Abstract
Recently, the enormous advantages of cloud services make them increasingly appealing to the small and medium-sized enterprises. The growing number of available services makes it challenging to select trustworthy services. Existing approaches focus on user preferences to guide personalized services recommendation for individual users, but lack of the research on trustworthy service recommendation for the small and medium-sized enterprises that represents a group user consisting of multiple individual users. For this type of enterprise, the cloud services recommendation must address the challenges from the diverse client context of individual users, the imprecise quality of experience in an uncertain cloud environment and the invalid or unsatisfactory recommendations. A client context-aware approach is proposed to recommend trustworthy cloud services for the small and medium-sized enterprises based on non-compensatory multi-criteria decision-making. In it, a type of client context is viewed as an independent evaluation criterion, and the interval neutrosophic numbers are employed to measure the fuzzy trustworthiness of cloud services. Based on the investigated outranking relations of interval neutrosophic numbers, a non-compensatory multi-criteria decision-making procedure via an improved ELECTRE III method is developed to rank candidate services. Experimental results demonstrate that this approach could efficiently produces the accurate ranking results of cloud services and effectively recommend the trustworthy service for small and medium-sized enterprises.
Keywords
Introduction
Motivation
Currently, the business activities of enterprises have been generating the massive data [1]. These data could be analyzed and are of great significance to improve the enterprise operations and management decisions. As the infrastructure of big data, cloud services (CSs) have been widely recognized by users. The investigation of VMWare shows that twenty-seven per cent of information technology (IT) work load is executed in cloud computing platform in 2016, and predicts that eighty-one per cent of IT work load will run in clouds in the future.
An enterprise is considered a small and medium enterprise (SMEs) when it has less than 250 employees [2]. SMEs are an important part of national economic systems. According to the report [3], there are more than 20 million registered SMEs in China at the end of 2015. In France, 99.9% of enterprises in the construction sector are SMEs [2]. Due to the limited budget, an SME usually cannot bear the expensive cost of building an private cloud, and it has become a prevailing trend to exploit the economic and effective public CSs to meet the urgent demands of SMEs for the storage, analysis and application of big data [4–6]. However, large number of candidate CS offerings, with the same or similar functions, have created a hot topic among researchers as they seek methods to help users select highly trustworthy CSs [7].
The existing approaches mainly employ the user preferences to achieve personalized CS recommendation for individual users [8–12]. In contrast to an individual user, an SME represents a group user consisting of multiple individual users. Furthermore, different from the large-scale enterprises, the SMEs’ client context is more diverse when they invoke CSs via different access devices and networks, and the CS’s quality of service (QoS) experienced by SMEs is more uncertain because of the dynamic work load in clouds. Thus, the CS recommendation for an SME must deal with the following challenges: The diversity of client context makes it complex to select the highly trustworthy CSs for an SME. As we known, the performance of CSs is usually dynamic due to the susceptibility and vulnerability of a cloud environment [9, 13], and the variation of user loads leads to changes in the CSs’ performance over time [10, 14]. More importantly, the existing literature indicates that the quality of experience (QoE) of users is affected by the client context, including the client device [15], locations [16], autonomous systems (ASs) [17]. The individual users from an SME may experience different QoS of one CS in a different client context at the same time. Thus, to find the trustworthy CSs for an SME, the decision maker must attach importance to the context’s effects on QoE and comprehensively evaluate the QoS of CSs from the angle of a group user. The compensable multi-criteria decision-making (MCDM) approaches are unable to filter out the invalid or unsatisfactory candidate CSs. The CS recommendation is usually modelled as an MCDM problem [9–11], in which the evaluation data from multiple criteria is aggregated with the weights. The multiple QoS attributes (e.g., usage cost, fault rate, response time, operability, privacy and availability [18]), multiple experts with different confidence level and risk attitudes [11], multiple sources of information that provide QoS evaluations [17], and multiple time periods [9, 10] may become the decision criteria for CS selection. These MCDM-based approaches assume that the decision criteria are compensable, but it is not the case for an SME. Under this assumption, the MCDM of CS recommendation might select an invalid or unsatisfactory candidate as the optimal CS for an SME based on fuzzy evaluation data, as shown in Section 3.
To measure the uncertain QoS of CSs based on the fuzzy evaluation data, some theories, such as the probability theory [19], fuzzy mathematics [20], rough set [21], interval number [22], evidence theory [17], are utilized in the existing researches. By introducing the interval neutrosophic set (INS) theory [23], two MCDM-based CS recommendation approaches [9, 10] are proposed by us and demonstrate the good performance in measuring the uncertainty of CSs’ QoS for individual users. However, these approaches supporting the compensation of multiple criteria neither identify the tolerable/unbearable threshold nor distinguish the minor/major difference for sensitive users. Thus, they cannot eliminate the possibility of selecting an invalid or unsatisfactory candidate as the optimal one for an SME.
The ELECTRE III [24, 25], in contrast to other MCDM procedures, is a non-compensatory method, which implies that a poor evaluation on a single criterion is not compensated for high scores in other criteria. This feature makes it more appropriate to solve the problem mentioned above, since an SME tends to discard a candidate that is proven poor on one criterion comparing to another candidate. However, the traditional ELECTRE III is quite difficult to apply directly into the CS recommendation for an SME due to deficiencies [26], such as the limited type of data not supporting the fuzzy evaluations, the complicated process of ranking computation and the partial order of all alternatives. Especially, the traditional ELECTRE III requires the users to provide exact threshold values for ensuring the correct ranking result of candidates, but this is not practical.
Our contributions
Aiming at the above challenges and the limitations of the existing researches, we formulates the SMEs-oriented CS recommendation problem as a non-compensatory MCDM problem via INS theory in order to select a highly trustworthy CS for an SME. In this problem, a type of client context is viewed as an independent evaluation criterion and the interval neutrosophic numbers (INNs) are employed to measure the fuzzy trustworthiness of CSs. An improved ELECTRE III method supporting INNs is developed to solve the non-compensable MCDM problem. Our contributions are as follows: An improved ELECTRE III method with INS is proposed to filter out the invalid or unsatisfactory candidate CSs. To make it feasible to solve the SMEs-oriented CS recommendation problem, the improved method employs an INS to evaluate the fuzzy trustworthiness of a CS, and simplifies the process of ranking computation for obtaining a total order of all candidate CSs. Meanwhile, the preference, indifference, and veto thresholds of the decision criteria are redefined with the relative ratio values rather than absolute values. The relative ratio thresholds are adaptive to enable reducing the difficulty of providing the exact values for users. These improvements facilitate the increase of the accuracy of SMEs-oriented CS recommendation. The outranking relations of INNs are proposed for supporting the new calculations related to the improved ELECTRE III method. We employ the INNs to assess the fuzzy trustworthiness of CSs from the perspective of client context analysis. A type of client context is viewed as an independent evaluation criterion, and the trustworthiness of CS is measured from three aspects including the performance, uncertainty, and potential risks. To conveniently support the non-compensatory MCDM of SMEs-oriented CS recommendation, the outranking relations of INNs based on an improved ELECTRE III method are developed to calculate the ranking values of candidate CSs based on theoretical proofs. We examine the proposed approach through experiments using a real-world dataset. The results demonstrate that the improved ELECTRE III method via INS can overcome the defects of the traditional method applied to the CS recommendation, and the proposed non-compensable MCDM procedure is effective for solving the SMEs-oriented CS recommendation problem.
The remainder of the paper is organized as follows: Section II introduces the related work. Section III gives the problem statement. Section IV defines the outranking relations of INNs for an improved ELECTRE III method. Section V puts forward the non-compensatory MCDM procedure of SMEs-oriented CS recommendation. Section VI analyzes the experimental results. Finally, Section VII concludes the paper.
Related work
MCDM and ELECTRE method
MCDM attempts to handle the real-life decision problems, involving several conflicting criteria that should be taken into account conjointly and a set of alternatives to be chosen from, in order to reach at a reasonable decision [24]. The majority of the existing methods, such as techniques for order preference by similarity to an ideal solution (TOPSIS), analytic hierarchy process (AHP), fuzzy analytic hierarchy process (FAHP), and analytic network process (ANP), are function models to solve MCDM problems. In these methods, the priority of the alternatives will be obtained after being aggregated by given weights and it is assumed that the criteria are compensatory. For example, even if alternative A is worse than alternative B on one criterion (A ≠ B), A may be compensated from other criteria and the final consequence may be A > B. In fact, in some cases, one criterion should not be compensated for others, such as the Example 1. If a comprehensive evaluation is still aggregated by function models in these situations, the actual will of decision makers will be ignored, which may lead to information loss. Thus, another method, namely the relation model, is proposed to cope with these situations. The relation model employs the pair-wise comparison of alternatives for each single criterion to rank the alternatives in terms of the priority order among the criteria [27]. The ELECTRE (elimination and choice expressing reality) methods are the representatives in this domain.
ELECTRE refers to one family of MCDM methods known as “outranking relations” to rank a set of alternatives [28]. Recently, the theoretical foundations of ELECTRE have been intensively investigated and different versions of the ELECTRE method were proposed, such as ELECTRE I, ELECTRE Iv, ELECTRE II, ELECTRE III, ELECTRE IV, ELECTRE TRI, ELECTRE IS, ELECTRE TRI-C and ELECTRE TRI-nC for dealing with different decision aiding situations [24]. Obviously, each of the ELECTRE versions differs operationally, and they also differ with respect to the type of problems they can be used for. ELECTRE II, III, and IV were designed for the task of constructing an ordering of the alternatives from the best to the worst, namely the ranking problem. ELECTRE II is based on true criteria, whereas the other two methods use pseudo-criteria. The concept of pseudo-criteria allows to model imperfect knowledge due to preference and indifference thresholds. The major difference between ELECTRE III and ELECTRE IV is that the latter method does not use criteria weights. ELECTRE IV is used when quantifications are not possible, whereas ELECTRE III is suitable when it is possible and desirable to quantify the relative importance of criteria [29].
However, some inadequacies [25] of the traditional ELECTRE III method make it difficult to apply directly to CS recommendation. These inadequacies include the limited types of data not supporting the fuzzy evaluations, the complicated process of ranking computation, and the partial order of all alternatives. In addition, the traditional method requires the users to provide the exact threshold values, which is impractical for the decision makers of CS recommendation in an uncertain cloud environment. Thus, although ELECTRE III as a non-compensatory method is promising to solve the CS recommendation problem for an SME, some significant improvements are indispensable.
Service selection based on MCDM
The common MCDM methods (e.g., AHP, ANP, FAHP, ELECTRE, and TOPSIS) have been used recently to solve the CS recommendation problem.
Referring to AHP and ANP, Choi et al. [18] apply a pairwise comparison matrix and an eigenvector of the matrix to calculate the weights of QoS attributes, and propose a quality evaluation system for service selection according to the QoS preferences of users. Sun et al. [11] present an AHP approach to calculate the semantic similarity between concepts, and propose an MCDM technique based on TOPSIS to rank CSs. Garg et al. [29] employ an AHP method to measure the QoS attributes and rank CSs. Similarly, Menzel et al. [31] introduce an ANP method for selecting IaaS services. Ma et al. propose a trustworthy CS selection approach that employs FAHP method to calculate the weights of user features [17] and a variation-aware CS selection approach that exploits the cloud model theory to quantify the variation characteristics of CSs’ QoS from four aspects [8]. Liu et al. [30] put forward a multi-attribute group decision-making approach for solving cloud vendor selection by integrating an improved TOPSIS. Based on the QoS time series analysis, Ma et al. [9] introduce the INS theory into measuring the trustworthiness of CSs, and formulate a time-aware CS selection as an MCDM problem, which is solved by developing an improved TOPSIS method with INS.
These approaches mainly exploit the user preferences based on historical data to achieve the personalized recommendation for individual users. There is little work undertaken for the SMEs-oriented CS selection. An SME represents a group user consisting of multiple individual users. Taking into account the characteristics of the uncertain cloud environment and the diverse user features [15–17], it will be a feasible idea to recommend a highly trustworthy CS to an SME by modeling the different types of client contexts as the decision criteria.
NS and INS theory
Since the fuzzy set (FS) theory is presented, many extensions have been proposed to settle the issues surrounding the imprecise or uncertain information. These extensions [31] include interval-valued FS (IVFS), intuitionistic FS (IFS), and interval-valued intuitionistic FS (IVIFS). Based on the fact that IFSs cannot handle indeterminate information [32], Smarandache [33, 34] proposed the neutrosophic set (NS). An NS is a set of neutrosophic numbers (NNs) and an extension to IFS’s standard interval [0, 1]. Each NN possesses the degrees of truth, indeterminacy, and falsity, whose values lie in the non-standard unit interval ] 0-, 1+ [, and the degrees of truth, indeterminacy, and falsity are independent.
For the convenience of application of NS in a practical application, Smarandache [35] and Wang et al. [23] propose an instance of NS called a single-valued NS (SVNS). In turn, Ye [36], puts forward a simplified NS (SNS), which can be described by three real numbers in the real unit interval [0, 1]. Sometimes the degrees of truth, falsity, and indeterminacy in a certain statement cannot be precisely defined in real situations, but they can be denoted by several possible interval values, requiring the interval NS. Wang et al. [23] propose the INS and interval NN (INN), and provide its set-theoretic operators. Recently, NS and its extensions have been applied into many fields, such as the decision support [37], valuation methods [38], recommender systems [39], and e-commerce [40].
NS has also been applied to the MCDM problems. Ye [32] develops an MCDM approach by using SVNS correlation coefficient measurement. Zhang et al. [41] present a correlation coefficient measure of INS and develop an MCDM method that takes into account the influence of the evaluations’ uncertainty and both the objective and subjective weights. Liu et al. [42] propose several SVNS aggregation operators based on Hamacher operations and develop an MCDM approach. Karaaslan [43] proposes two MCDM approaches under both single-valued neutrosophic refined and interval neutrosophic refined environments. Peng et al. [44] investigate the MCDM problems with multi-valued neutrosophic information.
The above work focuses on the application of NS and INS in generalized MCDM problems. To effectively address the specific problems, it is necessary to constantly develop the NS and INS theories for meeting the users’ requirements in different application scenarios. In our previous research [10], we introduce the INS theory to improve the traditional ELECTRE I method [45] and develop an MCDM-based CS ranking prediction approach for individual users. However, this approach focuses on employing INS to identify neighbouring users, not involving the outranking relations of INNs. Besides, entirely different from the ELECTRE III, the ELECTRE I neither identifies the tolerable/ unbearable threshold nor distinguishes the minor/major difference for the sensitive users. Thus, it cannot eliminate the possibility of selecting the invalid or unsatisfactory candidate as the highly trustworthy CS for an SME.
To the best of our knowledge, no similar research has investigated the SMEs-oriented trustworthy CS recommendation using ELECTRE III method with the INS theory as we have done in this paper. In our work, from the perspective of client context analysis, the highly trustworthy CS is recommended to an SME based on a non-compensatory MCDM procedure, with consideration of removing the invalid and unsatisfactory candidates.
Problem statement
In this section, we clarify the SMEs-oriented trustworthy CS recommendation problem with an example.

An example of CS recommendation.
A type of client device in different locations is viewed as an independent evaluation criterion. There are six criteria, denoted by criteria #1-#6. The response time of 3 candidate CSs, denoted by CS1-CS3, is listed in Table 1.
Response time data in different client context
Based on the ordered weighted averaging (OWA) operator, the aggregated response time data of 3 CSs, in order, is 1.577, 1.562 and 1.580 seconds. Thus, the ranking result is CS2≻ CS1≻ CS3, namely, CS2 is optimal. However, this ranking is obviously fraught with defects due to the following reasons: Based on the assumption that the criteria are compensable, the MCDM of CS recommendation may identify an invalid candidate as the best one for an SME. Even if a CS behaves badly on one criterion, this CS is still likely to acquire an absolute advantage over all other candidates by accumulating its weak advantages on other criteria. In Table 1, although CS2 is remarkably underperforming compared to CS1 and CS3 on criterion #6, CS2 is still chosen as the optimal one due to its advantages on criteria #1-#5. However, according to “2–5–10” principles [9, 17] of response time in software testing analysis, the response time less than 2 seconds is satisfactory for users. The degree of user satisfaction will significantly decrease when the response time is more than 2 seconds, and the users usually will not accept a response time over 10 seconds. Thus, CS2 may be an invalid candidate for some sensitive users in reality even if its overall performance is the best among all candidates because its response time substantially exceeds 2 seconds on criterion #6 while other 2 CSs do well. Unfortunately, the existing MCDM-based CS recommendation approaches enable the compensability of multiple evaluation criteria, and do not identify a tolerable or unbearable threshold that may have seriously impact on QoE. Therefore, they cannot avoid recommending an invalid candidate CS to an SME. The compensable MCDM methods might mistakenly choose an unsatisfactory candidate as the optimal CS for an SME. In Table 1, CS1 only retains a slight advantage that its response time is 10 percent less than that of CS3 on criteria #1-#5. In practice, this weak advantage is often overlooked because the evaluations of the CSs’ performance are imprecise in an uncertain cloud environment. However, the response time of CS1 is 50 percent more than that of CS3 on criteria #6, that is, CS1 is 50% worse than CS3 on criteria #6. In this case, CS3 obviously is superior to CS1. This conclusion conflicts with the result from the comprehensive assessment that CS1 outperforms CS3. The reason is that the existing methods do not distinguish the minor difference and major difference among the performance evaluations, and cannot adequately handle the effects of such differences on ranking results when comparing one CS with another.
As shown in Table 1, the single value cannot exactly depict the performance variation of CSs, some approaches based on the probability theory [19], fuzzy mathematics [20], rough set [21], interval number [22], evidence theory [17] and INS theory [9, 10], are proposed to process the imprecise evaluation data. However, these approaches supporting the compensation of multiple criteria neither identify the tolerable/unbearable threshold nor distinguish the minor/major difference for sensitive users. Thus, they cannot eliminate the possibility of selecting an invalid or unsatisfactory CS as the optimal one for SMEs.
As a type of non-compensatory method, ELECTRE III is more appropriate to handle the above problem. However, the traditional ELECTRE III method is difficult to apply directly to it due to some deficiencies [26], such as the limited type of data not supporting fuzzy evaluations, the complicated process of ranking computation, and the partial order of all alternatives. Especially, the traditional ELECTRE III method requires users to provide exact threshold values for ensuring the correct ranking result of candidates. Obviously, this is not practical.
Thus, this paper proposes an SMEs-oriented trustworthy CS recommendation approach based on non-compensatory MCDM. In it, a type of client context is viewed as an independent evaluation criterion, and the INNs are employed to measure the fuzzy trustworthiness of CSs. Based on the investigated outranking relations of INNs, the non-compensatory MCDM procedure via an improved ELECTRE III method with INS is developed to rank CSs.
The classic ELECTRE III method calculates the ranking values of all alternatives based on the single-valued evaluations. To overcome the limitations of single-valued data that fails depict the performance variation of CSs in an uncertain cloud environment, this paper defines the trustworthiness INN to describe the fuzzy trustworthiness of CSs. The outranking relations of INNs which will be employed in the improved ELECTRE III method are also established.
For example, a trustworthiness INN of CS A T A = < [0.8, 0.9], [0.2, 0.3],[0.1, 0.3]>means that the performance of A is scored as [0.8, 0.9], the potential risk of A is scored as [0.2, 0.3], and the uncertainty of A is scored as [0.1, 0.3]. According to Definition 1, a trustworthy CS should possess a high-performance score and low potential risk and uncertainty scores.
If p <G(TA, TB), then TA is strictly preferred to TB, denoted by T
A
> ST
B
. Otherwise, TA is not strictly preferred to TB, denoted by T
A
If q <G(TA, TB) ≤ p, then TA is weakly preferred to TB, denoted by T
A
> WT
B
. Otherwise, TA is not weakly preferred to TB, denoted by T
A
If –q ≤ G(TA, TB) ≤ q, then TA is indifferent to TB, denoted by T
A
∼ IT
B
. If G(TA, TB) < –q, namely G(TB, TA) > q, then relation between T
A
and T
B
could be T
B
> ST
A
or T
B
> WT
A
according to (1) and (2).
Obviously, there are three binary relations between the INNs of CSs A and B. They are strong dominance relation, weak dominance relation, and indifference relation. If T A is strictly preferred to T B , it means that T A strongly dominates T B . If T A is weakly preferred to T B , it means that T A weakly dominates T B .
If T
A
= < [0.7, 0.8],[0.0, 0.1],[0.1, 0.2]>and T
B
= < [0.6, 0.7], [0.1, 0.2],[0.2, 0.3]>are two trustworthiness INNs of CSs A and B, respectively, then G(T
A
, T
B
) = 0.6 > p. Hence, the relation between T
A
and T
B
is that T
A
> ST
B
, that is, T
A
is strictly preferred to T
B
. If T
A
= < [0.7, 0.9],[0.1, 0.2],[0.2, 0.3]>and T
B
= < [0.6, 0.7], [0.1, 0.2],[0.2, 0.3]>are two trustworthiness INNs of CSs A and B, respectively, then q <G(TA, TB) = 0.3 ≤ p. Thus, the relation between TA and TB is that T
A
> WT
B
, that is, TA is weakly preferred to TB. If TA = < [0.6, 0.7],[0.1, 0.2],[0.1, 0.3]>and T
B
= < [0.6, 0.7], [0.1, 0.2],[0.2, 0.3]>are two trustworthiness INNs of CSs A and B, respectively, then –q <G(TA, TB) = 0.1 ≤ q. Therefore, TA is indifferent to TB, that is, T
A
∼ IT
B
.
If v <G(TA, TB), then TA is strongly opposed to TB, denoted by T
A
> SOT
B
. Otherwise, TA is not strongly opposed to TB, denoted by T
A
If p <G(TA, TB) ≤ v, then TA is weakly opposed to TB, denoted by T
A
> WOT
B
. Otherwise, TA is not weakly opposed to TB, denoted by T
A
If –p <G(TA, TB) ≤ p, then TA is indifferently opposed to TB, denoted by T
A
∼ IOT
B
. If G(TA, TB) < –p, namely G(TB,TA) > p, then the relation between T
A
and T
B
could be T
B
> SOT
A
or T
B
> WOT
A
according to (1) and (2).
Similarly, let v
j
and p
j
represent the veto threshold and the preference threshold, respectively, on criterion #j. The discordance index for rejecting the assertion “A outranks B” on criterion #j (j = 1,2, ...,m) is defined as follows:
The concordance index characterizes the strength of the positive arguments to validate the assertion that A is better than B. In general, if A is better than B, there may be some criteria where A is worse than B. And the discordance index is employed to verify the hypothesis “A is worse than B” for a given criterion. The veto threshold for each criterion is assigned to introduce discordance into the outranking relations.
The dominance index denotes the difference of the credibility index between each pair.
Then the sequence with the complete order of candidate CSs is established.
It should be noted that the traditional ELECTRE III method defines the ranking index to rank the alternatives. According to the ranking index, two complete preorders Z1 and Z2 will be constructed and the final result Z = Z1 ∩ Z2 is obtained. Frequently, however, the two orders are not the same and the final ranking is usually not a complete order. As a consequence, the approach in this paper adopts Equations (1)–(8) to construct the ranking and finally explores a complete order.
By applying the outranking relations of INNs, a non-compensatory MCDM procedure via an improved ELECTRE III is proposed to recommend the trustworthy CSs for SMEs, under the situation that assessment information on criteria is INNs.
Overall framework
The overall framework of the proposed MCDM procedure is shown in Fig. 2.

The proposed non-compensatory MCDM procedure.
Assume that n candidate CSs {A1, A2, ..., A
n
} could provide the function indeed matching with the requirements of an SME. Next, the client context of an SME can be analyzed. A type of client device in different ASs can be viewed as a type of client context, namely an independent evaluation criterion. The desktop computer, palmtop and cellular phone are the most common types of client devices [15]. Assuming that the SME consisting of multiple individual users is scattered in l ASs, the total number of decision criteria is m = 3×l. Assume that P = {p1, p2, ..., p
m
}, Q = {q1, q2, ..., q
m
}, and V = {v1, v2, ..., v
m
} are the preference threshold, indifference threshold, and veto threshold for m decision criteria, respectively. W = {w1, w2, ..., w
m
} represents the weights of decision criteria, 0 ≤ w
j
≤ 1, and
The original data is pre-processed into the trustworthiness INNs as follows:
The loss-type performance indicators can be normalized by:
Let
Similarly, the comprehensive potential risk evaluation from user #i in the jth client context,
The performance of CS a in the jth client context is defined as oa,j, described with an interval number
In the traditional ELECTRE III method, the preference threshold (P), indifference threshold (Q), and veto threshold (V) are defined by absolute values. However, the performance of CSs is dynamic and uncertain due to the susceptibility and vulnerability of cloud environment. The performance difference between two candidate CSs may be very small in one application scenario, but could also be significantly large in another scenario. Users can hardly predict the appropriate values for P, Q, and V. Thus, the exact thresholds are not suitable for the SMEs-oriented CS recommendation problem.
In this paper, we propose an innovation that employs the relative ratio rather than absolute values to define the thresholds for improving the ELECTRE III method. The performance evaluation values of different CSs may be quite different in both the traditional ELECTRE III and our improved ELECTRE III with INS. According to Equation (1), the value of g(T
A
) ranges from –4 to 2. When the performance difference between CSs is too large or too small, P, Q, and V cannot work effectively to solve the MCDM problem. Thus, the performance evaluation values of candidate CSs must be normalized. Assuming that g
j
(T
A
i
) (i = 1,2,...,n; j = 1,2, ..., m) represents the performance evaluation of CS A
i
on criteria #j, its normalized value is defined by
The performance difference between CSs A
i
and A
k
, denoted by G
j
(T
A
i
, T
A
k
), also becomes a normalized value within [0, 1]. Next, we limit the range of P, Q, and V to [0, 1] and the thresholds related to criterion #j satisfy 0 ≤ q
j
<pj <vj ≤ 1. Then, the preference threshold, indifference threshold, and veto threshold become the relative ratio values. In this case, the suggested values of P, Q and V may be given for different types of users as follows: For the cautious SMEs which are very sensitive to the CSs’ QoS, the range of Q is [0, 0.10], the range of P is [0.15, 0.20], and the range of V is [0.25, 0.30]. For the moderate SMEs which could accept the variation of the CSs’ QoS to some extent, the range of Q is [0.10, 0.15], the range of P is [0.20, 0.25], and the range of V is [0.30, 0.40]. For the optimistic SMEs which could tolerate a wide variation range of the CSs’ QoS, the range of Q is [0.10, 0.20], the range of P is [0.25, 0.35], and the range of V is [0.40, 0.50].
Based on the above preparations, a procedure to rank candidate CSs is given as follows:
Then, calculate the trustworthiness difference G
j
(T
A
i
, T
A
k
) between any two CSs on each criterion.
Thus, the global concordance matrix C with all candidate CSs is denoted as follows:
Trustworthiness INNS of 3 CSs
Trustworthiness INNS of 3 CSs
To illustrate the effectiveness of the proposed approach, the following experiments are executed.
Case analysis based on simulation data
Firstly, we apply the improved ELECTRE III method with INS to Example 1.
The weights of criteria #1-#6 are set as: W = {1/6, 1/6, 1/6, 1/6, 1/6, 1/6}. Assuming the SME is a moderate user, the thresholds of every criterion are given as: P = {0.20, 0.20, 0.20, 0.20, 0.20, 0.20}, Q = {0.10, 0.10, 0.10, 0.10, 0.10, 0.10} and V = {0.30, 0.30, 0.30, 0.30, 0.30, 0.30}. The response time data in Table 1 are used to generate the trustworthiness INNs of CSs. In Table 1, the performance of each CS is given by a single value. Thus, we employ a specific interval number, which has the same upper limit and lower limit, to describe the performance of a CS. Moreover, considering that the evaluations of potential risk are missing, we employ [0, 0] to describe the interval evaluation of the potential risk or uncertainty. Based on Equations (14) and (15), the trustworthiness INNs of 3 CSs (i.e., A1-A3) are obtained as shown in Table 2.
Next, the MCDM procedure via the improved ELECTRE III with INS is as follows:
Firstly, calculate the performance matrix. The normalized trustworthiness is as follows:
Obtain the discordance index matrix, and then the credibility index matrix between candidates is as follows:
The dominance index matrix is as follows:
The net dominance matrix is I = [–1.0000, –1.0000, 2.0000]. Thus, the ranking list of CSs is: A3≻A2≻A1. Obviously, the improved ELECTRE III method via INS can remove all distractions from the invalid candidate A2 or unsatisfactory candidate A1 and recommend the optimal A3 to an SME.
Case analysis based on real dataset
To demonstrate our approach, we also use WS-DREAM dataset #1 [49], which describes real-world QoS evaluation results obtained from 339 users on 5,825 services. The dataset has been applied to research concerned with cloud computing [17, 50]. Considering that no client devices information is given in this dataset, the AS information is employed to differentiate the client contexts. The statistics show that 339 users are distributed in 138 ASs. 4 ASs that contain more than 6 users are listed in Table 3.
Trustworthiness INNs of candidate CSs
Trustworthiness INNs of candidate CSs
Assuming that the individual users of a group are distributed in the above 4 ASs, services #35-#40 are selected as the candidate CSs, and their response time data is collected from the users in the 4 ASs. Services #35-#40 are denoted by A1-A6, respectively, and the 4 ASs, including AS680, AS559, AS2500 and AS786, are denoted by criteria #1-#4, respectively. The total number of users in each AS determines the weight of the criterion. The original data used in the experiments is given in Appendix A.1. Based on the data, the potential risks of services are evaluated by employing the same method in Ref. [9, 10].
According to the data, only 27 users from AS680 invoke CSs (i.e., A1-A6), and the evaluations of user #329 are missing. Then, the weights of criteria #1-#4 are set as: W = {27/52, 9/52, 9/52, 7/52}. The thresholds of each criterion are given as: P = {0.20, 0.20, 0.20, 0.20}, Q = 0.10, 0.10, 0.10, 0.10 and V = {0.30, 0.30, 0.30, 0.30}. Based on Equations (9)–(13), the original evaluation data is pre-processed into the performance cloud models and potential risk cloud models, and the results are given in Appendix A.2. Based on Equations (14) and (15), the trustworthiness INNs of candidate CSs are obtained as shown in Table 4.
ASs used in experiments
Next, the MCDM procedure via the improved ELECTRE III is executed as follows:
Obtain the trustworthiness difference matrix D as shown in Fig. 3(a).

Values of some matrices. (a) D; (b) cM; (c) dM.
A comparative study was done in order to verify the feasibility of the proposed approach. The proposed approach is compared with two other methods. The methods are described as follows: (1) Approach #1: the ELECTRE III with INS by employing the absolute values of thresholds to guide the decision;
(2) Approach #2: the traditional ELECTRE III with single values, in which the performance of a CS in a criterion is described with the average value of evaluations from all users in one AS, by employing the relative ratio values of thresholds to guide the decision; (3) Approach #3: the proposed approach, the ELECTRE III with INS by employing the relative ratio values of thresholds to guide the decision. In the experiments, we also investigate the influence of preference threshold (P), indifference threshold (Q), and veto threshold (V) on the ranking order of the candidates. Three types of users are simulated by setting different P, Q and V. For the cautious SMEs, P = {0.2, 0.2, 0.2, 0.2}, Q = {0.1, 0.1, 0.1, 0.1}, V = {0.3, 0.3, 0.3, 0.3}; For the moderate SMEs, P = {0.25, 0.25, 0.25, 0.25}, Q = {0.1, 0.1, 0.1, 0.1}, V = {0.4, 0.4, 0.4, 0.4}; For the optimistic SMEs, P = {0.3, 0.3, 0.3, 0.3}, Q = {0.1, 0.1, 0.1, 0.1}, V = {0.5, 0.5, 0.5, 0.5}. When the other setup is identical to the previous experiment, the comparison results are shown in Table 5. From Table 5, the analysis is given as follows:
The result obtained by different approaches
The result obtained by different approaches
Approach #1 obtains the correct ranking result only when P, Q and V are set large enough. For the cautious and moderate SMEs, approach #1 identifies A3 as the optimal one. Obviously, the performance of A3 worse than A2 according to Table 4. This shows the deficiency of approach #1. It is difficult to exactly predict the absolute values of thresholds in a specified application scenario. Approach #2 finds the optimal CS by employing the relative ratio values of thresholds. However, the ranking results change when the thresholds are set to different values. The reason is that the static average value is difficult to exactly reflect the real performance of a CS, and the single evaluation value easily covers up the flaws of a CS if its performance is unreliable and unstable. In this case, it is completely possible that an invalid candidate is selected as the optimal CS. Fox example, assuming that {0.50, 5.40, 5.00, 5.00, 1.00, 0.50, 0.40, 0.20, 0.30, 0.40} and {1.97, 1.89, 1.85, 1.86, 1.79, 1.79, 1.92, 1.88, 1.95, 1.90} are the response time data from the users in one AS about CSs a and b, respectively, the average value of CS a, namely 1.87, is less than that of CS b, namely 1.88. Nevertheless, CS b obviously outperforms CS a because 30 percent of users experienced the long wait time of CS a and it is far beyond the expected 2 seconds. Approach #3 analyzes the trustworthiness of CSs from three aspects including the performance, uncertainty and potential risk via the cloud model method and the INS theory. The data from each user may contribute to the objective and comprehensive evaluations of a CS, which facilitates to make the right decision. Table 5 shows that the ranking values of the top 3 CSs obtained by approach #3 are correct when the thresholds are set with different values.
The following experiments compare the accuracy of three approaches. We choose 10 services including services #35-#40 and other 4 services selected randomly from dataset. The comprehensive evaluations of other 4 services should be worse than service #36 that has been identified as the optimal CS among services #35-#40 in the previous experiments. The individual users are still selected from the above 4 ASs. The initial thresholds is set as: P = {0.20, 0.20, 0.20, 0.20}, Q = {0.10, 0.10, 0.10, 0.10}, V = {0.30, 0.30, 0.30, 0.30}. Every experiment is repeated 100 times and check whether three approaches pick out the optimal service #36 correctly. The accuracy is defined as the hit rate of the optimal service #36 in 100 trials. The veto threshold is updated from 0.30 to 0.65 and the above experiment is repeated 8 rounds. The results are shown in Fig. 4.

Comparative analysis.
From the comparison analysis, it is evident that the proposed approach is more accurate in solving the MCDM-based CS recommendation problems for an SME compared to other two approaches. The major advantages of the proposed approach are as follows: First, it is capable to select the highly trustworthy CS based on the fuzzy data in an uncertain cloud environment by utilizing the trustworthiness INNs to evaluate the performance and potential risks of CSs. Second, it can help those users sensitive to the QoS select valid and satisfactory CSs by identifying the preference, indifference and veto thresholds. Third, by modelling the client contexts as evaluation criteria and exploiting the improved ELECTRE III method, it becomes an effective non-compensatory MCDM approach for SMEs-oriented CS recommendation.
To verify the feasibility of the proposed approach, we analyze its execution time when the more candidate services are selected randomly from the dataset in experiments. The experiments are executed in a notebook with Intel i7-8550U processor and 16G memory. The results are shown in Fig. 5.

Execution time analysis.
Figure 5 demonstrates that the proposed approach only consumes about 0.5 second when the number of candidate services is up to 40. Thus, the proposed approach explores a complete order of candidate CSs at the low cost of ranking computation in a convenient and practical way.
In an uncertain cloud environment, the compensability of evaluation criteria may result in an invalid or unsatisfactory candidate being mistakenly identified as the optimal CS for an SME, which will significantly reduce the accuracy of trustworthy CS recommendation. Aiming at the deficiency of traditional MCDM-based approaches with the compensable decision criteria, this paper proposes a novel client context-aware approach to select trustworthy CSs for SMEs based on non-compensatory MCDM. In this approach, a type of client context is viewed as an independent evaluation criterion, and the INNs are employed to measure the fuzzy trustworthiness of CSs. The outranking relations of INNs are proposed based on theoretical proofs. To solve this problem, an improved ELECTRE III method supporting the trustworthiness INNs is developed by simplifying the process of ranking computation for a total order of all CSs and redefining the indifference, preference and veto thresholds with the relative ratio values. These improvements facilitate increasing the accuracy of SMEs-oriented trustworthy CS recommendation. The case analysis and the experiments based on a real-world dataset demonstrate that the proposed approach can efficiently produce accurate ranking results of candidate CSs, and effectively solve trustworthy CS recommendation problem for an SME.
Footnotes
Appendix
A.1 Original data used in the experiments
The original data used in the experiments is shown in Table A.1.
Performance cloud models and potential risk cloud models
The preprocessed performance cloud models and potential risk cloud models are shown in Tables A.2 and A.3.
Acknowledgment
This work was partially supported by the MOE (Ministry of Education in China) Humanities and Social Science Research Project ("decision-making research on trustworthy cloud service selection for small and medium-sized enterprise users in big data environment", No. 18YJCZH124), Scientific Research Fund of Hunan Provincial Education Department (Outstanding Young Project) (No. 18B037), Natural Science Foundation of Hunan Province, China (No. 2020JJ4440), National Natural Science Foundation of China under Grant (No. 62077014). (Corresponding author: Hongyu Zhang.)
