Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 299))

Abstract

In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, R.: Information technology and dataveillance. Commun. ACM 31(5), 498–512 (1988)

    Article  Google Scholar 

  2. Calvo-Rolle, J.L., Corchado, E.: A bio-inspired knowledge system for improving combined cycle plant control tuning. Neurocomputing 126, 95–105 (2014)

    Article  Google Scholar 

  3. Wozniak, M., Grańa, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Information Fusion 16, 3–17 (2014)

    Article  Google Scholar 

  4. Parliament, E.: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (October 1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML

  5. Pedraza, J., Patricio, M.A., de Asks, A., Molina, J.: Privacy-by-design rules in face recognition system. Neurocomputing 109 (2013)

    Google Scholar 

  6. Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. Computer Communications and Networks, pp. 3–42. Springer London (2013)

    Google Scholar 

  7. Sattar, A.H.M.S., Li, J., Ding, X., Liu, J., Vincent, M.W..: A general framework for privacy preserving data publishing. Knowl.-Based Syst. 54, 276–287 (2013)

    Article  Google Scholar 

  8. Pallapa, G., Francescoy, M.D., Das, S.K.: Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments. In: 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2012)

    Google Scholar 

  9. Dellarocas, C.: The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science 49, 1407–1424 (2003)

    Article  Google Scholar 

  10. Sabater-Mir, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)

    Article  Google Scholar 

  11. Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: In Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 294–301. ACM Press (2002)

    Google Scholar 

  12. Esfandiari, B., Chandrasekharan, S.: On how agents make friends: Mechanisms for trust acquisition. In: In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, pp. 27–34 (2001)

    Google Scholar 

  13. Fullam, K., Klos, T., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K.S., Rosenschein, J., Vercouter, L., Voss, M.: A specification of the agent reputation and trust (art) testbed: Experimentation and competition for trust in agent societies. In: The Fourth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), pp. 512–518 (2005)

    Google Scholar 

  14. Gómez, M., Carbo, J., Benac-Earle, C.: Honesty and trust revisited: the advantages of being neutral about other’s cognitive models. Autonomous Agents and Multi-Agent Systems 15(3), 313–335 (2007)

    Article  Google Scholar 

  15. Moya, J., Carbo, J.: Distributing art agents with jade. In: 10th European Workshop on Multi-Agent Systems, EUMAS (2012)

    Google Scholar 

  16. Carbo, J., Molina, J.M.: A jade-based art-inspired ontology and protocols for handling trust and reputation. In: Ninth International Conference on Intelligent Systems Design and Applications, ISDA, pp. 300–305 (2009)

    Google Scholar 

  17. Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE. Wiley (2007)

    Google Scholar 

  18. Esteva, M., Cruz, D.d.l., Sierra, C.: Islander: an electronic institutions editor. In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS, pp. 1045–1052. ACM (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Carbo, J., Pedraza, J., Lopez, M., Molina, J.M. (2014). Privacy Protection in Trust Models for Agent Societies. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07995-0_14

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07994-3

  • Online ISBN: 978-3-319-07995-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics