Search
2014 Volume 29
Article Contents
RESEARCH ARTICLE   Open Access    

A survey of privacy in multi-agent systems

More Information
  • Abstract: Privacy has been a concern for humans long before the explosive growth of the Internet. The advances in information technologies have further increased these concerns. This is because the increasing power and sophistication of computer applications offers both tremendous opportunities for individuals, but also significant threats to personal privacy. Autonomous agents and multi-agent systems are examples of the level of sophistication of computer applications. Autonomous agents usually encapsulate personal information describing their principals, and therefore they play a crucial role in preserving privacy. Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness, autonomy, and the like. This article introduces the problem of preserving privacy in computer applications and its relation to autonomous agents and multi-agent systems. It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research.
  • 加载中
  • Ackerman M. S., Cranor L. F., Reagle J.1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC'99: Proceedings of the 1st ACM Conference on Electronic Commerce, Feldman, S. & Wellman, M. (eds). ACM, 1–8.

    Google Scholar

    Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds) 2008. Digital Privacy: Theory, Technologies, and Practices. Auerbach Publications.

    Google Scholar

    Aïmeur E., Brassard G., Fernandez J. M., Onana F. S. M.2006. Privacy-preserving demographic filtering. In Proceedings of the 2006 ACM Symposium on Applied computing, SAC '06, 872–878.

    Google Scholar

    Alberola J. M., Such J. M., Garcia-Fornes A., Espinosa A., Botti V.2010. A performance evaluation of three multiagent platforms. Artificial Intelligence Review34, 145–176.

    Google Scholar

    Balke T., Eymann T.2008. The conclusion of contracts by software agents in the eyes of the law. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 771–778.

    Google Scholar

    Barth A., Datta A., Mitchell J. C., Nissenbaum H.2006. Privacy and contextual integrity: framework and applications. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society, 184–198.

    Google Scholar

    Bhargav-Spantzel A., Camenisch J., Gross T., Sommer D.2007. User centricity: a taxonomy and open issues. Journal of Computer Security15, 493–527.

    Google Scholar

    Bilge L., Strufe T., Balzarotti D., Kirda E.2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 551–560.

    Google Scholar

    Bishop M.2002. Computer Security: Art and Science. Addison-Wesley.

    Google Scholar

    Boella G., van der Torre L., Verhagen H.2007. Introduction to normative multiagent systems. In Normative Multi-agent Systems, number 07122 in ‘Dagstuhl Seminar Proceedings, Boella, G., van der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI).

    Google Scholar

    Borking J., Van Eck B., Siepel P., Bedrijf D.1999. Intelligent Software agents: Turning a Privacy Threat into a Privacy Protector. Registratiekamer.

    Google Scholar

    Bostwick G. L.1976. A taxonomy of privacy: repose sanctuary and intimate decisions. California Law Review64(5), 1447–1483.

    Google Scholar

    Brazier F., Oskamp A., Prins C., Schellekens M., Wijngaards N.2004. Anonymity and software agents: an interdisciplinary challenge. Artificial Intelligence and Law12, 137–157.

    Google Scholar

    Brito I., Meseguer P.2003. Distributed forward checking. Principles and Practice of Constraint Programming, Lecture Notes in Computer Science 2833, 801–806.

    Google Scholar

    Bygrave L.2001. Electronic agents and privacy: a cyberspace odyssey 2001. International Journal of Law and Information Technology9(3), 275–294.

    Google Scholar

    Camp L. J.1996. Privacy & Reliability in Internet Commerce. PhD thesis, Department of Computer Science, Carnegie Mellon University.

    Google Scholar

    Carrara E., Hogben G.2007. Reputation-based systems: a security analysis, ENISA Position Paper.

    Google Scholar

    Chaum D.1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM24, 84–90.

    Google Scholar

    Chaum D.1985. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM28, 1030–1044.

    Google Scholar

    Chen B.-C., Kifer D., LeFevre K., Machanavajjhala A.2009. Privacy-preserving data publishing. Foundations and Trends in Databases2(1–2), 1–167.

    Google Scholar

    Cheng A., Friedman E. (2005), Sybil proof reputation mechanisms. In Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON '05, Friedman, E. & Sirer, E. G. (eds). ACM, 128–132.

    Google Scholar

    Chopra S., White L.2004. Artificial agents – personhood in law and philosophy. In Proceedings of the 13th European Conference on Artificial Intelligence (ECAI 2004), 635–639.

    Google Scholar

    Chopra S., White L.2007. Privacy and artificial agents, or, is google reading my email? In Proceedings of the 20th International Joint Conference on Artificial Intelligence, Sangal, R., Mehta, H. & Bagga, R. K. (eds). Morgan Kaufmann Publishers Inc., 1245–1250.

    Google Scholar

    Cissèe R.2003. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems.

    Google Scholar

    Cissèe R., Albayrak S.2007. An agent-based approach for privacy-preserving recommender systems. In Proceedings of the 6th International JointCconference on Autonomous Agents and Multiagent Systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 182:1–182:8.

    Google Scholar

    Clauβ S., Kesdogan D., Kölsch T.2005. Privacy enhancing identity management: protection against re-identification and profiling. In DIM '05: Proceedings of the 2005 Workshop on Digital Identity Management, Atluri, V., Samarati, P. & Goto, A. (eds). ACM, 84–93.

    Google Scholar

    Crépin L, Demazeau Y., Boissier O., Jacquenet F.2009. Sensitive data transaction in hippocratic multi-agent systems. In ‘Engineering Societies in the Agents World IX’, Artikis, A., Picard, G. & Vercouter, L. (eds). Springer-Verlag, 85–101.

    Google Scholar

    Crépin L., Vercouter L., Boissier O., Demazeau Y., Jacquenet F.2008. Hippocratic multi-agent systems. In Proceedings of the Tenth International Conference on Enterprise Information Systems ICEIS, 301–307.

    Google Scholar

    Criado N., Argente E., Botti V.2011. Open issues for normative multi-agent systems. AI Communications24(3), 233–264.

    Google Scholar

    Criado N., Argente E., Julian V., Botti V.2009. Designing virtual organizations. In Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009), volume 55 of Advances in Soft Computing, Salamanca, Spain, 440–449.

    Google Scholar

    Cuenca Grau B., Horrocks I.2008. Privacy-preserving query answering in logic-based information systems. In Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence, Ghallab, M., Spyropoulos, C., Fakotakis, N. & Avouris, N. (eds). IOS Press, 40–44.

    Google Scholar

    Diaz C.2006. Anonymity metrics revisited. In Anonymous Communication and its Applications, number 05411 in ‘Dagstuhl Seminar Proceedings, Dolev, S., Ostrovsky, R. & Pfitzmann, A. (eds). IBFI, 147–166.

    Google Scholar

    Dierks T., Allen C.1999. The tls protocol version 1.0, RFC 2246, http://www.ietf.org/rfc/rfc2246.txt [retrieved February 2011].

    Google Scholar

    Dingledine R., Mathewson N., Syverson P.2004. Tor: the second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, 303–320.

    Google Scholar

    Farkas C., Jajodia S.2002. The inference problem: a survey. ACM SIGKDD Explorations Newsletter4(2), 11.

    Google Scholar

    Fasli M.2007a. Agent Technology for E-Commerce. John Wiley & Sons.

    Google Scholar

    Fasli M.2007b.On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review22(1), 3–35.

    Google Scholar

    FIPA1998. FIPA Agent Security Management, FIPA. http://www.fipa.org/specs/fipa00020/OC00020A.html

    Google Scholar

    Fischer-Hübner S., Hedbom H.2008. Benefits of privacy-enhancing identity management. Asia-Pacific Business Review10(4), 36–52.

    Google Scholar

    Friedman E. J., Resnick P.1998. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy10, 173–199.

    Google Scholar

    Frier A., Karlton P., Kocher P.1996. The secure socket layer. Technical Report MSU-CSE-00-2, Netscape Communications.

    Google Scholar

    Gangopadhyay A. (ed.) 2001. Managing Business with Electronic Commerce: Issues and Trends. IGI Publishing.

    Google Scholar

    Garfinkel S.2001. Database Nation: The Death of Privacy in the 21st Century. O'Reilly & Associates, Inc.

    Google Scholar

    Garfinkel S.2009. Privacy requires security, not abstinence: protecting an inalienable right in the age of facebook, http://www.technologyreview.com/computing/22831/

    Google Scholar

    Gibbins N., Harris S., Shadbolt N.2004. Agent-based semantic web services. Web Semantics: Science, Services and Agents on the World Wide Web1(2), 141–154.

    Google Scholar

    Goldschlag D., Reed M., Syverson P.1999. Onion routing for anonymous and private internet connections. Communications of the ACM42, 39–41.

    Google Scholar

    Green K., Derlega V. J., Mathews A.2006. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, chapter Self-Disclosure in Personal Relationships, 409–427.

    Google Scholar

    Greenstadt R., Grosz B., Smith M. D.2007. Ssdpop: improving the privacy of dcop with secret sharing. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 171:1–171:3.

    Google Scholar

    Greenstadt R., Pearce J. P., Tambe M.2006. Analysis of privacy loss in distributed constraint optimization. In Proceedings of the 21st National Conference on Artificial IntelligenceVolume 1, Cohn, A. (ed.). AAAI Press, 647–653.

    Google Scholar

    Gross R., Acquisti A.2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM, 71–80.

    Google Scholar

    Hansen M., Berlich P., Camenisch J., Clau S., Pfitzmann A., Waidner M.2004. Privacy enhancing identity management. Information Security Technical Report9(1), 35–44.

    Google Scholar

    Hansen M., Schwartz A., Cooper A.2008. Privacy and identity management. IEEE Security & Privacy6(2), 38–45.

    Google Scholar

    Head M., Yuan Y.2001. Privacy protection in electronic commerce – a theoretical framework. Human Systems Management20(2), 149–160.

    Google Scholar

    Hildebrandt M., Gutwirth S.2008. Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer Publishing Company, Inc..

    Google Scholar

    Hoffman D., Novak T., Peralta M.1999. Building consumer trust online. Communications of the ACM42(4), 80–85.

    Google Scholar

    Hoffman K., Zage D., Nita-Rotaru C.2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys42, 1:1–1:31.

    Google Scholar

    Huberman B. A., Adar E., Fine L. R.2005. Valuating privacy. IEEE Security and Privacy3(5), 22–25.

    Google Scholar

    Ismail L.2008. A secure mobile agents platform. Journal of Communications3(2), 1–12.

    Google Scholar

    JADE Board2005. Jade security guide, http://jade.tilab.com

    Google Scholar

    Jaiswal A., Kim Y., Gini M. L.2004. Design and implementation of a secure multi-agent marketplace. Electronic Commerce Research and Applications3(4), 355–368.

    Google Scholar

    Jennings N., Faratin P., Lomuscio A., Parsons S., Wooldridge M., Sierra C.2001. Automated negotiation: prospects, methods and challenges. Group Decision and Negotiation10(2), 199–215.

    Google Scholar

    Jøsang A., Golbeck J.2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009).

    Google Scholar

    Jøsang A., Ismail R., Boyd C.2007. A survey of trust and reputation systems for online service provision. Decision Support System43(2), 618–644.

    Google Scholar

    Jøsang A., Patton M., Ho A.2001. Authentication for humans. In Proceedings of the 9th International Conference on; Telecommunication Systems (ICTS2001).

    Google Scholar

    Kang J.1998. Information privacy in cyberspace transactions. Stanford Law Review50(4), 1193–1294.

    Google Scholar

    Kerr R., Cohen R.2009. Smart cheaters do prosper: defeating trust and reputation systems. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 993–1000.

    Google Scholar

    Koops B. -J., Leenes R.2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit – DuD30, 553–556.

    Google Scholar

    Korba L., Song R., Yee G.2002. Anonymous communications for mobile agents. In Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications, MATA '02, 171–181.

    Google Scholar

    Krause A., Horvitz E.2008. A utility-theoretic approach to privacy and personalization. In AAAI'08: Proceedings of the 23rd National Conference on Artificial Intelligence, Cohn, A. (ed.). AAAI Press, 1181–1188.

    Google Scholar

    Krupa Y., Vercouter L.2010. Contextual integrity and privacy enforcing norms for virtual communities. In 11th International Workshop on Coordination, Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010), 150–165.

    Google Scholar

    Lebanon G., Scannapieco M., Fouad M. R., Bertino E.2006. Beyond k-anonymity: a decision theoretic framework for assessing privacy risk. In Privacy in Statistical Databases, 217–232.

    Google Scholar

    Lee H.-H., Stamp M.2008. An agent-based privacy-enhancing model. Information Management & Computer Security16(3), 305–319.

    Google Scholar

    Leuf B., Cunningham W.2001. The Wiki Way: Quick Collaboration on the Web. Addison-Wesley Longman Publishing Co., Inc.

    Google Scholar

    Lilien L., Bhargava B.2008. Privacy and trust in online interactions. In Online Consumer Protection: Theories of Human Relativism, Chen, K. & Fadlalla, A. (eds). Information Science Reference, 85–122.

    Google Scholar

    Longstaff T., Ellis J., Shawn H., Lipson H., Mcmillan R., Pesante H. L., Simmel D.1997. Security of the internet. The Froehlich/Kent Encyclopedia of Telecommunications15, 231–255.

    Google Scholar

    Luck M., McBurney P., Shehory O., Willmott S.2005. Agent Technology: Computing as Interaction (A Roadmap for Agent Based Computing). AgentLink.

    Google Scholar

    Maheswaran R., Pearce J., Bowring E., Varakantham P., Tambe M.2006. Privacy loss in distributed constraint reasoning: a quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems13, 27–60.

    Google Scholar

    Menczer F., Street W. N., Vishwakarma N., Monge A. E., Jakobsson M.2002. Intellishopper: a proactive, personal, private shopping assistant. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS '02, 1001–1008.

    Google Scholar

    Milojicic D., Breugst M., Busse I., Campbell J., Covaci S., Friedman B., Kosaka K., Lange D., Ono K., Oshima M., Tham C., Virdhagriswaran S., White J.1998. Masif: The omg mobile agent system interoperability facility. Personal and Ubiquitous Computing2, 117–129. 10.1007/BF01324942. http://dx.doi.org/10.1007/BF01324942 doi: 10.1007/BF01324942

    CrossRef   Google Scholar

    Mitchell T., Caruana R., Freitag D., McDermott J., Zabowski D.1994. Experience with a learning personal assistant. Communications of the ACM37(7), 80–91.

    Google Scholar

    Montaner M., López B., De La Rosa J.2003. A taxonomy of recommender agents on the internet. Artificial Intelligence Review19(4), 285–330.

    Google Scholar

    Newman A. E.2004. Cougaar developers’ guide, http://www.cougaar.org

    Google Scholar

    Neuman C., Yu T., Hartman S., Raeburn K.2005. The Kerberos Network Authentication Service (V5), number 4120 in ‘Request for Comments. IETF.

    Google Scholar

    Nissenbaum H.2004. Privacy as contextual integrity. Washington Law Review79(1).

    Google Scholar

    Odlyzko A.2003. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03, Sadeh, N., Dively, M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds). ACM, 355–366.

    Google Scholar

    Olson J. S., Grudin J., Horvitz E.2005. A study of preferences for sharing and privacy. In CHI '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems, Van der Veer, G. & Gale, C. (eds). ACM, 1985–1988.

    Google Scholar

    Palen L., Dourish P.2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Ssystems, Cockton, G. & Korhonen, P. (eds). ACM, 129–136.

    Google Scholar

    Petkovic M., Jonker W. (eds) 2007. Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications). Springer-Verlag.

    Google Scholar

    Pfitzmann A., Hansen M.2010. A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, http://dud.inf.tu-dresden.de/AnonTerminology.shtml. v0.34.

    Google Scholar

    Piolle G., Demazeau Y., Caelen J.2007. Privacy management in user-centred multi-agent systems. In Engineering Societies in the Agents World VII, Lecture Notes in Computer Science 4457, 354–367. Springer.

    Google Scholar

    Poslad S., Calisti M.2000. Towards improved trust and security in FIPA agent platforms. In Workshop on Deception, Fraud and Trust in Agent Societies, Barcelona, Spain.

    Google Scholar

    Poslad S., Charlton P., Calisti M.2003. Specifying standard security mechanisms in multi-agent systems. In Proceedings of the 2002 International Conference on Trust, Reputation, and Security: Theories and Practice, AAMAS'02. Springer-Verlag, 163–176. http://portal.acm.org/citation.cfm?id=1762128.1762141

    Google Scholar

    Quillinan T. B., Warnier M., Oey M., Timmer R., Brazier F.2008. Enforcing security in the agent scape middleware. In Proceedings of the 2008 Workshop on Middleware Security, MidSec '08, Scandariato, R. & Russello, G. (eds). ACM, 25–30.

    Google Scholar

    Ramchurn S., Huynh D., Jennings N.2004. Trust in multi-agent systems. The Knowledge Engineering Review19(1), 1–25.

    Google Scholar

    Rannenberg K., Royer D., Deuker A. (eds) 2009. The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Incorporated.

    Google Scholar

    Recursion Software Inc.2008. Voyager security guide, http://www.recursionsw.com/

    Google Scholar

    Roth V., Jalali-Sohi M.2001. Concepts and architecture of a security-centric mobile agent server. In Proceedings of theInternational Symposium on Autonomous Decentralized System.

    Google Scholar

    Sabater J., Sierra C.2005. Review on computational trust and reputation models. Artificial Intelligence Review24, 33–60.

    Google Scholar

    Schermer B.2007. Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled surveillance. Amsterdam University Press.

    Google Scholar

    Seigneur J.-M., Jensen C. D.2004. Trading privacy for trust. In Trust Management. Springer, 93–107.

    Google Scholar

    Senicar V., Jerman-Blazic B., Klobucar T.2003. Privacy-enhancing technologies–approaches and development. Computer Standards & Interfaces25(2), 147–158.

    Google Scholar

    Shannon C. E.1948. A mathematical theory of communication. Bell System Technical Journal27(3), 379–423.

    Google Scholar

    Sierra C.2004. Agent-mediated electronic commerce. Autonomous Agents and Multi-Agent Systems9(3), 285–301.

    Google Scholar

    Sierra C., Botti V., Ossowski S.2011. Agreement computing. KI-Künstliche Intelligenz25(1), 57–61.

    Google Scholar

    Sierra C., Debenham J.2008. Information-based deliberation. In AAMAS '08: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Padgham, L., Parkes, D. C., Müller, J. P. & Parsons, S. (eds). International Foundation for Autonomous Agents and Multiagent Systems, 689–696.

    Google Scholar

    Silaghi M. C., Mitra D.2004. Distributed constraint satisfaction and optimization with privacy enforcement. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT '04. IEEE Computer Society, 531–535.

    Google Scholar

    Smith H. J., Milberg S. J.1996. Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly20, 167–196.

    Google Scholar

    Solanas A., Martìınez-ballesté A.2009. Advances in Artificial Intelligence for Privacy Protection and Security. World Scientific Publishing Co., Inc.

    Google Scholar

    Solove D.2002. Conceptualizing privacy. California Law Review90(4), 1087–1155.

    Google Scholar

    Solove D.2006. A taxonomy of privacy. University of Pennsylvania Law Review154(3), 477–560.

    Google Scholar

    Spiekermann S.2006. Individual price discriminaton – an impossibility?. In International Conference for HumanComputer Interaction (CHI'2006), Workshop on Privacy and Personalization’.

    Google Scholar

    Spiekermann S., Cranor L. F.2009. Engineering privacy. IEEE Transactions on Software Engineering35(1), 67–82.

    Google Scholar

    Stallings W.2010. Network Security Essentials: Applications and Standards. Prentice Hall.

    Google Scholar

    Stamp M.2006. Information Security: Principles and Practice. Wiley-Interscience.

    Google Scholar

    Such J. M.2011. Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València.

    Google Scholar

    Such J. M., Alberola J. M., Espinosa A., Garcia-Fornes A.2011a.A group-oriented secure multiagent platform. Software: Practice and Experience41(11), 1289–1302.

    Google Scholar

    Such J. M., Garcia-Fornes A., Espinosa A., Bellver J.2013. Magentix2: A privacy-enhancing Agent Platform. Engineering Applications of Artificial Intelligence26(1), 96–109.

    Google Scholar

    Such J. M., Espinosa A., Garcia-Fornes A., Botti V.2011b.Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence24(7), 1128–1136.

    Google Scholar

    Such J. M., Espinosa A., Garcia-Fornes A., Sierra C.2011d. Privacy-intimacy tradeoff in selfdisclosure. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS2011). IFAAMAS, 1189–1190.

    Google Scholar

    Such J. M., Espinosa A., Garcia-Fornes A., Sierra C.2012a.Self-disclosure decision making based on intimacy and privacy. Information Sciences211, 93–111.

    Google Scholar

    Such J. M., Serrano E., Botti V., Garca-Fornes A.2012b. Strategic pseudonym change in agent-based E-commerce. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), Valencia, Spain, 1377–1378.

    Google Scholar

    Taylor H.2003. Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits., Harris Interactive. Retrieved February 27, 2011, from http://www.harrisinteractive.com/vault/Harris-Interactive-Poll-Research-Most-People-Are-Privacy-Pragmatists-Who-While-Conc-2003-03.pdf

    Google Scholar

    Tentori M., Favela J., Rodriguez M. D.2006. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems21, 55–62.

    Google Scholar

    Udupi Y. B., Singh M. P.2010. Information sharing among autonomous agents in referral networks. In Agents and Peer-to-Peer Computing, Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag, 13–26.

    Google Scholar

    Ugurlu S., Erdogan N.2005. An overview of secmap secure mobile agent platform. In Proceedings of Second International Workshop on Safety and Security in Multiagent Systems.

    Google Scholar

    van Blarkom G., Borking J., Olk J. (eds) 2003. Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. College bescherming persoonsgegevens.

    Google Scholar

    van Elst L., Abecker A., Dignum V.2004. Agent-mediated Knowledge Management: International Symposium Amkm 2003, Stanford, CA, USA, March 2426, 2003: Revised and Invited Papers, Lecture Notes in Computer Science 2926, 428. Springer-Verlag.

    Google Scholar

    van Otterloo S.2005. The value of privacy: optimal strategies for privacy minded agents. In AAMAS '05: Proceedings of the Fourth International Joint conference on Autonomous Agents and Multiagent Systems, Pechoucek, M., Steiner, D. & Thompson, S. (eds). ACM, 1015–1022.

    Google Scholar

    Wallace R. J., Freuder E. C.2005. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving. Artificial Intelligence161, 209–227.

    Google Scholar

    Warnier M., Brazier F.2010. Anonymity services for multi-agent systems. Web Intelligence and Agent Systems8(2), 219–232.

    Google Scholar

    Warren S., Brandeis L.1890. The right to privacy. Harvard Law Review4(5), 193–220.

    Google Scholar

    Weitnauer E., Thomas N., Rabe F., Kopp S.2008. Intelligent agents living in social virtual environments bringing max into second life. In Intelligent Virtual Agents (IVA). Springer, 552–553.

    Google Scholar

    Westin A.1967. Privacy and Freedom. Atheneum.

    Google Scholar

    Westin A.1984. The origins of modern claims to privacy. In Philosophical Dimensions of Privacy: An Anthology, Schoeman, F. D. (ed.). Cambridge University Press, 56–74.

    Google Scholar

    Wooldridge M.2002. An Introduction to MultiAgent Systems. Wiley.

    Google Scholar

    Xu H., Shatz S. M.2003. Adk: an agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering10, 337–365.

    Google Scholar

    Yao M. Z., Rice R. E., Wallis K.2007. Predicting user concerns about online privacy. J American Society for Information Science and Technology58(5), 710–722.

    Google Scholar

    Yassine A., Shirehjini A. A. N., Shirmohammadi S., Tran T. T.2010. An intelligent agent-based model for future personal information markets. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2, 457–460, Toronto, Canada.

    Google Scholar

    Yassine A., Shirmohammadi S.2009. Measuring users’ privacy payoff using intelligent agents. In Computational Intelligence for Measurement Systems and Applications, CIMSA '09, 169–174.

    Google Scholar

    Yokoo M., Suzuki K., Hirayama K.2005. Secure distributed constraint satisfaction: reaching agreement without revealing private information. Artificial Intelligence161, 229–245.

    Google Scholar

    Yu H., Kaminsky M., Gibbons P. B., Flaxman A.2006. Sybilguard: defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, Rizzo, L., Anderson, T. & McKeown, N. (eds). ACM, 267–278. http://doi.acm.org/10.1145/1159913.1159945

    Google Scholar

    Zheleva E., Getoor L.2009. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW '09: Proceedings of the 18th International Conference on World Wide Web, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 531–540.

    Google Scholar

    Zhu Z., Wang G., Du W.2009. Deriving private information from association rule mining results. In Proceedings of the 2009 IEEE International Conference on Data Engineering, Ioannidis, Y. E., Lee, D. L. & Ng, R. T. (eds). IEEE Computer Society, 18–29.

    Google Scholar

  • Cite this article

    Jose M. Such, Agustín Espinosa, Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. The Knowledge Engineering Review 29(3)314−344, doi: 10.1017/S0269888913000180
    Jose M. Such, Agustín Espinosa, Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. The Knowledge Engineering Review 29(3)314−344, doi: 10.1017/S0269888913000180

Article Metrics

Article views(24) PDF downloads(52)

Other Articles By Authors

RESEARCH ARTICLE   Open Access    

A survey of privacy in multi-agent systems

The Knowledge Engineering Review  29 2014, 29(3): 314−344  |  Cite this article

Abstract: Abstract: Privacy has been a concern for humans long before the explosive growth of the Internet. The advances in information technologies have further increased these concerns. This is because the increasing power and sophistication of computer applications offers both tremendous opportunities for individuals, but also significant threats to personal privacy. Autonomous agents and multi-agent systems are examples of the level of sophistication of computer applications. Autonomous agents usually encapsulate personal information describing their principals, and therefore they play a crucial role in preserving privacy. Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness, autonomy, and the like. This article introduces the problem of preserving privacy in computer applications and its relation to autonomous agents and multi-agent systems. It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research.

    • This work has been partially supported by CONSOLIDER-INGENIO 2010 under grant CSD2007-00022, and project TIN2011-27652-C03-00 of the Spanish Government.

    • http://www.internetworldstats.com/stats.htm

    • In this paper, we use the terms principal and user indistinctly to refer to the user that the agent is acting on behalf of. Principals are also called agent owners, or simply users in the related literature.

    • http://secondlife.com/

    • The Platform for Privacy Preferences 1.0, http://www.w3.org/TR/P3P/

    • OWL, http://www.w3.org/tr/owl-features/

    • Note that these anonymizers are not the same as the ones presented in Section 4.1.2.

    • http://docs.oasis-open.org/imi/identity/v1.0/identity.html

    • Software entities (intelligent agents, virtual organizations, etc.) cannot have real identities because, until now, they could not be held liable for their acts in front of the law. However, this may change in the future if they finally achieve some kind of legal personhood, as suggested by Chopra and White (2004) and Balke and Eymann (2008). In this case, software entities may be provided with legal personhood to be (partially) held liable for their acts. The point is that according to the law, someone must be liable for frauds like this.

    • Last.fm, http://www.last.fm

    • http://docs.oasis-open.org/imi/identity/v1.0/identity.html

    • Copyright © Cambridge University Press 2013 2013Cambridge University Press
References (143)
  • About this article
    Cite this article
    Jose M. Such, Agustín Espinosa, Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. The Knowledge Engineering Review 29(3)314−344, doi: 10.1017/S0269888913000180
    Jose M. Such, Agustín Espinosa, Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. The Knowledge Engineering Review 29(3)314−344, doi: 10.1017/S0269888913000180
  • Catalog

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return