Abstract
Data sharing is becoming an integral part of many aspects of our daily lives. We propose a method for controlling access to data and knowledge through fine-grained, user-specified explicitly represented policies. We present an overview of a policy formalism and mechanisms to facilitate distributed data sharing. We provide a breakdown of how our approach defines compliance and violation, specifically providing a new outlook on violation of permissions within the context of data sharing. We also examine how our mechanisms have been adapted to support socially responsible interactions between participants, whilst still providing them with control over their own data. We also explore a series of planned experiments investigating how users understand and interact with policies in a simplified version of our formalism.
This research is partially sponsored by the EPSRC grant EP/P011829/1, funded under the UK Engineering and Physical Sciences Council Human Dimensions of Cyber Security call (2016).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Artikis, A., Kamara, L., Pitt, J., Sergot, M.: A protocol for resource sharing in norm-governed ad hoc networks. In: Leite, J., Omicini, A., Torroni, P., Yolum, I. (eds.) DALT 2004. LNCS (LNAI), vol. 3476, pp. 221–238. Springer, Heidelberg (2005). https://doi.org/10.1007/11493402_13
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Boella, G., van der Torre, L.: Permissions and obligations in hierarchical normative systems. In: Proceedings of the 9th International Conference on AI and Law, pp. 109–118. ACM (2003)
Buford, J., Yu, H., Lua, E.K.: P2P Networking and Applications. Morgan Kaufmann, San Francisco (2009)
Caragliu, A., Bo, C., Nijkamp, P.: Smart cities in Europe. J. Urban Technol. 18(2), 65–82 (2011)
Cauvin, S.R., Kollingbaum, M.J., Sleeman, D., Vasconcelos, W.W.: Towards a distributed data-sharing economy. In: Cranefield, S., Mahmoud, S., Padget, J., Rocha, A.P. (eds.) COIN -2016. LNCS (LNAI), vol. 10315, pp. 3–21. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66595-5_1
Cauvin, S.R., Kollingbaum, M.J., Vasconcelos, W.W.: A peer-to-peer alternative to blockchain for managing distributed data transactions. In: SmartLaw@ICAIL (2017)
Cauvin, S.R., Vasconcelos, W.W.: A policy formalism to facilitate distributed data exchange - technical note (2018). https://www.dropbox.com/s/i2jbc8m1uxzprp3/policy-formalism-technical.pdf
Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 8–24. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_2
Cholvy, L., Cuppens, F.: Solving normative conflicts by merging roles. In: Proceedings of the 5th International Conference on A. I. and Law, pp. 201–209. ACM (1995)
Cranefield, S.: A rule language for modelling and monitoring social expectations in multi-agent systems. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 246–258. Springer, Heidelberg (2006). https://doi.org/10.1007/11775331_17
Dignum, F.: Autonomous agents with norms. A.I. Law 7(1), 69–79 (1999)
Elhag, A.A.O., Breuker, J.A.P.J., Brouwer, P.W.: On the formal analysis of normative conflicts. Inf. Commun. Technol. Law 9(3), 207–217 (2000)
GarcÃa-Camino, A., RodrÃguez-Aguilar, J.A., Sierra, C., Vasconcelos, W.: A distributed architecture for norm-aware agent societies. In: Baldoni, M., Endriss, U., Omicini, A., Torroni, P. (eds.) DALT 2005. LNCS (LNAI), vol. 3904, pp. 89–105. Springer, Heidelberg (2006). https://doi.org/10.1007/11691792_6
Governatori, G., Olivieri, F., Rotolo, A., Scannapieco, S.: Computing strong and weak permissions in defeasible logic. J. Phil. Logic 42(6), 799–829 (2013)
Grigorik, I.: Minimum Viable Block Chain (2014). https://www.igvita.com/2014/05/05/minimum-viable-block-chain/
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Harper, R.: Inside the Smart Home. Springer, London (2006)
Hayes, C.C.: Agents in a nutshell-a very brief introduction. IEEE Trans. Knowl. Data Eng. 11(1), 127–132 (1999)
Kanger, S.: Law and logic. Theoria 38(3), 105–132 (1972)
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_6
Meyer, J.J.C., Wieringa, R.J.: Deontic Logic in Computer Science Normative System Specification. In: International Workshop on Deontic Logic in Computer Science (1993)
Oren, N., Panagiotidi, S., Vázquez-Salceda, J., Modgil, S., Luck, M., Miles, S.: Towards a formalisation of electronic contracting environments. In: Hübner, J.F., Matson, E., Boissier, O., Dignum, V. (eds.) COIN 2008. LNCS (LNAI), vol. 5428, pp. 156–171. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00443-8_11
Padget, J.A., Vasconcelos, W.W.: Fine-grained access control via policy-carrying data. ACM Trans. Internet Technol. 18(3), 1–24 (2018)
Postscapes: Blockchains and the Internet of Things, March 2016. http://postscapes.com/blockchains-and-the-internet-of-things
Pörn, I.: The Logic of Power. Barnes & Noble, New York (1970)
Rabin, M.: Incorporating fairness into game theory and economics. Am. Econ. Rev. 1281–1302 (1993)
Sackmann, S., Kahmer, M.: ExPDT: a policy-based approach for automating compliance. Wirtschaftsinformatik 50(5), 366 (2008)
Santos, J.S., Zahn, J.O., Silvestre, E.A., Silva, V.T., Vasconcelos, W.W.: Detection and resolution of normative conflicts in multi-agent systems: a literature survey. Auton. Agent. Multi-Agent Syst. 31(6), 1236–1282 (2017)
Saroiu, S., Wolman, A., Agarwal, S.: Policy-carrying data: a privacy abstraction for attaching terms of service to mobile data. In: Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, pp. 129–134. ACM (2015)
Sartor, G.: Normative conflicts in legal reasoning. AI & Law 1(2–3), 209–235 (1992)
Sen, A.: Collective Choice and Social Welfare, Expanded edn. Penguin, London (2017)
Sergot, M.: A computational theory of normative positions. ACM Trans. Comput. Logic 2(4), 581–622 (2001)
Shen, X.S., Yu, H., Buford, J., Akon, M.: Handbook of peer-to-peer networking, vol. 34. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-09751-0
Shoham, Y., Tennenholtz, M.: On social laws for artificial agent societies: off-line design. Artif. Intell. 73(1), 231–252 (1995)
Suhendra, V.: A survey on access control deployment. In: Kim, T., Adeli, H., Fang, W., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds.) SecTech 2011. CCIS, vol. 259, pp. 11–20. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-27189-2_2
Vasconcelos, W.W., GarcÃa-Camino, A., Gaertner, D., RodrÃguez-Aguilar, J.A., Noriega, P.: Distributed norm management for multi-agent systems. Expert Syst. Appl. 39(5), 5990–5999 (2012)
Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Resolving conflict and inconsistency in norm-regulated virtual organizations. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, p. 91. ACM (2007)
Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Normative conflict resolution in multi-agent systems. AAMAS 19(2), 124–152 (2009)
Viganò, F., Fornara, N., Colombetti, M.: An event driven approach to norms in artificial institutions. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 142–154. Springer, Heidelberg (2006). https://doi.org/10.1007/11775331_10
Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior (commemorative edition). Princeton University Press, Princeton (2007)
Von Wright, G.H.: Deontic logic. Mind 60(237), 1–15 (1951)
Wang, X., Yong, Q., Dai, Y.H., Ren, J., Hang, Z.: Protecting outsourced data privacy with lifelong policy carrying. In: IEEE International Conference on High Performance Computing and Communications and Embedded and Ubiquitous Computing (HPCC-EUC), pp. 896–905, November 2013. https://doi.org/10.1109/HPCC.and.EUC.2013.128
von Wright, G.H.: Norm and Action: A Logical Enquiry. Routledge and Kegan Paul, New York (1963)
Zheng, Y., Capra, L., Wolfson, O., Yang, H.: Urban computing: concepts, methodologies, and applications. ACM Trans. Intell. Syst. Technol. 5(3), 38:1–38:55 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Cauvin, S.R., Oren, N., Vasconcelos, W.W. (2019). Policies to Regulate Distributed Data Exchange. In: Lujak, M. (eds) Agreement Technologies. AT 2018. Lecture Notes in Computer Science(), vol 11327. Springer, Cham. https://doi.org/10.1007/978-3-030-17294-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-17294-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17293-0
Online ISBN: 978-3-030-17294-7
eBook Packages: Computer ScienceComputer Science (R0)