Skip to main content

Policies to Regulate Distributed Data Exchange

  • Conference paper
  • First Online:
Agreement Technologies (AT 2018)

Abstract

Data sharing is becoming an integral part of many aspects of our daily lives. We propose a method for controlling access to data and knowledge through fine-grained, user-specified explicitly represented policies. We present an overview of a policy formalism and mechanisms to facilitate distributed data sharing. We provide a breakdown of how our approach defines compliance and violation, specifically providing a new outlook on violation of permissions within the context of data sharing. We also examine how our mechanisms have been adapted to support socially responsible interactions between participants, whilst still providing them with control over their own data. We also explore a series of planned experiments investigating how users understand and interact with policies in a simplified version of our formalism.

This research is partially sponsored by the EPSRC grant EP/P011829/1, funded under the UK Engineering and Physical Sciences Council Human Dimensions of Cyber Security call (2016).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Artikis, A., Kamara, L., Pitt, J., Sergot, M.: A protocol for resource sharing in norm-governed ad hoc networks. In: Leite, J., Omicini, A., Torroni, P., Yolum, I. (eds.) DALT 2004. LNCS (LNAI), vol. 3476, pp. 221–238. Springer, Heidelberg (2005). https://doi.org/10.1007/11493402_13

    Chapter  Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  3. Boella, G., van der Torre, L.: Permissions and obligations in hierarchical normative systems. In: Proceedings of the 9th International Conference on AI and Law, pp. 109–118. ACM (2003)

    Google Scholar 

  4. Buford, J., Yu, H., Lua, E.K.: P2P Networking and Applications. Morgan Kaufmann, San Francisco (2009)

    Google Scholar 

  5. Caragliu, A., Bo, C., Nijkamp, P.: Smart cities in Europe. J. Urban Technol. 18(2), 65–82 (2011)

    Article  Google Scholar 

  6. Cauvin, S.R., Kollingbaum, M.J., Sleeman, D., Vasconcelos, W.W.: Towards a distributed data-sharing economy. In: Cranefield, S., Mahmoud, S., Padget, J., Rocha, A.P. (eds.) COIN -2016. LNCS (LNAI), vol. 10315, pp. 3–21. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66595-5_1

    Chapter  Google Scholar 

  7. Cauvin, S.R., Kollingbaum, M.J., Vasconcelos, W.W.: A peer-to-peer alternative to blockchain for managing distributed data transactions. In: SmartLaw@ICAIL (2017)

    Google Scholar 

  8. Cauvin, S.R., Vasconcelos, W.W.: A policy formalism to facilitate distributed data exchange - technical note (2018). https://www.dropbox.com/s/i2jbc8m1uxzprp3/policy-formalism-technical.pdf

  9. Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 8–24. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_2

    Chapter  Google Scholar 

  10. Cholvy, L., Cuppens, F.: Solving normative conflicts by merging roles. In: Proceedings of the 5th International Conference on A. I. and Law, pp. 201–209. ACM (1995)

    Google Scholar 

  11. Cranefield, S.: A rule language for modelling and monitoring social expectations in multi-agent systems. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 246–258. Springer, Heidelberg (2006). https://doi.org/10.1007/11775331_17

    Chapter  Google Scholar 

  12. Dignum, F.: Autonomous agents with norms. A.I. Law 7(1), 69–79 (1999)

    Google Scholar 

  13. Elhag, A.A.O., Breuker, J.A.P.J., Brouwer, P.W.: On the formal analysis of normative conflicts. Inf. Commun. Technol. Law 9(3), 207–217 (2000)

    Article  Google Scholar 

  14. García-Camino, A., Rodríguez-Aguilar, J.A., Sierra, C., Vasconcelos, W.: A distributed architecture for norm-aware agent societies. In: Baldoni, M., Endriss, U., Omicini, A., Torroni, P. (eds.) DALT 2005. LNCS (LNAI), vol. 3904, pp. 89–105. Springer, Heidelberg (2006). https://doi.org/10.1007/11691792_6

    Chapter  Google Scholar 

  15. Governatori, G., Olivieri, F., Rotolo, A., Scannapieco, S.: Computing strong and weak permissions in defeasible logic. J. Phil. Logic 42(6), 799–829 (2013)

    Article  MathSciNet  Google Scholar 

  16. Grigorik, I.: Minimum Viable Block Chain (2014). https://www.igvita.com/2014/05/05/minimum-viable-block-chain/

  17. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  18. Harper, R.: Inside the Smart Home. Springer, London (2006)

    Google Scholar 

  19. Hayes, C.C.: Agents in a nutshell-a very brief introduction. IEEE Trans. Knowl. Data Eng. 11(1), 127–132 (1999)

    Article  Google Scholar 

  20. Kanger, S.: Law and logic. Theoria 38(3), 105–132 (1972)

    Article  MathSciNet  Google Scholar 

  21. Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_6

    Chapter  MATH  Google Scholar 

  22. Meyer, J.J.C., Wieringa, R.J.: Deontic Logic in Computer Science Normative System Specification. In: International Workshop on Deontic Logic in Computer Science (1993)

    Google Scholar 

  23. Oren, N., Panagiotidi, S., Vázquez-Salceda, J., Modgil, S., Luck, M., Miles, S.: Towards a formalisation of electronic contracting environments. In: Hübner, J.F., Matson, E., Boissier, O., Dignum, V. (eds.) COIN 2008. LNCS (LNAI), vol. 5428, pp. 156–171. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00443-8_11

    Chapter  Google Scholar 

  24. Padget, J.A., Vasconcelos, W.W.: Fine-grained access control via policy-carrying data. ACM Trans. Internet Technol. 18(3), 1–24 (2018)

    Article  Google Scholar 

  25. Postscapes: Blockchains and the Internet of Things, March 2016. http://postscapes.com/blockchains-and-the-internet-of-things

  26. Pörn, I.: The Logic of Power. Barnes & Noble, New York (1970)

    Google Scholar 

  27. Rabin, M.: Incorporating fairness into game theory and economics. Am. Econ. Rev. 1281–1302 (1993)

    Google Scholar 

  28. Sackmann, S., Kahmer, M.: ExPDT: a policy-based approach for automating compliance. Wirtschaftsinformatik 50(5), 366 (2008)

    Article  Google Scholar 

  29. Santos, J.S., Zahn, J.O., Silvestre, E.A., Silva, V.T., Vasconcelos, W.W.: Detection and resolution of normative conflicts in multi-agent systems: a literature survey. Auton. Agent. Multi-Agent Syst. 31(6), 1236–1282 (2017)

    Article  Google Scholar 

  30. Saroiu, S., Wolman, A., Agarwal, S.: Policy-carrying data: a privacy abstraction for attaching terms of service to mobile data. In: Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, pp. 129–134. ACM (2015)

    Google Scholar 

  31. Sartor, G.: Normative conflicts in legal reasoning. AI & Law 1(2–3), 209–235 (1992)

    Google Scholar 

  32. Sen, A.: Collective Choice and Social Welfare, Expanded edn. Penguin, London (2017)

    MATH  Google Scholar 

  33. Sergot, M.: A computational theory of normative positions. ACM Trans. Comput. Logic 2(4), 581–622 (2001)

    Article  MathSciNet  Google Scholar 

  34. Shen, X.S., Yu, H., Buford, J., Akon, M.: Handbook of peer-to-peer networking, vol. 34. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-09751-0

    Book  MATH  Google Scholar 

  35. Shoham, Y., Tennenholtz, M.: On social laws for artificial agent societies: off-line design. Artif. Intell. 73(1), 231–252 (1995)

    Article  Google Scholar 

  36. Suhendra, V.: A survey on access control deployment. In: Kim, T., Adeli, H., Fang, W., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds.) SecTech 2011. CCIS, vol. 259, pp. 11–20. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-27189-2_2

    Chapter  Google Scholar 

  37. Vasconcelos, W.W., García-Camino, A., Gaertner, D., Rodríguez-Aguilar, J.A., Noriega, P.: Distributed norm management for multi-agent systems. Expert Syst. Appl. 39(5), 5990–5999 (2012)

    Article  Google Scholar 

  38. Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Resolving conflict and inconsistency in norm-regulated virtual organizations. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, p. 91. ACM (2007)

    Google Scholar 

  39. Vasconcelos, W.W., Kollingbaum, M.J., Norman, T.J.: Normative conflict resolution in multi-agent systems. AAMAS 19(2), 124–152 (2009)

    Google Scholar 

  40. Viganò, F., Fornara, N., Colombetti, M.: An event driven approach to norms in artificial institutions. In: Boissier, O., et al. (eds.) AAMAS 2005. LNCS (LNAI), vol. 3913, pp. 142–154. Springer, Heidelberg (2006). https://doi.org/10.1007/11775331_10

    Chapter  Google Scholar 

  41. Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior (commemorative edition). Princeton University Press, Princeton (2007)

    Google Scholar 

  42. Von Wright, G.H.: Deontic logic. Mind 60(237), 1–15 (1951)

    Article  Google Scholar 

  43. Wang, X., Yong, Q., Dai, Y.H., Ren, J., Hang, Z.: Protecting outsourced data privacy with lifelong policy carrying. In: IEEE International Conference on High Performance Computing and Communications and Embedded and Ubiquitous Computing (HPCC-EUC), pp. 896–905, November 2013. https://doi.org/10.1109/HPCC.and.EUC.2013.128

  44. von Wright, G.H.: Norm and Action: A Logical Enquiry. Routledge and Kegan Paul, New York (1963)

    Google Scholar 

  45. Zheng, Y., Capra, L., Wolfson, O., Yang, H.: Urban computing: concepts, methodologies, and applications. ACM Trans. Intell. Syst. Technol. 5(3), 38:1–38:55 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel R. Cauvin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cauvin, S.R., Oren, N., Vasconcelos, W.W. (2019). Policies to Regulate Distributed Data Exchange. In: Lujak, M. (eds) Agreement Technologies. AT 2018. Lecture Notes in Computer Science(), vol 11327. Springer, Cham. https://doi.org/10.1007/978-3-030-17294-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17294-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17293-0

  • Online ISBN: 978-3-030-17294-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics