Electronic institutions and neural computing providing law-compliance privacy for trusting agents

Abstract In this paper we present an integral solution for law-compliance privacy-protection into trust models for agent systems. Several privacy issues are concerned into trust relationships. Specifically, we define which privacy rights must legally be guaranteed in trusting communities of agents. From them, we describe additional interaction protocols that are required to implement such guarantees. Next, we apply additional message exchanges into a specific application domain (the Agent Trust and Reputation testbed) using JADE agent platform. The decisions about how to apply these control mechanisms (about when to launch the corresponding JADE protocol) has been efficiently carried out by neural computing. It uses past behavior of agents to decide (classify) which agents are worthy to share privacy with, considering which number of past interactions we should take into account. Furthermore, we also enumerate the corresponding privacy violations that would have taken place if these control mechanisms (in form of interaction protocols) were ignored or misused. From the possible existence of privacy violations, a regulatory structure is required to address (prevent and fix) the corresponding harmful consequences. We use Islander (an electronic institution editor) to formally define the scenes where privacy violation may be produced, attached to the ways to repair it: the defeasible actions that could voluntarily reduce or eliminate the privacy damage, and the obligations that the electronic institution would impose as penalties.

[1]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[2]  Alain Destexhe,et al.  How much can we trust neural simulation strategies? , 2007, Neurocomputing.

[3]  Laurent Vercouter,et al.  A specification of the Agent Reputation and Trust (ART) testbed: experimentation and competition for trust in agent societies , 2005, AAMAS '05.

[4]  Mario Gómez,et al.  Honesty and trust revisited: the advantages of being neutral about other’s cognitive models , 2007, Autonomous Agents and Multi-Agent Systems.

[5]  Sajal K. Das,et al.  Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[6]  José Luís Calvo-Rolle,et al.  A Bio-inspired knowledge system for improving combined cycle plant control tuning , 2014, Neurocomputing.

[7]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[8]  José M. Molina López,et al.  Costs of Protecting Privacy in Agent Trust Relationships , 2015, PAAMS.

[9]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[10]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[11]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[12]  Eric Kuada,et al.  Security and Trust in Cloud Computing , 2017 .

[13]  Miguel A. Patricio,et al.  Privacy-by-design rules in face recognition system , 2013, Neurocomputing.

[14]  José M. Molina,et al.  A JADE-Based ART-Inspired Ontology and Protocols for Handling Trust and Reputation , 2009, 2009 Ninth International Conference on Intelligent Systems Design and Applications.

[15]  Marc Esteva,et al.  ISLANDER: an electronic institutions editor , 2002, AAMAS '02.

[16]  Emilio Corchado,et al.  A survey of multiple classifier systems as hybrid systems , 2014, Inf. Fusion.

[17]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[18]  Xiaofeng Ding,et al.  A general framework for privacy preserving data publishing , 2013, Knowl. Based Syst..

[19]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[20]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[21]  Samir Aknine,et al.  Coalition Formation Model For Multi-Agents Systems With Incomplete Information , 2012 .

[22]  Farookh Khadeer Hussain,et al.  Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications , 2012, Comput. J..