Privacy Protection in Trust Models for Agent Societies

In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.

[1]  José Luís Calvo-Rolle,et al.  A Bio-inspired knowledge system for improving combined cycle plant control tuning , 2014, Neurocomputing.

[2]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[3]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[4]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[5]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[6]  Laurent Vercouter,et al.  A specification of the Agent Reputation and Trust (ART) testbed: experimentation and competition for trust in agent societies , 2005, AAMAS '05.

[7]  Mario Gómez,et al.  Honesty and trust revisited: the advantages of being neutral about other’s cognitive models , 2007, Autonomous Agents and Multi-Agent Systems.

[8]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[9]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[10]  Sajal K. Das,et al.  Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[11]  Manuel Graña,et al.  Guest Editorial: Hybrid intelligent fusion systems , 2014, Inf. Fusion.

[12]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[13]  Emilio Corchado,et al.  A survey of multiple classifier systems as hybrid systems , 2014, Inf. Fusion.

[14]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[15]  Fabio Bellifemine,et al.  Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology) , 2007 .

[16]  Xiaofeng Ding,et al.  A general framework for privacy preserving data publishing , 2013, Knowl. Based Syst..

[17]  Miguel A. Patricio,et al.  Privacy-by-design rules in face recognition system , 2013, Neurocomputing.

[18]  Siani Pearson,et al.  Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.

[19]  Marc Esteva,et al.  ISLANDER: an electronic institutions editor , 2002, AAMAS '02.