Advertisement

Policies to Regulate Distributed Data Exchange

  • Samuel R. CauvinEmail author
  • Nir Oren
  • Wamberto W. Vasconcelos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11327)

Abstract

Data sharing is becoming an integral part of many aspects of our daily lives. We propose a method for controlling access to data and knowledge through fine-grained, user-specified explicitly represented policies. We present an overview of a policy formalism and mechanisms to facilitate distributed data sharing. We provide a breakdown of how our approach defines compliance and violation, specifically providing a new outlook on violation of permissions within the context of data sharing. We also examine how our mechanisms have been adapted to support socially responsible interactions between participants, whilst still providing them with control over their own data. We also explore a series of planned experiments investigating how users understand and interact with policies in a simplified version of our formalism.

References

  1. 1.
    Artikis, A., Kamara, L., Pitt, J., Sergot, M.: A protocol for resource sharing in norm-governed ad hoc networks. In: Leite, J., Omicini, A., Torroni, P., Yolum, I. (eds.) DALT 2004. LNCS (LNAI), vol. 3476, pp. 221–238. Springer, Heidelberg (2005).  https://doi.org/10.1007/11493402_13CrossRefGoogle Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  3. 3.
    Boella, G., van der Torre, L.: Permissions and obligations in hierarchical normative systems. In: Proceedings of the 9th International Conference on AI and Law, pp. 109–118. ACM (2003)Google Scholar
  4. 4.
    Buford, J., Yu, H., Lua, E.K.: P2P Networking and Applications. Morgan Kaufmann, San Francisco (2009)Google Scholar
  5. 5.
    Caragliu, A., Bo, C., Nijkamp, P.: Smart cities in Europe. J. Urban Technol. 18(2), 65–82 (2011)CrossRefGoogle Scholar
  6. 6.
    Cauvin, S.R., Kollingbaum, M.J., Sleeman, D., Vasconcelos, W.W.: Towards a distributed data-sharing economy. In: Cranefield, S., Mahmoud, S., Padget, J., Rocha, A.P. (eds.) COIN -2016. LNCS (LNAI), vol. 10315, pp. 3–21. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-66595-5_1CrossRefGoogle Scholar
  7. 7.
    Cauvin, S.R., Kollingbaum, M.J., Vasconcelos, W.W.: A peer-to-peer alternative to blockchain for managing distributed data transactions. In: SmartLaw@ICAIL (2017)Google Scholar
  8. 8.
    Cauvin, S.R., Vasconcelos, W.W.: A policy formalism to facilitate distributed data exchange - technical note (2018). https://www.dropbox.com/s/i2jbc8m1uxzprp3/policy-formalism-technical.pdf
  9. 9.
    Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 8–24. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-31540-4_2CrossRefGoogle Scholar
  10. 10.
    Cholvy, L., Cuppens, F.: Solving normative conflicts by merging roles. In: Proceedings of the 5th International Conference on A. I. and Law, pp. 201–209. ACM (1995)Google Scholar
  11. 11.
    Cranefield, S.: A rule language for modelling and monitoring social expectations in multi-agent systems. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 246–258. Springer, Heidelberg (2006).  https://doi.org/10.1007/11775331_17CrossRefGoogle Scholar
  12. 12.
    Dignum, F.: Autonomous agents with norms. A.I. Law 7(1), 69–79 (1999)Google Scholar
  13. 13.
    Elhag, A.A.O., Breuker, J.A.P.J., Brouwer, P.W.: On the formal analysis of normative conflicts. Inf. Commun. Technol. Law 9(3), 207–217 (2000)CrossRefGoogle Scholar
  14. 14.
    García-Camino, A., Rodríguez-Aguilar, J.A., Sierra, C., Vasconcelos, W.: A distributed architecture for norm-aware agent societies. In: Baldoni, M., Endriss, U., Omicini, A., Torroni, P. (eds.) DALT 2005. LNCS (LNAI), vol. 3904, pp. 89–105. Springer, Heidelberg (2006).  https://doi.org/10.1007/11691792_6CrossRefGoogle Scholar
  15. 15.
    Governatori, G., Olivieri, F., Rotolo, A., Scannapieco, S.: Computing strong and weak permissions in defeasible logic. J. Phil. Logic 42(6), 799–829 (2013)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Grigorik, I.: Minimum Viable Block Chain (2014). https://www.igvita.com/2014/05/05/minimum-viable-block-chain/
  17. 17.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  18. 18.
    Harper, R.: Inside the Smart Home. Springer, London (2006)Google Scholar
  19. 19.
    Hayes, C.C.: Agents in a nutshell-a very brief introduction. IEEE Trans. Knowl. Data Eng. 11(1), 127–132 (1999)CrossRefGoogle Scholar
  20. 20.
    Kanger, S.: Law and logic. Theoria 38(3), 105–132 (1972)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003).  https://doi.org/10.1007/3-540-36467-6_6CrossRefzbMATHGoogle Scholar
  22. 22.
    Meyer, J.J.C., Wieringa, R.J.: Deontic Logic in Computer Science Normative System Specification. In: International Workshop on Deontic Logic in Computer Science (1993)Google Scholar
  23. 23.
    Oren, N., Panagiotidi, S., Vázquez-Salceda, J., Modgil, S., Luck, M., Miles, S.: Towards a formalisation of electronic contracting environments. In: Hübner, J.F., Matson, E., Boissier, O., Dignum, V. (eds.) COIN 2008. LNCS (LNAI), vol. 5428, pp. 156–171. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-00443-8_11CrossRefGoogle Scholar
  24. 24.
    Padget, J.A., Vasconcelos, W.W.: Fine-grained access control via policy-carrying data. ACM Trans. Internet Technol. 18(3), 1–24 (2018)CrossRefGoogle Scholar
  25. 25.
    Postscapes: Blockchains and the Internet of Things, March 2016. http://postscapes.com/blockchains-and-the-internet-of-things
  26. 26.
    Pörn, I.: The Logic of Power. Barnes & Noble, New York (1970)Google Scholar
  27. 27.
    Rabin, M.: Incorporating fairness into game theory and economics. Am. Econ. Rev. 1281–1302 (1993)Google Scholar
  28. 28.
    Sackmann, S., Kahmer, M.: ExPDT: a policy-based approach for automating compliance. Wirtschaftsinformatik 50(5), 366 (2008)CrossRefGoogle Scholar
  29. 29.
    Santos, J.S., Zahn, J.O., Silvestre, E.A., Silva, V.T., Vasconcelos, W.W.: Detection and resolution of normative conflicts in multi-agent systems: a literature survey. Auton. Agent. Multi-Agent Syst. 31(6), 1236–1282 (2017)CrossRefGoogle Scholar
  30. 30.
    Saroiu, S., Wolman, A., Agarwal, S.: Policy-carrying data: a privacy abstraction for attaching terms of service to mobile data. In: Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, pp. 129–134. ACM (2015)Google Scholar
  31. 31.
    Sartor, G.: Normative conflicts in legal reasoning. AI & Law 1(2–3), 209–235 (1992)Google Scholar
  32. 32.
    Sen, A.: Collective Choice and Social Welfare, Expanded edn. Penguin, London (2017)zbMATHGoogle Scholar
  33. 33.
    Sergot, M.: A computational theory of normative positions. ACM Trans. Comput. Logic 2(4), 581–622 (2001)MathSciNetCrossRefGoogle Scholar
  34. 34.
    Shen, X.S., Yu, H., Buford, J., Akon, M.: Handbook of peer-to-peer networking, vol. 34. Springer, Boston (2010).  https://doi.org/10.1007/978-0-387-09751-0CrossRefzbMATHGoogle Scholar
  35. 35.
    Shoham, Y., Tennenholtz, M.: On social laws for artificial agent societies: off-line design. Artif. Intell. 73(1), 231–252 (1995)CrossRefGoogle Scholar
  36. 36.
    Suhendra, V.: A survey on access control deployment. In: Kim, T., Adeli, H., Fang, W., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds.) SecTech 2011. CCIS, vol. 259, pp. 11–20. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-27189-2_2CrossRefGoogle Scholar
  37. 37.
    Vasconcelos, W.W., García-Camino, A., Gaertner, D., Rodríguez-Aguilar, J.A., Noriega, P.: Distributed norm management for multi-agent systems. Expert Syst. Appl. 39(5), 5990–5999 (2012)CrossRefGoogle Scholar
  38. 38.
    Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Resolving conflict and inconsistency in norm-regulated virtual organizations. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, p. 91. ACM (2007)Google Scholar
  39. 39.
    Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Normative conflict resolution in multi-agent systems. AAMAS 19(2), 124–152 (2009)Google Scholar
  40. 40.
    Viganò, F., Fornara, N., Colombetti, M.: An event driven approach to norms in artificial institutions. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 142–154. Springer, Heidelberg (2006).  https://doi.org/10.1007/11775331_10CrossRefGoogle Scholar
  41. 41.
    Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior (commemorative edition). Princeton University Press, Princeton (2007)Google Scholar
  42. 42.
    Von Wright, G.H.: Deontic logic. Mind 60(237), 1–15 (1951)CrossRefGoogle Scholar
  43. 43.
    Wang, X., Yong, Q., Dai, Y.H., Ren, J., Hang, Z.: Protecting outsourced data privacy with lifelong policy carrying. In: IEEE International Conference on High Performance Computing and Communications and Embedded and Ubiquitous Computing (HPCC-EUC), pp. 896–905, November 2013.  https://doi.org/10.1109/HPCC.and.EUC.2013.128
  44. 44.
    von Wright, G.H.: Norm and Action: A Logical Enquiry. Routledge and Kegan Paul, New York (1963)Google Scholar
  45. 45.
    Zheng, Y., Capra, L., Wolfson, O., Yang, H.: Urban computing: concepts, methodologies, and applications. ACM Trans. Intell. Syst. Technol. 5(3), 38:1–38:55 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computing ScienceUniversity of AberdeenAberdeenUK

Personalised recommendations