Advertisement

An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

  • Jose M. Such
  • Agustin Espinosa
  • Ana Garcia-Fornes
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7068)

Abstract

Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use. Privacy can be enhanced minimizing data identifiability, i.e., the degree by which personal information can be directly attributed to a particular individual. However, minimizing data identifiability may directly impact other crucial issues in agent-based e-commerce, such as accountability, trust, and reputation. In this paper, we present an agent infrastructure for agent-based e-commerce applications. This agent infrastructure enhances privacy without compromising accountability, trust, and reputation.

Keywords

Multiagent System Partial Identity Real Identity Agent Platform Reputation Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aïmeur, E., Brassard, G., Onana, F.S.M.: Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS International Conference on e-Commerce, pp. 25–33 (2005)Google Scholar
  2. 2.
    Alberola, J.M., Such, J.M., Garcia-Fornes, A., Espinosa, A., Botti, V.: A performance evaluation of three multiagent platforms. Artificial Intelligence Review 34, 145–176 (2010)CrossRefGoogle Scholar
  3. 3.
    Balke, T., Eymann, T.: The conclusion of contracts by software agents in the eyes of the law. In: Proc. of The 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), pp. 771–778 (2008)Google Scholar
  4. 4.
    Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. J. Comput. Secur. 15, 493–527 (2007)CrossRefGoogle Scholar
  5. 5.
    Bordini, R.H., Wooldridge, M., Hübner, J.F.: Programming Multi-Agent Systems in AgentSpeak using Jason (Wiley Series in Agent Technology). John Wiley & Sons (2007)Google Scholar
  6. 6.
    Carrara, E., Hogben, G.: Reputation-based systems: a security analysis. ENISA Position Paper (2007)Google Scholar
  7. 7.
    Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  8. 8.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985)CrossRefGoogle Scholar
  9. 9.
    Clauβ, S., Kesdogan, D., Kölsch, T.: Privacy enhancing identity management: protection against re-identification and profiling. In: DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 84–93. ACM, New York (2005)Google Scholar
  10. 10.
    Dierks, T., Allen, C.: The tls protocol version 1.0. RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt
  11. 11.
    Fasli, M.: Agent Technology For E-Commerce. John Wiley & Sons (2007)Google Scholar
  12. 12.
    Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review 22(1), 3–35 (2007)CrossRefGoogle Scholar
  13. 13.
    FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http://www.fipa.org/specs/fipa00061/
  14. 14.
    Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10, 173–199 (1998)CrossRefGoogle Scholar
  15. 15.
    Frier, A., Karlton, P., Kocher, P.: The secure socket layer. Tech. Rep. MSU-CSE-00-2, Netscape Communications (1996)Google Scholar
  16. 16.
    Garfinkel, S.: Privacy requires security, not abstinence: Protecting an inalienable right in the age of facebook (2009), http://www.technologyreview.com/computing/22831/
  17. 17.
    Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (1999)CrossRefGoogle Scholar
  18. 18.
    JADE Board: Jade security guide (2005), http://jade.tilab.com
  19. 19.
    Jøsang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, STM 2009 (2009)Google Scholar
  20. 20.
    Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: Proc. of The 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), pp. 993–1000 (2009)Google Scholar
  21. 21.
    Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). No. 4120 in Request for Comments, IETF (2005)Google Scholar
  22. 22.
    Newman, A.E.: Cougaar developers’ guide (2004), http://www.cougaar.org
  23. 23.
    Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34 (August 2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
  24. 24.
    Quillinan, T.B., Warnier, M., Oey, M., Timmer, R., Brazier, F.: Enforcing security in the agentscape middleware. In: Proceedings of the 2008 Workshop on Middleware Security, MidSec 2008, pp. 25–30. ACM (2008)Google Scholar
  25. 25.
    Ramchurn, S., Huynh, D., Jennings, N.: Trust in multi-agent systems. The Knowledge Engineering Review 19(1), 1–25 (2004)CrossRefGoogle Scholar
  26. 26.
    Rannenberg, K., Royer, D., Deuker, A. (eds.): The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Heidelberg (2009) Incorporated Google Scholar
  27. 27.
    Recursion Software Inc.: Voyager security guide (2008), http://www.recursionsw.com/
  28. 28.
    Roth, V., Jalali-Sohi, M.: Concepts and architecture of a security-centric mobile agent server. In: ISADS (2001)Google Scholar
  29. 29.
    Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)CrossRefzbMATHGoogle Scholar
  30. 30.
    Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering 35(1), 67–82 (2009)CrossRefGoogle Scholar
  31. 31.
    Stamp, M.: Information Security: Principles and Practice. Wiley-Interscience (2006)Google Scholar
  32. 32.
    Such, J.M., Alberola, J.M., Espinosa, A., Garcia-Fornes, A.: A group-oriented secure multiagent platform. Software: Practice and Experience (in Press, 2011a)Google Scholar
  33. 33.
    Such, J.M., Espinosa, A., Garcia-Fornes, A., Botti, V.: Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence (in Press, 2011b)Google Scholar
  34. 34.
    Ugurlu, S., Erdogan, N.: An overview of secmap secure mobile agent platform. In: Proceedings of Second International Workshop on Safety and Security in Multiagent Systems (2005)Google Scholar
  35. 35.
    Vinoski, S.: Advanced message queuing protocol. IEEE Internet Computing 10(6), 87–89 (2006)CrossRefGoogle Scholar
  36. 36.
    Warnier, M., Brazier, F.: Anonymity services for multi-agent systems. Web Intelligence and Agent Systems 8(2), 219–232 (2010)Google Scholar
  37. 37.
    Westin, A.: Social and political dimensions of privacy. Journal of Social Issues 59(2), 431–453 (2003)CrossRefGoogle Scholar
  38. 38.
    Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering 10, 337–365 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jose M. Such
    • 1
  • Agustin Espinosa
    • 1
  • Ana Garcia-Fornes
    • 1
  1. 1.Departament de Sistemes informàtics i ComputacióUniversitat Politècnica de ValènciaValènciaSpain

Personalised recommendations