; Imran, M.R.; Martinez-Enriquez, A.M. Cloud service recommender system using clustering. In Proceedings of the 2014 11th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), Ciudad del Carmen, Campeche, Mexico, 29 September–3 October 2014. [Google Scholar]
  2. Balaji, B.S.; Karthikeyan, N.K.; Raj Kumar, R.S. Fuzzy service conceptual ontology system for cloud service recommendation. Comput. Electr. Eng. 2018, 69, 435–446. [Google Scholar] [CrossRef]
  3. Saleh, R.A.; Driss, M.; Almomani, I. CBiLSTM: A hybrid deep learning model for efficient reputation assessment of cloud services. IEEE Access 2022, 10, 35321–35335. [Google Scholar] [CrossRef]
  4. Song, F.; Liu, Y.; Jin, W.; Tan, J.; He, W. Data-Driven Feedforward Learning With Force Ripple Compensation for Wafer Stages: A Variable-Gain Robust Approach. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 1594–1608. [Google Scholar] [CrossRef]
  5. Tang, W.; Yan, Z. CloudRec: A mobile cloud service recommender system based on adaptive QoS management. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015. [Google Scholar]
  6. Abbas, A.; Bilal, K.; Zhang, L.; Khan, S.U. A cloud based health insurance plan recommendation system: A user centered approach. Future Gener. Comput. Syst. 2015, 43–44, 99–109. [Google Scholar] [CrossRef]
  7. Cao, B.; Zhao, J.; Lv, Z.; Yang, P. Diversified personalized recommendation optimization based on mobile data. IEEE Trans. Intell. Transp. Syst. 2021, 22, 2133–2139. [Google Scholar] [CrossRef]
  8. Dai, X.; Xiao, Z.; Jiang, H.; Alazab, M.; Lui, J.C.S.; Min, G.; Dustdar, S.; Liu, J. Task offloading for cloud-assisted fog computing with dynamic service caching in enterprise management systems. IEEE Trans. Industr. Inform. 2023, 19, 662–672. [Google Scholar] [CrossRef]
  9. Preethi, G.; Krishna, P.V.; Obaidat, M.S.; Saritha, V.; Yenduri, S. Application of Deep Learning to Sentiment Analysis for recommender system on cloud. In Proceedings of the 2017 International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, China, 21–23 July 2017. [Google Scholar]
  10. Sun, L.; Hou, J.; Xing, C.; Fang, Z. A Robust Hammerstein-Wiener Model Identification Method for Highly Nonlinear Systems. Processes 2022, 10, 2664. [Google Scholar] [CrossRef]
  11. Mo, Y.; Chen, J.; Xie, X.; Luo, C.; Yang, L.T. Cloud-based mobile multimedia recommendation system with user behavior information. IEEE Syst. J. 2014, 8, 184–193. [Google Scholar] [CrossRef]
  12. Kong, D.; Zhai, Y. Trust based recommendation system in service-oriented cloud computing. In Proceedings of the 2012 International Conference on Cloud and Service Computing, Shanghai, China, 22–24 November 2012. [Google Scholar]
  13. Ding, S.; Li, Y.; Wu, D.; Zhang, Y.; Yang, S. Time-aware cloud service recommendation using similarity-enhanced collaborative filtering and ARIMA model. Decis. Support Syst. 2018, 107, 103–115. [Google Scholar] [CrossRef]
  14. Phasinam, K.; Kassanuk, T.; Shinde, P.P.; Thakar, C.M.; Sharma, D.K.; Mohiddin, M.K.; Rahmani, A.W. Application of IoT and cloud computing in automation of agriculture irrigation. J. Food Qual. 2022, 2022, 8285969. [Google Scholar] [CrossRef]
  15. Mezni, H.; Abdeljaoued, T. A cloud services recommendation system based on Fuzzy Formal Concept Analysis. Data Knowl. Eng. 2018, 116, 100–123. [Google Scholar] [CrossRef]
  16. Zhang, W.; Deng, P.; Gui, K.; Wu, X. An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis. Information and Software Technology. Inf. Softw. Technol. 2023, 158, 107194. [Google Scholar] [CrossRef]
  17. Rahhali, M.; Oughdir, L.; Jedidi, Y.; Lahmadi, Y.; El Khattabi, M.Z. E-learning recommendation system based on cloud computing. In Lecture Notes in Electrical Engineering; Springer: Singapore, 2022; pp. 89–99. [Google Scholar]
  18. Chen, J.; Li, K.; Rong, H.; Bilal, K.; Yang, N.; Li, K. A disease diagnosis and treatment recommendation system based on big data mining and cloud computing. Inf. Sci. 2018, 435, 124–149. [Google Scholar] [CrossRef]
  19. Aznoli, F.; Navimipour, N.J. Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions. J. Netw. Comput. Appl. 2017, 77, 73–86. [Google Scholar] [CrossRef]
  20. Liu, J.; Chen, Y. A personalized clustering-based and reliable trust-aware QoS prediction approach for cloud service recommendation in cloud manufacturing. Knowl. Based Syst. 2019, 174, 43–56. [Google Scholar] [CrossRef]
  21. Deebak, B.D.; Al-Turjman, F. A novel community-based trust aware recommender systems for big data cloud service networks. Sustain. Cities Soc. 2020, 61, 102274. [Google Scholar] [CrossRef]
  22. Velusamy, D.; Pugalendhi, G. Water cycle algorithm tuned fuzzy expert system for trusted routing in smart grid communication network. IEEE Trans. Fuzzy Syst. 2020, 28, 1167–1177. [Google Scholar] [CrossRef]
  23. Gayathri, R.; Rani, S.U.; Čepová, L.; Rajesh, M.; Kalita, K. A Comparative Analysis of Machine Learning Models in Prediction of Mortar Compressive Strength. Processes 2022, 10, 1387. [Google Scholar] [CrossRef]
  24. Gupta, K.K.; Kalita, K.; Ghadai, R.K.; Ramachandran, M.; Gao, X.-Z. Machine learning-based predictive modelling of biodiesel production—A comparative perspective. Energies 2021, 14, 1122. [Google Scholar] [CrossRef]
  25. Najafzadeh, M.; Niazmardi, S. A novel multiple-kernel support vector regression algorithm for estimation of water quality parameters. Nat. Resour. Res. 2021, 30, 3761–3775. [Google Scholar] [CrossRef]
  26. Kalita, K.; Shinde, D.S.; Ghadai, R.K. Machine Learning-Based Predictive Modelling of Dry Electric Discharge Machining Process. In Data-Driven Optimization of Manufacturing Processes; IGI Global: Hershey, PA, USA, 2021; pp. 151–164. [Google Scholar]
  27. Narayanan, G.; Joshi, M.; Dutta, P.; Kalita, K. PSO-tuned support vector machine metamodels for assessment of turbulent flows in pipe bends. Eng. Comput. 2020, 37, 981–1001. [Google Scholar] [CrossRef]
  28. Li, X.; Sun, Y. Stock intelligent investment strategy based on support vector machine parameter optimization algorithm. Neural Comput. Appl. 2020, 32, 1765–1775. [Google Scholar] [CrossRef]
  29. Indira, K.; Kavithadevi, M.K. Efficient machine learning model for movie recommender systems using multi-cloud environment. Mob. Netw. Appl. 2019, 24, 1872–1882. [Google Scholar] [CrossRef]
  30. Kesarwani, A.; Khilar, P.M. Development of trust based access control models using fuzzy logic in cloud computing. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1958–1967. [Google Scholar] [CrossRef]
  31. Ageed, Z.S.; Ibrahim, R.K.; Sadeeq, M.A.M. Unified ontology implementation of cloud computing for distributed systems. Curr. J. Appl. Sci. Technol. 2020, 39, 82–97. [Google Scholar] [CrossRef]
  32. Eisa, M.; Younas, M.; Basu, K.; Awan, I. Modelling and simulation of QoS-aware service selection in cloud computing. Simul. Model. Pract. Theory 2020, 103, 102108. [Google Scholar] [CrossRef]
Figure 1. A general framework for the recommendation system.
Figure 1. A general framework for the recommendation system.
Mathematics 11 02332 g001
Figure 2. Proposed framework.
Figure 2. Proposed framework.
Mathematics 11 02332 g002
Figure 3. Comparative analysis of MAE of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Figure 3. Comparative analysis of MAE of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Mathematics 11 02332 g003
Figure 4. Comparative analysis of throughput of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Figure 4. Comparative analysis of throughput of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Mathematics 11 02332 g004
Figure 5. Comparative analysis of precision of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Figure 5. Comparative analysis of precision of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Mathematics 11 02332 g005
Figure 6. Comparative analysis of latency of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Figure 6. Comparative analysis of latency of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Mathematics 11 02332 g006
Figure 7. Comparative analysis of recall of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Figure 7. Comparative analysis of recall of RIFTC+SVR with TRSC [30], Cloud rec [31], Clustering [18] and QoS aware service [32].
Mathematics 11 02332 g007
Table 1. Comparison of Mean Absolute Error with state-of-the-art.
Table 1. Comparison of Mean Absolute Error with state-of-the-art.
Data SetTRSC [30]Cloud Rec [31]Clustering [18]QoS Aware Service [32]RIFTC+SVR
12.52.21.81.991.5
22.62.31.92.11.7
32.82.52.12.31.9
42.92.672.22.452.1
532.982.352.782.3
Table 2. Comparison of Throughput (Mbps) with state-of-the-art.
Table 2. Comparison of Throughput (Mbps) with state-of-the-art.
Data SetTRSC [30]Cloud Rec [31]Clustering [18]QoS Aware Service [32]RIFTC+SVR
15.569.861516.33
269.51113.519
377.981312.6320
48.631116.331423.91
599.814.561125.99
Table 3. Comparison of Precision with state-of-the-art.
Table 3. Comparison of Precision with state-of-the-art.
Data SetTRSC [30]Cloud Rec [31]Clustering [18]QoS Aware Service [32]RIFTC+SVR
16354351599
28270422790
32542623293
47137794296
54263816297
Table 4. Comparison of Latency with state-of-the-art.
Table 4. Comparison of Latency with state-of-the-art.
Data SetTRSC [30]Cloud Rec [31]Clustering [18]QoS Aware Service [32]RIFTC+SVR
17186869935
59572989351
36181899539
48690979442
59572989351
Table 5. Comparison of recall with state-of-the art.
Table 5. Comparison of recall with state-of-the art.
Data SetTRSC [30]Cloud Rec [31]Clustering [18]QoS Aware Service [32]RIFTC+SVR
16354351599
28270422790
32542623293
47137794296
54263816297
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ramesh, J.V.N.; Khasim, S.; Abbas, M.; Shaik, K.; Rahman, M.Z.U.; Elangovan, M. Cloud Services User’s Recommendation System Using Random Iterative Fuzzy-Based Trust Computation and Support Vector Regression. Mathematics 2023, 11, 2332. https://0-doi-org.brum.beds.ac.uk/10.3390/math11102332

AMA Style

Ramesh JVN, Khasim S, Abbas M, Shaik K, Rahman MZU, Elangovan M. Cloud Services User’s Recommendation System Using Random Iterative Fuzzy-Based Trust Computation and Support Vector Regression. Mathematics. 2023; 11(10):2332. https://0-doi-org.brum.beds.ac.uk/10.3390/math11102332

Chicago/Turabian Style

Ramesh, Janjhyam Venkata Naga, Syed Khasim, Mohamed Abbas, Kareemulla Shaik, Mohammad Zia Ur Rahman, and Muniyandy Elangovan. 2023. "Cloud Services User’s Recommendation System Using Random Iterative Fuzzy-Based Trust Computation and Support Vector Regression" Mathematics 11, no. 10: 2332. https://0-doi-org.brum.beds.ac.uk/10.3390/math11102332

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop