Advertisement

Emergent Privacy Norms for Collaborative Systems

  • Onuralp UlusoyEmail author
  • Pınar Yolum
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11873)

Abstract

Managing privacy of users in online systems is a major aspect of cyber-security. Typical approaches to privacy are concerned with giving users options of informed consent, wherein users define their private data, how they want them to be used, and so on. However, in collaborative systems, such as online social networks, managing privacy exhibits problems beyond traditional consent, since a content being shared (such as a group picture or a multi-party business contract) might belong to more than a single entity, with different privacy policies. Recent approaches to preserve privacy in such settings rely on multiagent agreement technologies, which require a new decision to be formed for every content that will be shared, making them difficult to scale for real life applications. Accordingly, this paper proposes a normative approach for maintaining privacy in collaborative systems that do not require a decision to be formulated from scratch for each content. Instead, the system generates social norms based on previous decisions. The agents are free to follow the social norms as well as their own privacy policies. We show over multiagent simulations that our approach extracts social norms successfully and enables successful privacy decisions to be taken.

Keywords

Privacy Multiagent systems Norm emergence 

References

  1. 1.
    Ajmeri, N., Guo, H., Murukannaiah, P.K., Singh, M.P.: Robust norm emergence by revealing and reasoning about context: socially intelligent agents for enhancing privacy. In: Proceedings of the International Joint Conference on AI (IJCAI) (2018)Google Scholar
  2. 2.
    Alechina, N., Dastani, M., Logan, B.: Programming norm-aware agents. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems. AAMAS 2012, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, vol. 2, pp. 1057–1064 (2012)Google Scholar
  3. 3.
    Bahri, L., Carminati, B., Ferrari, E.: Decentralized privacy preserving services for online social networks. Online Soc. Netw. Media 6, 18–25 (2018)CrossRefGoogle Scholar
  4. 4.
    Gurses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011)Google Scholar
  5. 5.
    Kekulluoglu, D., Kokciyan, N., Yolum, P.: Preserving privacy as social responsibility in online social networks. ACM Trans. Internet Technol. 18(4), 42:1–42:22 (2018)Google Scholar
  6. 6.
    Kökciyan, N., Yaglikci, N., Yolum, P.: An argumentation approach for resolving privacy disputes in online social networks. ACM Trans. Internet Technol. 17(3), 27:1–27:22 (2017)Google Scholar
  7. 7.
    Langheinrich, M.: Privacy by design — principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45427-6_23CrossRefzbMATHGoogle Scholar
  8. 8.
    Mashayekhi, M., Du, H., List, G.F., Singh, M.P.: Silk: a simulation study of regulating open normative multiagent systems. In: Proceedings of the International Joint Conference on AI (IJCAI), pp. 373–379 (2016)Google Scholar
  9. 9.
    Morales, J., Lopez-Sanchez, M., Rodriguez-Aguilar, J.A., Wooldridge, M., Vasconcelos, W.: Automated synthesis of normative systems. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. AAMAS 2013, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, pp. 483–490 (2013)Google Scholar
  10. 10.
    Paci, F., Squicciarini, A., Zannone, N.: Survey on access control for community-centered collaborative systems. ACM Comput. Surv. 51(1), 6:1–6:38 (2018)Google Scholar
  11. 11.
    Sen, S., Airiau, S.: Emergence of norms through social learning. In: Proceedings of the International Joint Conference on AI (IJCAI), vol. 1507, p. 1512 (2007)Google Scholar
  12. 12.
    Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67–82 (2009)CrossRefGoogle Scholar
  13. 13.
    Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web WWW 2009, pp. 521–530. ACM, New York (2009)Google Scholar
  14. 14.
    Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst. 11(1), 4:1–4:29 (2016)Google Scholar
  15. 15.
    Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley Longman Publishing Co., Inc., Boston (2005)Google Scholar
  16. 16.
    Tuomela, R.: The Importance of Us: A Philosophical Study of Basic Social Norms. Stanford University Press, Stanford (1995)Google Scholar
  17. 17.
    Ulusoy, O., Yolum, P.: Pano: privacy auctioning for online social networks. In: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. AAMAS 2018, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, pp. 2103–2105 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Utrecht UniversityUtrechtThe Netherlands

Personalised recommendations