Abstract
In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Clarke, R.: Information technology and dataveillance. Commun. ACM 31(5), 498–512 (1988)
Calvo-Rolle, J.L., Corchado, E.: A bio-inspired knowledge system for improving combined cycle plant control tuning. Neurocomputing 126, 95–105 (2014)
Wozniak, M., Grańa, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Information Fusion 16, 3–17 (2014)
Parliament, E.: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (October 1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
Pedraza, J., Patricio, M.A., de Asks, A., Molina, J.: Privacy-by-design rules in face recognition system. Neurocomputing 109 (2013)
Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. Computer Communications and Networks, pp. 3–42. Springer London (2013)
Sattar, A.H.M.S., Li, J., Ding, X., Liu, J., Vincent, M.W..: A general framework for privacy preserving data publishing. Knowl.-Based Syst. 54, 276–287 (2013)
Pallapa, G., Francescoy, M.D., Das, S.K.: Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments. In: 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2012)
Dellarocas, C.: The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science 49, 1407–1424 (2003)
Sabater-Mir, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)
Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: In Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 294–301. ACM Press (2002)
Esfandiari, B., Chandrasekharan, S.: On how agents make friends: Mechanisms for trust acquisition. In: In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, pp. 27–34 (2001)
Fullam, K., Klos, T., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K.S., Rosenschein, J., Vercouter, L., Voss, M.: A specification of the agent reputation and trust (art) testbed: Experimentation and competition for trust in agent societies. In: The Fourth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), pp. 512–518 (2005)
Gómez, M., Carbo, J., Benac-Earle, C.: Honesty and trust revisited: the advantages of being neutral about other’s cognitive models. Autonomous Agents and Multi-Agent Systems 15(3), 313–335 (2007)
Moya, J., Carbo, J.: Distributing art agents with jade. In: 10th European Workshop on Multi-Agent Systems, EUMAS (2012)
Carbo, J., Molina, J.M.: A jade-based art-inspired ontology and protocols for handling trust and reputation. In: Ninth International Conference on Intelligent Systems Design and Applications, ISDA, pp. 300–305 (2009)
Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE. Wiley (2007)
Esteva, M., Cruz, D.d.l., Sierra, C.: Islander: an electronic institutions editor. In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS, pp. 1045–1052. ACM (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Carbo, J., Pedraza, J., Lopez, M., Molina, J.M. (2014). Privacy Protection in Trust Models for Agent Societies. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-07995-0_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07994-3
Online ISBN: 978-3-319-07995-0
eBook Packages: EngineeringEngineering (R0)