Privacy Protection in Trust Models for Agent Societies

  • Javier Carbo
  • Juanita Pedraza
  • Mar Lopez
  • José Manuel Molina
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 299)


In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.


Privacy Trust Agents 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Clarke, R.: Information technology and dataveillance. Commun. ACM 31(5), 498–512 (1988)CrossRefGoogle Scholar
  2. 2.
    Calvo-Rolle, J.L., Corchado, E.: A bio-inspired knowledge system for improving combined cycle plant control tuning. Neurocomputing 126, 95–105 (2014)CrossRefGoogle Scholar
  3. 3.
    Wozniak, M., Grańa, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Information Fusion 16, 3–17 (2014)CrossRefGoogle Scholar
  4. 4.
    Parliament, E.: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (October 1995),
  5. 5.
    Pedraza, J., Patricio, M.A., de Asks, A., Molina, J.: Privacy-by-design rules in face recognition system. Neurocomputing 109 (2013)Google Scholar
  6. 6.
    Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. Computer Communications and Networks, pp. 3–42. Springer London (2013)Google Scholar
  7. 7.
    Sattar, A.H.M.S., Li, J., Ding, X., Liu, J., Vincent, M.W..: A general framework for privacy preserving data publishing. Knowl.-Based Syst. 54, 276–287 (2013)CrossRefGoogle Scholar
  8. 8.
    Pallapa, G., Francescoy, M.D., Das, S.K.: Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments. In: 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2012)Google Scholar
  9. 9.
    Dellarocas, C.: The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science 49, 1407–1424 (2003)CrossRefGoogle Scholar
  10. 10.
    Sabater-Mir, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)CrossRefGoogle Scholar
  11. 11.
    Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: In Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 294–301. ACM Press (2002)Google Scholar
  12. 12.
    Esfandiari, B., Chandrasekharan, S.: On how agents make friends: Mechanisms for trust acquisition. In: In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, pp. 27–34 (2001)Google Scholar
  13. 13.
    Fullam, K., Klos, T., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K.S., Rosenschein, J., Vercouter, L., Voss, M.: A specification of the agent reputation and trust (art) testbed: Experimentation and competition for trust in agent societies. In: The Fourth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), pp. 512–518 (2005)Google Scholar
  14. 14.
    Gómez, M., Carbo, J., Benac-Earle, C.: Honesty and trust revisited: the advantages of being neutral about other’s cognitive models. Autonomous Agents and Multi-Agent Systems 15(3), 313–335 (2007)CrossRefGoogle Scholar
  15. 15.
    Moya, J., Carbo, J.: Distributing art agents with jade. In: 10th European Workshop on Multi-Agent Systems, EUMAS (2012)Google Scholar
  16. 16.
    Carbo, J., Molina, J.M.: A jade-based art-inspired ontology and protocols for handling trust and reputation. In: Ninth International Conference on Intelligent Systems Design and Applications, ISDA, pp. 300–305 (2009)Google Scholar
  17. 17.
    Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE. Wiley (2007)Google Scholar
  18. 18.
    Esteva, M., Cruz, D.d.l., Sierra, C.: Islander: an electronic institutions editor. In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS, pp. 1045–1052. ACM (2002)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Javier Carbo
    • 1
  • Juanita Pedraza
    • 2
  • Mar Lopez
    • 1
  • José Manuel Molina
    • 1
  1. 1.Computer Science Dept.Univ. Carlos III of MadridMadridSpain
  2. 2.Public State Law Dept.Univ. Carlos III of MadridMadridSpain

Personalised recommendations