A survey of privacy in multi-agent systems

Privacy has been a concern for humans long before the explosive growth of the Internet. The advances in information technologies have further increased these concerns. This is because the increasing power and sophistication of computer applications offers both tremendous opportunities for individuals, but also significant threats to personal privacy. Autonomous agents and multi-agent systems are examples of the level of sophistication of computer applications. Autonomous agents usually encapsulate personal information describing their principals, and therefore they play a crucial role in preserving privacy. Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness, autonomy, and the like. This article introduces the problem of preserving privacy in computer applications and its relation to autonomous agents and multi-agent systems. It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research.

[1]  Vicent J. Botti,et al.  Strategic pseudonym change in agent-based e-commerce , 2012, AAMAS.

[2]  B. Buunk,et al.  The Cambridge handbook of personal relationships , 2006 .

[3]  Olivier Boissier,et al.  Hippocratic Multi-Agent Systems , 2008, ICEIS.

[4]  Ian Horrocks,et al.  Privacy-Preserving Query Answering in Logic-based Information Systems , 2008, ECAI.

[5]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[6]  A. Gangopadhyay Managing business with electronic commerce : issues and trends , 2001 .

[7]  Pedro Meseguer,et al.  Distributed Forward Checking , 2003, CP.

[8]  Markus Jakobsson,et al.  IntelliShopper: a proactive, personal, private shopping assistant , 2002, AAMAS '02.

[9]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[10]  Nicholas R. Jennings,et al.  On Agent-Mediated Electronic Commerce , 2003, IEEE Trans. Knowl. Data Eng..

[11]  Laurent Vercouter,et al.  Contextual Integrity and Privacy Enforcing Norms for Virtual Communities , 2010, MALLOW.

[12]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[13]  Sahin Albayrak,et al.  An agent-based approach for privacy-preserving recommender systems , 2007, AAMAS '07.

[14]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[15]  Lise Getoor,et al.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.

[16]  Jose M. Such,et al.  An agent infrastructure for privacy-enhancing agent-based e-commerce applications , 2011, AAMAS'11.

[17]  Jose M. Such,et al.  Self-disclosure decision making based on intimacy and privacy , 2012, Inf. Sci..

[18]  Samir Chopra,et al.  Artificial Agents - Personhood in Law and Philosophy , 2004, ECAI.

[19]  Claudia Díaz Anonymity Metrics Revisited , 2005, Anonymous Communication and its Applications.

[20]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[21]  Olivier Boissier,et al.  Sensitive Data Transaction in Hippocratic Multi-Agent Systems , 2008, ESAW.

[22]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[23]  Vicent J. Botti,et al.  Partial identities as a foundation for trust and reputation , 2011, Eng. Appl. Artif. Intell..

[24]  Gilles Brassard,et al.  Privacy-preserving demographic filtering , 2006, SAC.

[25]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[26]  Anita L. Vangelisti,et al.  The Cambridge Handbook of Personal Relationships: RELATIONAL QUALITIES , 2006 .

[27]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[28]  V. Derlega,et al.  The Cambridge Handbook of Personal Relationships: Self-Disclosure in Personal Relationships , 2006 .

[29]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[30]  Guido Boella,et al.  Introduction to normative multiagent systems , 2006, Comput. Math. Organ. Theory.

[31]  Jonathan Grudin,et al.  A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.

[32]  Nadia Erdogan,et al.  SECMAP: A Secure Mobile Agent Platform , 2005, CEEMAS.

[33]  B Busby Security on the Internet. , 1997, Health physics.

[34]  Jose M. Such,et al.  A group‐oriented secure multiagent platform , 2011, Softw. Pract. Exp..

[35]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[36]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[37]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[38]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[39]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[40]  Yves Demazeau,et al.  Privacy Management in User-Centred Multi-agent Systems , 2006, ESAW.

[41]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[42]  Linda Jean Camp Privacy & reliability in internet commerce , 1996 .

[43]  Nadia Erdogan,et al.  An Overview of SECMAP Secure Mobile Agent Platform , 2005 .

[44]  Abdulsalam Yassine,et al.  Measuring users' privacy payoff using intelligent agents , 2009, 2009 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications.

[45]  Bharat Bhargava,et al.  Privacy and Trust in Online Interactions , 2008 .

[46]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[47]  A. Acquisti,et al.  Digital privacy : theory, technologies, and practices , 2007 .

[48]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[49]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[50]  Bart Willem Schermer,et al.  Software Agents, Surveillance and the right to privacy , 2007 .

[51]  Kai Rannenberg,et al.  The Future of Identity in the Information Society , 2009, The Future of Identity in the Information Society.

[52]  Benjamin C. M. Fung,et al.  Privacy-preserving data publishing , 2007 .

[53]  Michael Luck,et al.  Agent technology, Computing as Interaction: A Roadmap for Agent Based Computing , 2005 .

[54]  Hans Hedbom,et al.  Benefits of Privacy-Enhancing Identity Management , 2008 .

[55]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[56]  Haiping Xu,et al.  ADK: An Agent Development Kit Based on a Formal Design Model for Multi-Agent Systems , 2003, Automated Software Engineering.

[57]  Agusti Solanas,et al.  Advances in Artificial Intelligence for Privacy Protection and Security , 2009 .

[58]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[59]  Marit Hansen,et al.  Privacy and Identity Management , 2008, IEEE Security & Privacy.

[60]  Maria L. Gini,et al.  Design and implementation of a secure multi-agent marketplace , 2004, Electron. Commer. Res. Appl..

[61]  Natalia Criado,et al.  Open issues for normative multi-agent systems , 2011, AI Commun..

[62]  Ernesto Damiani,et al.  XML-based access control languages , 2004, Inf. Secur. Tech. Rep..

[63]  Milind Tambe,et al.  Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.

[64]  Makoto Yokoo,et al.  Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..

[65]  Sieuwert van Otterloo,et al.  The value of privacy: optimal strategies for privacy minded agents , 2005, AAMAS '05.

[66]  Milan Petkovic,et al.  Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.

[67]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[68]  Benjamin Gerber,et al.  Conceptualizing privacy , 2010, CSOC.

[69]  Stefan Poslad,et al.  Towards improved trust and security in FIPA agent platforms , 2004 .

[70]  Alistair Kelman,et al.  Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..

[71]  E. Argente,et al.  Designing Virtual Organizations , 2009, PAAMS.

[72]  Wenliang Du,et al.  Deriving Private Information from Association Rule Mining Results , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[73]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[74]  Josep Lluís de la Rosa i Esteva,et al.  A Taxonomy of Recommender Agents on the Internet , 2003, Artificial Intelligence Review.

[75]  Stefan Poslad,et al.  Specifying Standard Security Mechanisms in Multi-agent Systems , 2002, Trust, Reputation, and Security.

[76]  Frances M. T. Brazier,et al.  Anonymity services for multi-agent systems , 2010, Web Intell. Agent Syst..

[77]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[78]  Torsten Eymann,et al.  The conclusion of contracts by software agents in the eyes of the law , 2008, AAMAS.

[79]  Volker Roth,et al.  Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[80]  Andreas Abecker,et al.  Agent-Mediated Knowledge Management , 2004, Lecture Notes in Computer Science.

[81]  Nigel Shadbolt,et al.  Agent-based semantic web services , 2003, WWW '03.

[82]  Jessika Daecher The Future Of Identity In The Information Society Challenges And Opportunities , 2016 .

[83]  Andreas Abecker,et al.  Agent-mediated knowledge management : International Symposium AMKM 2003, Stanford, CA, USA, March 24-26, 2003 : revised and invited papers , 2004 .

[84]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[85]  Munindar P. Singh,et al.  Information Sharing among Autonomous Agents in Referral Networks , 2007, AP2PC.

[86]  Eugene C. Freuder,et al.  Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..

[87]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[88]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[89]  Adlen Ksentini IPv6 over IEEE 802.16 (WiMAX) Networks: Facts and Challenges , 2008, J. Commun..

[90]  Maria Fasli,et al.  On agent technology for e-commerce: trust, security and legal issues , 2007, The Knowledge Engineering Review.

[91]  Michael D. Smith,et al.  SSDPOP: improving the privacy of DCOP with secret sharing , 2007, AAMAS '07.

[92]  Tomaz Klobucar,et al.  Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.

[93]  Bert-Jaap Koops,et al.  Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.

[94]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[95]  Richard Cissée DAI-Labor An Architecture for Agent-Based Privacy-Preserving Information Filtering , 2003 .

[96]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[97]  Dogan Kesdogan,et al.  Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.

[98]  Mittal S. Bhiogade Secure Socket Layer , 2001 .

[99]  Carles Sierra,et al.  Information-based deliberation , 2008, AAMAS.

[100]  Josef Kittler,et al.  Privacy in Statistical Databases , 2012, Lecture Notes in Computer Science.

[101]  Alan Westin Philosophical Dimensions of Privacy: The origins of modern claims to privacy , 1984 .

[102]  Milan Petkovic,et al.  Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications) , 2007 .

[103]  J. Rubenfeld The Right of Privacy , 1989 .

[104]  Michael Wooldridge,et al.  An introduction to multiagent systems Wiley , 2002 .

[105]  Lee A. Bygrave,et al.  Electronic Agents and Privacy: A Cyberspace Odyssey 2001 , 2001, Int. J. Law Inf. Technol..

[106]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[107]  Chuleeporn Changchit Online Consumer Protection: Theories of Human Relativism , 2009 .

[108]  Robin Cohen,et al.  Smart cheaters do prosper: defeating trust and reputation systems , 2009, AAMAS.

[109]  Frances M. T. Brazier,et al.  Anonymity and software agents: An interdisciplinary challenge , 2004, Artificial Intelligence and Law.

[110]  Tom M. Mitchell,et al.  Experience with a learning personal assistant , 1994, CACM.

[111]  Frances M. T. Brazier,et al.  Enforcing security in the AgentScape middleware , 2008, MidSec '08.

[112]  Marius-Calin Silaghi,et al.  Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[113]  Samir Chopra,et al.  Privacy and Artificial Agents, or, Is Google Reading My Email? , 2007, IJCAI.

[114]  Mark Stamp,et al.  An agent-based privacy-enhancing model , 2008, Inf. Manag. Comput. Secur..

[115]  Andrew M. Odlyzko,et al.  Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.

[116]  Gerrit C. van der Veer,et al.  CHI '05 Extended Abstracts on Human Factors in Computing Systems , 2005, CHI 2005.

[117]  Michael Wooldridge,et al.  Autonomous agents and multi-agent systems , 2014 .

[118]  Abdulsalam Yassine,et al.  An Intelligent Agent-Based Model for Future Personal Information Markets , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[119]  Christian Damsgaard Jensen,et al.  Trading Privacy for Trust , 2004, iTrust.

[120]  Stefan Kopp,et al.  Intelligent Agents Living in Social Virtual Environments - Bringing Max into Second Life , 2008, IVA.

[121]  Maria Fasli,et al.  Agent Technology For E-Commerce , 2007 .

[122]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[123]  Jose M. Such,et al.  Magentix2: A privacy-enhancing Agent Platform , 2013, Eng. Appl. Artif. Intell..

[124]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[125]  Audun Jøsang,et al.  Authentication for Humans , 2001 .

[126]  M. Struik,et al.  Intelligent Software Agents : Turning a Privacy Threat into a Privacy Protector , 1999 .

[127]  Elisa Bertino,et al.  Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk , 2009, Trans. Data Priv..

[128]  Milind Tambe,et al.  Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.

[129]  Reputation-based Systems: a security analysis , 2007 .

[130]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[131]  A. Jøsang,et al.  Challenges for Robust Trust and Reputation Systems , 2009 .

[132]  Marcela D. Rodríguez,et al.  Privacy-Aware Autonomous Agents for Pervasive Healthcare , 2006, IEEE Intelligent Systems.

[133]  Jose M. Such,et al.  Enhancing privacy in Multi-agent Systems , 2012, AI Commun..

[134]  Andreas Krause,et al.  A Utility-Theoretic Approach to Privacy and Personalization , 2008, AAAI.

[135]  Jose M. Such,et al.  Privacy-intimacy tradeoff in self-disclosure , 2011, AAMAS.

[136]  Vicent J. Botti,et al.  A performance evaluation of three multiagent platforms , 2010, Artificial Intelligence Review.

[137]  Ronggong Song,et al.  Anonymous Communications for Mobile Agents , 2002, MATA.

[138]  Sushil Jajodia,et al.  The inference problem: a survey , 2002, SKDD.

[139]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[140]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[141]  Gary L. Bostwick A Taxonomy of Privacy: Repose, Sanctuary, and Intimate Decision , 1976 .

[142]  Dejan S. Milojicic,et al.  MASIF: The OMG mobile agent system interoperability facility , 1998, Personal Technologies.

[143]  Yufei Yuan,et al.  Privacy protection in electronic commerce - a theoretical framework , 2001 .

[144]  Rajeev Rastogi,et al.  SPARTAN: using constrained models for guaranteed-error semantic compression , 2002, SKDD.

[145]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[146]  Leila Ismail A Secure Mobile Agents Platform , 2008, J. Commun..

[147]  Bo Leuf,et al.  The Wiki Way: Quick Collaboration on the Web , 2001 .

[148]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[149]  N. R. Jennings,et al.  To appear in: Int Journal of Group Decision and Negotiation GDN2000 Keynote Paper Automated Negotiation: Prospects, Methods and Challenges , 2022 .

[150]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[151]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[152]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[153]  Abhilasha Bhargav-Spantzel,et al.  User centricity: a taxonomy and open issues , 2006, DIM '06.