[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/3091125.3091184acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

An Automated Negotiation Agent for Permission Management

Published: 08 May 2017 Publication History

Abstract

The digital economy is based on data sharing yet citizens have little control about how their personal data is being used. While data management during web and app-based use is already a challenge, as the Internet of Things (IoT) scales up, the number of devices accessing and requiring personal data will go beyond what a person can manually assess in terms of data access requests. Therefore, new approaches are needed for managing privacy preferences at scale and providing active consent around data sharing that can improve fidelity of operation in alignment with user intent. To address this challenge, we introduce a novel agent-based approach to negotiate the permission to exchange private data between users and services. Our agent negotiates based on learned preferences from actual users. To evaluate our agent-based approach, we developed an experimental tool to run on people's own smartphones, where users were asked to share their private, real data (e.g. photos, contacts, etc) under various conditions. The agent autonomously negotiates potential agreements for the user, which they can refine by manually continuing the negotiation. The agent learns from these interactions and updates the user model in subsequent interactions. We find that the agent is able to effectively capture the preferences and negotiate on the user's behalf but, surprisingly, does not reduce user engagement with the system. Understanding how interaction interplays with agent-based automation is a key component to successful deployment of negotiating agents in real-life settings and within the IoT context in particular.

References

[1]
Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce, EC '99, pages 1--8, New York, NY, USA, 1999. ACM.
[2]
Alessandro Acquisti and Jens Grossklags. Privacy and rationality in individual decision making. IEEE Security & Privacy, 2(2005):24--30, 2005.
[3]
Alessandro Acquisti and Jens Grossklags. Uncertainty, ambiguity and privacy. In Fourth workshop on the economics of information security (WEIS 2005), pages 2--3, 2005.
[4]
Alper Alan, Enrico Costanza, Joel Fischer, Sarvapali D. Ramchurn, Tom Rodden, and Nicholas R. Jennings. A field study of human-agent interaction for electricity tariff switching. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '14, pages 965--972, Richland, SC, 2014. International Foundation for Autonomous Agents and Multiagent Systems.
[5]
Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, and M.C. Schraefel. Negotiation as an interaction mechanism for deciding app permissions. In Proceedings of the 2016 CHI Conference: Extended Abstracts on Human Factors in Computing Systems, CHI EA '16, pages 2012--2019, New York, NY, USA, 2016. ACM.
[6]
Tim Baarslag and Enrico H. Gerding. Optimal incremental preference elicitation during negotiation. In Proceedings of the Twenty-fourth International Joint Conference on Artificial Intelligence, IJCAI'15, pages 3--9. AAAI Press, 2015.
[7]
Tim Baarslag, Enrico H. Gerding, Reyhan Aydo\ugan, and M.C. Schraefel. Optimal negotiation decision functions in time-sensitive domains. In 2015 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), volume 2, pages 190--197, Dec 2015.
[8]
Tim Baarslag, Mark J.C. Hendrikx, Koen V. Hindriks, and Catholijn M. Jonker. Measuring the performance of online opponent models in automated bilateral negotiation. In Michael Thielscher and Dongmo Zhang, editors, AI 2012: Advances in Artificial Intelligence, volume 7691 of Lecture Notes in Computer Science, pages 1--14. Springer Berlin Heidelberg, 2012.
[9]
Tim Baarslag, Mark J.C. Hendrikx, Koen V. Hindriks, and Catholijn M. Jonker. Learning about the opponent in automated bilateral negotiation: a comprehensive survey of opponent modeling techniques. Autonomous Agents and Multi-Agent Systems, 30(5):849--898, 2016.
[10]
M. Bennicke and P. Langendorfer. Towards automatic negotiation of privacy contracts for internet services. In The 11th IEEE International Conference on Networks, 2003. ICON2003., pages 319--324. IEEE, 2003.
[11]
M. Bennicke and P. Langendorfer. Towards automatic negotiation of privacy contracts for internet services. In The 11th IEEE International Conference on Networks, 2003. ICON2003., pages 319--324. IEEE, 2003.
[12]
Elisa Burato and Matteo Cristani. The process of reaching agreement in meaning negotiation. In Ngoc Thanh Nguyen, editor, Transactions on Computational Collective Intelligence VII, pages 1--42. Springer-Verlag, Berlin, Heidelberg, 2012.
[13]
Siqi Chen, Haitham Bou Ammar, Karl Tuyls, and Gerhard Weiss. Optimizing complex automated negotiation using sparse pseudo-input gaussian processes. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13, pages 707--714, Richland, SC, 2013. International Foundation for Autonomous Agents and Multiagent Systems.
[14]
Vivying Cheng, Patrick Hung, and Dickson Chiu. Enabling Web Services Policy Negotiation with Privacy preserved using XACML. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pages 33--33. IEEE, 2007.
[15]
EC European Commission et al. Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation). COM (2012) 11 final, 2012/0011 (COD), Brussels, 25 January 2012, 2012.
[16]
Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. Privacy personas: Clustering users via attitudes and behaviors toward security practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pages 5228--5239, New York, NY, USA, 2016. ACM.
[17]
Shaheen S. Fatima, Michael J. Wooldridge, and Nicholas R. Jennings. Multi-issue negotiation under time constraints. In AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems, pages 143--150, New York, NY, USA, 2002. ACM.
[18]
Jianye Hao and Ho-fung Leung. CUHK agent: an adaptive negotiation strategy for bilateral negotiations over multiple items. In Ivan Marsa-Maestre, Miguel A. Lopez-Carmona, Takayuki Ito, Minjie Zhang, Quan Bai, and Katsuhide Fujita, editors, Novel Insights in Agent-based Complex Automated Negotiation, volume 535 of Studies in Computational Intelligence, pages 171--179. Springer, Japan, 2014.
[19]
Sandra G Hart. NASA-task load index (NASA-TLX); 20 years later. In Proceedings of the human factors and ergonomics society annual meeting, volume 50, pages 904--908. Sage Publications, 2006.
[20]
Luke Hutton and Tristan Henderson. "I didn't sign up for this!": Informed consent in social network research. In International AAAI Conference on Web and Social Media, 2015.
[21]
L. Ilany and Y. (K.) Gal. The simple-meta agent. In I. Marsa-Maestre, M.A. Lopez-Carmona, T. Ito, M. Zhang, Q. Bai, and K. Fujita, editors, Novel Insights in Agent-based Complex Automated Negotiation, volume 535 of Studies in Computational Intelligence, pages 197--200. Springer, Japan, 2014.
[22]
Johnson Iyilade and Julita Vassileva. P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage. In 2014 IEEE Security and Privacy Workshops, pages 18--22. IEEE, may 2014.
[23]
I. Jang and H. S. Yoo. Personal information classification for privacy negotiation. In Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on, pages 1117--1122, Nov 2009.
[24]
I. J. Jang, W. Shi, and H. S. Yoo. Policy negotiation system architecture for privacy protection. In Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on, volume 2, pages 592--597, Sept 2008.
[25]
Y. Kalyani and C. Adams. Privacy negotiation using a mobile agent. In 2006 Canadian Conference on Electrical and Computer Engineering, pages 628--633, May 2006.
[26]
Shogo Kawaguchi, Katsuhide Fujita, and Takayuki Ito. Compromising strategy based on estimated maximum utility for automated negotiating agents. In Takayuki Ito, Minjie Zhang, Valentin Robu, Shaheen Fatima, and Tokuro Matsuo, editors, New Trends in Agent-based Complex Automated Negotiations, Series of Studies in Computational Intelligence, pages 137--144, Berlin, Heidelberg, 2012. Springer-Verlag.
[27]
Ralph L. Keeney and Howard Raiffa. Decisions with Multiple Objectives. Cambridge University Press, 1976.
[28]
Nadin Kokciyan. Privacy management in agent-based social networks. In AAAI Conference on Artificial Intelligence, 2016.
[29]
Sarit Kraus. Strategic Negotiation in Multiagent Environments. MIT Press, Oct 2001.
[30]
Andreas Krause and Eric Horvitz. A utility-theoretic approach to privacy in online services. Journal of Artificial Intelligence Research, 39:633--662, 2010.
[31]
Ponnurangam Kumaraguru and Lorrie Faith Cranor. Privacy indexes: a survey of westin's studies. ISRI Technical Report, 2005.
[32]
Haifei Li, David Ahn, and Patrick C. K. Hung. Algorithms for automated negotiations and their applications in information privacy. In Proceedings of the IEEE International Conference on E-Commerce Technology, CEC '04, pages 255--262, Washington, DC, USA, 2004. IEEE Computer Society.
[33]
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frederic Cuppens, and Vincent Frey. Reaching Agreement in Security Policy Negotiation. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pages 98--105. IEEE, sep 2014.
[34]
Ilaria Liccardi, Joseph Pato, and Daniel J Weitzner. Improving user choice through better mobile apps transparency and permissions analysis. Journal of Privacy and Confidentiality, 5(2):1, 2014.
[35]
M. Maaser and P. Langendoerfer. Automated negotiation of privacy contracts. In 29th Annual International Computer Software and Applications Conference (COMPSAC'05), volume 1, pages 505--510 Vol. 2, July 2005.
[36]
Martin J. Osborne and Ariel Rubinstein. A Course in Game Theory. The MIT Press, 1st edition, 1994.
[37]
Bill Parducci and Hal Lockhart. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard, (January):1--154, 2013.
[38]
Eli Pariser. The filter bubble: What the Internet is hiding from you. Penguin UK, 2011.
[39]
Charith Perera, Susan Y. L. Wakenshaw, Tim Baarslag, Hamed Haddadi, Arosha K. Bandara, Richard Mortier, Andy Crabtree, Irene C. L. Ng, Derek McAuley, and Jon Crowcroft. Valorising the IoT databox: creating value for everyone. Transactions on Emerging Telecommunications Technologies, 2016.
[40]
Elena Popescu. On the approximation of inconsistent inequality systems. Analele Ştiintifice ale Universitătii Ovidius, 11(2):109--118, 2003.
[41]
S. Preibusch. Implementing privacy negotiation techniques in e-commerce. In Seventh IEEE International Conference on E-Commerce Technology (CEC'05), pages 387--390, July 2005.
[42]
Sören Preibusch. Privacy negotiations with p3p. In W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, 2006, 2006.
[43]
Avi Rosenfeld, Inon Zuckerman, Erel Segal-Halevi, Osnat Drein, and Sarit Kraus. Negochat: A chat-based negotiation agent. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '14, pages 525--532, Richland, SC, 2014. International Foundation for Autonomous Agents and Multiagent Systems.
[44]
Ariel Rubinstein. Perfect equilibrium in a bargaining model. Econometrica, 50(1):97--109, 1982.
[45]
S. Sadki and H. El Bakkali. An approach for privacy policies negotiation in mobile health-cloud environments. In Cloud Technologies and Applications (CloudTech), 2015 International Conference on, pages 1--6, June 2015.
[46]
Sarah Spiekermann. Online information search with electronic agents: drivers, impediments. and privacy issues, 2001. Zsfassung in dt. Sprache.
[47]
A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable and Secure Computing, 3(1):13--30, Jan 2006.
[48]
C. Stach and B. Mitschang. Privacy management for mobile platforms -- a review of concepts and approaches. In 2013 IEEE 14th International Conference on Mobile Data Management, volume 1, pages 305--313, 2013.
[49]
Jose M Such, Agustín Espinosa, and Ana García-Fornes. A survey of privacy in multi-agent systems. The Knowledge Engineering Review, 29(03):314--344, 2014.
[50]
Jose M. Such and Michael Rovatsos. Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst., 11(1):4:1--4:29, February 2016.
[51]
Salah-Eddine Tbahriti, Brahim Medjahed, Zaki Malik, Chirine Ghedira, and Michael Mrissa. Meerkat - A Dynamic Privacy Framework for Web Services. In 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, volume 1, pages 418--421. IEEE, aug 2011.
[52]
Janice Y Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2):254--268, 2011.
[53]
Hal R. Varian. Economic Aspects of Personal Privacy, pages 101--109. Springer US, Boston, MA, 2009.
[54]
D. D. Walker, E. G. Mercer, and K. E. Seamons. Or best offer: A privacy policy negotiation protocol. In Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on, pages 173--180, June 2008.
[55]
Jason Watson, Heather Richter Lipford, and Andrew Besmer. Mapping user preference to privacy default settings. ACM Trans. Comput.-Hum. Interact., 22(6):32:1--32:20, November 2015.
[56]
Martin L Weitzman. Optimal search for the best alternative. Econometrica: Journal of the Econometric Society, pages 641--654, 1979.
[57]
A Westin. Privacy on & off the internet: What consumers want. Technical report, Tech. Report for Privacy & American Business. Hackensack, NJ: Privacy & American Business, 2001.
[58]
Colin R. Williams, Valentin Robu, Enrico H. Gerding, and Nicholas R. Jennings. Iamhaggler: A negotiation agent for complex environments. In Takayuki Ito, Minjie Zhang, Valentin Robu, Shaheen Fatima, and Tokuro Matsuo, editors, New Trends in Agent-based Complex Automated Negotiations, Studies in Computational Intelligence, pages 151--158, Berlin, Heidelberg, 2012. Springer-Verlag.
[59]
A. Yassine and S. Shirmohammadi. An intelligent agent-based framework for privacy payoff negotiation in virtual environments. In Computational Intelligence in Virtual Environments, 2009. CIVE '09. IEEE Workshop on, pages 20--25, March 2009.
[60]
A. Yassine and S. Shirmohammadi. Measuring users' privacy payoff using intelligent agents. In 2009 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, pages 169--174, May 2009.
[61]
Abdulsalam Yassine and Shervin Shirmohammadi. Privacy and the market for private data: A negotiation model to capitalize on private data. In 2008 IEEE/ACS International Conference on Computer Systems and Applications, pages 669--678. IEEE, mar 2008.

Cited By

View all
  • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
  • (2022)Enabling personal consent in databasesProceedings of the VLDB Endowment10.14778/3489496.348951615:2(375-387)Online publication date: 4-Feb-2022
  • (2021)Dr.Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated WayProceedings of the ACM on Human-Computer Interaction10.1145/34796045:CSCW2(1-43)Online publication date: 18-Oct-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '17: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
May 2017
1914 pages

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 08 May 2017

Check for updates

Author Tags

  1. automated negotiation
  2. mobile apps
  3. negotiation agent
  4. negotiation cost
  5. partial offers
  6. permissions
  7. preference learning
  8. privacy

Qualifiers

  • Research-article

Funding Sources

  • EPSRC
  • ERA-Net Smart Grids Plus

Acceptance Rates

AAMAS '17 Paper Acceptance Rate 127 of 457 submissions, 28%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
  • (2022)Enabling personal consent in databasesProceedings of the VLDB Endowment10.14778/3489496.348951615:2(375-387)Online publication date: 4-Feb-2022
  • (2021)Dr.Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated WayProceedings of the ACM on Human-Computer Interaction10.1145/34796045:CSCW2(1-43)Online publication date: 18-Oct-2021
  • (2019)Optimal Value of Information Based Elicitation During NegotiationProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331699(242-250)Online publication date: 8-May-2019
  • (2019)Should I Agree?Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300745(1-13)Online publication date: 2-May-2019
  • (2018)Adaptive human-agent multi-issue bilateral negotiation using the Thomas-Kilmann conflict mode instrumentProceedings of the 22nd International Symposium on Distributed Simulation and Real Time Applications10.5555/3330299.3330325(204-211)Online publication date: 15-Oct-2018
  • (2018)Who Should Have Access to my Pointing Data?Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3234695.3239331(203-216)Online publication date: 8-Oct-2018
  • (2018)Guest Editors’ IntroductionACM Transactions on Internet Technology10.1145/317788418:3(1-4)Online publication date: 6-Mar-2018
  • (2017)The internet of thingsInteractions10.1145/314902524:6(26-33)Online publication date: 25-Oct-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media