Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy

Published: 14 September 2021 Publication History

Abstract

Privacy is the right of individuals to keep personal information to themselves. When individuals use online systems, they should be given the right to decide what information they would like to share and what to keep private. When a piece of information pertains only to a single individual, preserving privacy is possible by providing the right access options to the user. However, when a piece of information pertains to multiple individuals, such as a picture of a group of friends or a collaboratively edited document, deciding how to share this information and with whom is challenging. The problem becomes more difficult when the individuals who are affected by the information have different, possibly conflicting privacy constraints. Resolving this problem requires a mechanism that takes into account the relevant individuals’ concerns to decide on the privacy configuration of information. Because these decisions need to be made frequently (i.e., per each piece of shared content), the mechanism should be automated. This article presents a personal assistant to help end-users with managing the privacy of their content. When some content that belongs to multiple users is about to be shared, the personal assistants of the users employ an auction-based privacy mechanism to regulate the privacy of the content. To do so, each personal assistant learns the preferences of its user over time and produces bids accordingly. Our proposed personal assistant is capable of assisting users with different personas and thus ensures that people benefit from it as they need it. Our evaluations over multiagent simulations with online social network content show that our proposed personal assistant enables privacy-respecting content sharing.

References

[1]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509–514.
[2]
Nirav Ajmeri, Hui Guo, Pradeep K. Murukannaiah, and Munindar P. Singh. 2018. Robust norm emergence by revealing and reasoning about context: Socially intelligent agents for enhancing privacy. In Proceedings of the International Joint Conference on AI (IJCAI’18). 22–34.
[3]
Nirav Ajmeri, Hui Guo, Pradeep K. Murukannaiah, and Munindar P. Singh. 2020. Elessar: Ethics in norm-aware agents. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 16–24.
[4]
Davide A. Albertini, Barbara Carminati, and Elena Ferrari. 2016. Privacy settings recommender for online social network. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC’16). 514–521.
[5]
Leila Bahri, Barbara Carminati, and Elena Ferrari. 2018. Decentralized privacy preserving services for online social networks. Online Social Networks and Media 6 (2018), 18–25.
[6]
Andrew G. Barto and Sridhar Mahadevan. 2003. Recent advances in hierarchical reinforcement learning. Discrete Event Dynamic Systems 13, 4 (Oct. 2003), 341–379.
[7]
Elisa Bertino and Elena Ferrari. 2018. Big Data Security and Privacy. Springer International Publishing, Cham, 425–439.
[8]
Gul Calikli, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine, and Bashar Nuseibeh. 2016. Privacy dynamics: Learning privacy norms for social software. In Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’16). ACM, 47–56.
[9]
Edward Clarke. 1971. Multipart pricing of public goods. Public Choice 11, 1 (1971), 17–33.
[10]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the design of a personalized privacy assistant for the internet of things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20). Association for Computing Machinery, New York, NY, 1–13.
[11]
Carlos Diuk, Andre Cohen, and Michael L. Littman. 2008. An object-oriented representation for efficient reinforcement learning. In Proceedings of the 25th International Conference on Machine Learning (ICML’08). ACM, 240–247.
[12]
Jean-Baptist Du Prel, Gerhard Hommel, Bernd Röhrig, and Maria Blettner. 2009. Confidence interval or p-value?: Part 4 of a series on evaluation of scientific publications. Deutsches Ärzteblatt International 106, 19 (2009), 335.
[13]
Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy personas: Clustering users via attitudes and behaviors toward security practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 5228–5239.
[14]
Eithan Ephrati and Jeffrey S. Rosenschein. 1991. The Clarke tax as a consensus mechanism among automated agents. In Proceedings of the 9th National Conference on Artificial Intelligence - Volume 1 (AAAI’91). AAAI Press, 173–178.
[15]
Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, 351–360.
[16]
R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh. 2017. SoSharP: Recommending sharing policies in multiuser privacy scenarios. IEEE Internet Computing 21, 6 (Nov. 2017), 28–36.
[17]
Philip W. L. Fong. 2011. Relationship-based access control: Protection model and policy language. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY’11). ACM, 191–202.
[18]
Seda Gurses, Carmela Troncoso, and Claudia Diaz. 2011. Engineering privacy by design. In Computers, Privacy & Data Protection. 25 pages.
[19]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (July 2013), 1614–1627.
[20]
Dilara Kekulluoglu, Nadin Kokciyan, and Pınar Yolum. 2018. Preserving privacy as social responsibility in online social networks. ACM Transactions on Internet Technology 18, 4, Article 42 (April 2018), 22 pages.
[21]
Jon Kleinberg, Jens Ludwig, Sendhil Mullainathan, and Ashesh Rambachan. 2018. Algorithmic fairness. In AEA Papers and Proceedings, Vol.  108. 22–27.
[22]
Peter Klemperer, Yuan Liang, Michelle Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael Reiter. 2012. Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’12). ACM, 377–386.
[23]
Nadin Kökciyan, Nefise Yaglikci, and Pınar Yolum. 2017. An argumentation approach for resolving privacy disputes in online social networks. ACM Transactions on Internet Technology 17, 3, Article 27 (June 2017), 22 pages.
[24]
Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: A survey of Westin’s studies. 2005. Available as ISRI Technical Report CMU-ISRI-05-138 (2005).
[25]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’11). ACM, 3217–3226.
[26]
Marc Langheinrich. 2001. Privacy by design—Principles of privacy-aware ubiquitous systems. In Ubicomp 2001: Ubiquitous Computing, Gregory D. Abowd, Barry Brumitt, and Steven Shafer (Eds.). 273–291.
[27]
Francesca Mosca. 2020. Value-aligned and explainable agents for collective decision making: Privacy application. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 2199–2200.
[28]
Federica Paci, Anna Squicciarini, and Nicola Zannone. 2018. Survey on access control for community-centered collaborative systems. Computing Surveys 51, 1, Article 6 (Jan. 2018), 38 pages.
[29]
Sarah Spiekermann and Lorrie Faith Cranor. 2009. Engineering privacy. IEEE Transactions on Software Engineering 35, 1 (Jan. 2009), 67–82.
[30]
Anna C. Squicciarini, Cornelia Caragea, and Rahul Balakavi. 2017. Toward automated online photo privacy. ACM Transactions on the Web 11, 1, Article 2 (April 2017), 29 pages.
[31]
Anna C. Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Transactions on Knowledge and Data Engineering 27, 1 (Jan. 2015), 193–206.
[32]
Anna C. Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, 521–530.
[33]
Anna C. Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3p: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM conference on Hypertext and Hypermedia. 261–270.
[34]
Jose M. Such and Natalia Criado. 2016. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering 28, 7 (July 2016), 1851–1863.
[35]
Jose M. Such and Natalia Criado. 2018. Multiparty privacy in social media. Communications of the ACM 61, 8 (July 2018), 74–81.
[36]
Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 1, Article 4 (Feb. 2016), 29 pages.
[37]
Richard S. Sutton and Andrew G. Barto. 2018. Reinforcement Learning: An Introduction. MIT Press.
[38]
Ming Tan. 1993. Multi-agent reinforcement learning: Independent vs. cooperative agents. In Proceedings of the 10th International Conference on Machine Learning. Morgan Kaufmann, 330–337.
[39]
Onuralp Ulusoy and Pınar Yolum. 2018. PANO: Privacy auctioning for online social networks. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS’18). 2103–2105.
[40]
Onuralp Ulusoy and Pınar Yolum. 2020. Agents for preserving privacy: Learning and decision making collaboratively. In Multi-Agent Systems and Agreement Technologies, Nick Bassiliades, Georgios Chalkiadakis, and Dave de Jonge (Eds.). Springer International Publishing, 116–131.
[41]
Onuralp Ulusoy and Pınar Yolum. 2020. Collaborative privacy management with auctioning mechanisms. In Advances in Automated Negotiations. Springer Singapore, Singapore, 45–62.
[42]
Onuralp Ulusoy and Pınar Yolum. 2020. Norm-based access control. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20). Association for Computing Machinery, New York, NY, 35–46.
[43]
M. Vanetti, E. Binaghi, E. Ferrari, B. Carminati, and M. Carullo. 2013. A system to filter unwanted messages from OSN user walls. IEEE Transactions on Knowledge and Data Engineering 25, 2 (Feb. 2013), 285–297.
[44]
Piotr A. Woźniak, Edward J. Gorzelańczyk, and Janusz A. Murakowski. 1995. Two components of long-term memory. Acta Neurobiologiae Experimentalis 55, 4 (1995), 301—305.
[45]
Haoti Zhong, Anna C. Squicciarini, and David Miller. 2018. Toward automated multiparty privacy conflict detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18). ACM, New York, NY, 1811–1814.

Cited By

View all
  • (2024)Safeguard Privacy for Minimal Data Collection with Trustworthy Autonomous AgentsProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663060(1966-1974)Online publication date: 6-May-2024
  • (2024)Multi-user Norm ConsensusProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663029(1683-1691)Online publication date: 6-May-2024
  • (2023)Can We Explain Privacy?IEEE Internet Computing10.1109/MIC.2023.327076827:4(75-80)Online publication date: 1-Jul-2023
  • Show More Cited By

Index Terms

  1. PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 22, Issue 1
    February 2022
    717 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3483347
    • Editor:
    • Ling Liu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 September 2021
    Accepted: 01 June 2021
    Revised: 01 May 2021
    Received: 01 July 2020
    Published in TOIT Volume 22, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Autonomous agents
    2. online social networks
    3. privacy
    4. reinforcement learning

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • Hybrid Intelligence Center
    • Dutch Ministry of Education, Culture and Science through the Netherlands Organisation for Scientific Research

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)75
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Safeguard Privacy for Minimal Data Collection with Trustworthy Autonomous AgentsProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663060(1966-1974)Online publication date: 6-May-2024
    • (2024)Multi-user Norm ConsensusProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663029(1683-1691)Online publication date: 6-May-2024
    • (2023)Can We Explain Privacy?IEEE Internet Computing10.1109/MIC.2023.327076827:4(75-80)Online publication date: 1-Jul-2023
    • (2023)Systematic review on privacy categorisationComputer Science Review10.1016/j.cosrev.2023.10057449:COnline publication date: 1-Aug-2023
    • (2023)PACCART: Reinforcing Trust in Multiuser Privacy Agreement SystemsCoordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XVI10.1007/978-3-031-49133-7_1(3-20)Online publication date: 29-May-2023
    • (2022)Automated privacy negotiations with preference uncertaintyAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09579-136:2Online publication date: 1-Oct-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media