SlideShare a Scribd company logo
1 of 25
COGNITIVE 2014 – Venice Italy
Towards Agent-based Data Privacy Engineering
Kato Mivule, D.Sc.
Computer Science Department
Bowie State University
Kato Mivule - Bowie State University Department of Computer Science
Engineering
Privacy
Data
Outline
• Introduction
• The Problem
• Contributions
• Methodology
• Results and Discussion
• Results
• Discussion
• Conclusion and Future work
• Conclusion
• Future work
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• To create a systematic framework that can be followed for the
data privacy engineering process. Could we have agents that
autonomously implement privacy?
• Given any original dataset X, a set of data privacy engineering
phases should be followed from start to completion in the
generation of a privatized dataset Y.
Contributions
• A proposed agent-based data privacy and utility engineering
framework, SIED.
• A proposed agent-based Privacy Parameter Mapping Heuristic.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• Data Privacy Engineering – embedding legal privacy
definitions in technology and governance, Kenny and Borking
(2002).
• Design intelligent autonomous data privacy agents.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Wooldridge (1997): Three essential considerations (i) Agent
Specifications, (ii) agent implementation, and lastly (iii) agent
validation.
• Wooldridge and Jennings (1999): Avoid common pitfall - the
tendency to offer generic architectures for intelligent agents.
• Jennings (2000): Agent based software engineering remains
complex and difficult, due to the interactions between different
components.
• Borking and Raab (2001): called for Privacy Enhancing
Technologies (PETs) from a legal perspective on technology.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Kenny and Borking (2002): “Privacy engineering” as
embedding privacy legal requirements into technological and
governance blueprints.
• Van Blarkom, Borking, and Olk (2003): PETs would be
helpful in tackling privacy threats caused by intelligent agents
that illegally disclose a user’s personal information.
• Léauté and Faltings (2009): proposed an agent based privacy
engineering solution using constraint satisfaction model by
mapping out privacy constraints in the domain.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Cavoukian (2011): outlined seven privacy by design principles
that included:
• (i) proactive, not reactive; preventative not remedial.
• (ii) engineering privacy as the default.
• (iii) privacy embedded into design.
• (iv) full privacy functionality by avoiding needless trade-offs.
• (v) end-to-end security and life cycle protection.
• (vi) visibility and transparency of privacy practices.
• (vii) respect for user privacy.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Such, Espinosa, and Garcia-Fornes (2012): Privacy violations
that autonomous agents engage include:
• (i) secondary use, such as profiling,
• (ii) identity theft
• (iii) spy agents
• (iv) unauthorized access
• (v) traffic analysis
• (vi) unauthorized dissemination of data.
• Such et.al., argued: agent based privacy solutions should be
incorporated in the design of information technology systems.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework
• SIED phases – Specifications, Implementation, Evaluation, and
Dissemination
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Implementation Phase:
Bowie State University Department of Computer Science
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Evaluation Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – Privacy Parameter Mapping Heuristic.
• Categorize parameters for effective fine-tuning.
•What parameters need adjustment in the data privacy process?
COGNITIVE 2014 – Venice Italy
CATEGORY 1
PARAMETERS
CATEGORY 2
PARAMETERS
CATEGORY 3
PARAMETERS
Data Utility Goal Parameters:
For example Accuracy, Currency,
and Completeness.
Data Privacy Algorithm Parameters:
Values k in k-anonymity, ε in Noise
addition and Differential privacy.
Application Parameters (e.g. Machine
Learning Classifier):
For example weak learners in
AdaBoost.
Parameter
Adjustment and
Fine-tuning
Trade-offs
Data Privacy and Utility
Preservation
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Experiment Results – Non-Interactive Differential Privacy (DP)
COGNITIVE 2014 – Venice Italy
Data Specifications and Requirements
• Used the Fisher Iris data set at the UCI
repository
• Contained 150 data points – multivariate
• Both numeric and categorical data items
• Applied vertical partitioning
• Applied data privacy to only numerical
data
• Applied data privacy to each vertical
partition
• Used differential privacy as SDC method
• Evaluated data utility using machine
learning as a gauge
• Publication of privatized data was non-
interactive mode
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy (DP) and Signal
Processing (Filtering)
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy – Non-filtered and
Filtered DP Classification Error
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• An abstract view of SIED, an agent-based data privacy
engineering framework has been presented.
• We believe that this a contribution to the privacy-by-design
challenge.
• A survey of related work on agent-based software engineering
and the influence on data privacy engineering, has been
presented.
• While SIED is proposed as a framework for agent-based data
privacy engineering, it could be generalized for other non-agent-
based data privacy processing as well.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• The subject of data privacy remains a challenge and more
research, design, implementation, and metrics is needed to
accommodate the ambiguous and fuzzy privacy requirements of
individuals and entities.
• We believe that intelligent agent-based architectures offer
optimism for data privacy solutions.
• For future works, we plan on expanding this study to take a
decomposition approach in dealing with the complexity of agent-
based data privacy engineering.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
References
[1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009.
[2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413.
[3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7.
[4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38.
[5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139.
[6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20.
[7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419.
[8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206.
[9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29.
[10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50.
[11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20.
[12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26.
[13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27.
[14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296.
[15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14.
[16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002.
[17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4.
[18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250.
[19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236.
[20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283.
[21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271.
[22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21.
[23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8.
[24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304.
[25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25.
[26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb.
[27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011.
[28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31.
[29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12.
[30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20.
[31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43.
[32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Thank You!
Questions?
Contact: kmivule@gmail.com
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science

More Related Content

What's hot

USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14
Chinmoy Ghorai
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Sven Wohlgemuth
 

What's hot (20)

Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography Techniques
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device
 
Multimedia mining research – an overview
Multimedia mining research – an overview  Multimedia mining research – an overview
Multimedia mining research – an overview
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 
CV-RPLiu-2014
CV-RPLiu-2014CV-RPLiu-2014
CV-RPLiu-2014
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
How to improve the statistical power of the 10-fold cross validation scheme i...
How to improve the statistical power of the 10-fold crossvalidation scheme i...How to improve the statistical power of the 10-fold crossvalidation scheme i...
How to improve the statistical power of the 10-fold cross validation scheme i...
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021
 
323462348
323462348323462348
323462348
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 

Viewers also liked

Diss defense
Diss defenseDiss defense
Diss defense
therob762
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10
Dr. Ed S. Turner III
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
Dr. Naomi Mangatu
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
neha47
 

Viewers also liked (10)

Diss defense
Diss defenseDiss defense
Diss defense
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10
 
Asim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defenseAsim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defense
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
defense_2
defense_2defense_2
defense_2
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense Presentation
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 

Similar to Kato Mivule - Towards Agent-based Data Privacy Engineering

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
Okehie Collins
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
butest
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Paul Fechtelkotter
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
najascj
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
Vinay Ms
 

Similar to Kato Mivule - Towards Agent-based Data Privacy Engineering (20)

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Introduction in IOT.pptx
Introduction in IOT.pptxIntroduction in IOT.pptx
Introduction in IOT.pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 

More from Kato Mivule

An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
Kato Mivule
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Kato Mivule
 

More from Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 

Recently uploaded

Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 

Recently uploaded (20)

BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 

Kato Mivule - Towards Agent-based Data Privacy Engineering

  • 1. COGNITIVE 2014 – Venice Italy Towards Agent-based Data Privacy Engineering Kato Mivule, D.Sc. Computer Science Department Bowie State University Kato Mivule - Bowie State University Department of Computer Science Engineering Privacy Data
  • 2. Outline • Introduction • The Problem • Contributions • Methodology • Results and Discussion • Results • Discussion • Conclusion and Future work • Conclusion • Future work COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 3. Motivation • To create a systematic framework that can be followed for the data privacy engineering process. Could we have agents that autonomously implement privacy? • Given any original dataset X, a set of data privacy engineering phases should be followed from start to completion in the generation of a privatized dataset Y. Contributions • A proposed agent-based data privacy and utility engineering framework, SIED. • A proposed agent-based Privacy Parameter Mapping Heuristic. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 4. Motivation • Data Privacy Engineering – embedding legal privacy definitions in technology and governance, Kenny and Borking (2002). • Design intelligent autonomous data privacy agents. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 5. Literature Review • Wooldridge (1997): Three essential considerations (i) Agent Specifications, (ii) agent implementation, and lastly (iii) agent validation. • Wooldridge and Jennings (1999): Avoid common pitfall - the tendency to offer generic architectures for intelligent agents. • Jennings (2000): Agent based software engineering remains complex and difficult, due to the interactions between different components. • Borking and Raab (2001): called for Privacy Enhancing Technologies (PETs) from a legal perspective on technology. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 6. Literature Review • Kenny and Borking (2002): “Privacy engineering” as embedding privacy legal requirements into technological and governance blueprints. • Van Blarkom, Borking, and Olk (2003): PETs would be helpful in tackling privacy threats caused by intelligent agents that illegally disclose a user’s personal information. • Léauté and Faltings (2009): proposed an agent based privacy engineering solution using constraint satisfaction model by mapping out privacy constraints in the domain. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 7. Literature Review • Cavoukian (2011): outlined seven privacy by design principles that included: • (i) proactive, not reactive; preventative not remedial. • (ii) engineering privacy as the default. • (iii) privacy embedded into design. • (iv) full privacy functionality by avoiding needless trade-offs. • (v) end-to-end security and life cycle protection. • (vi) visibility and transparency of privacy practices. • (vii) respect for user privacy. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 8. Literature Review • Such, Espinosa, and Garcia-Fornes (2012): Privacy violations that autonomous agents engage include: • (i) secondary use, such as profiling, • (ii) identity theft • (iii) spy agents • (iv) unauthorized access • (v) traffic analysis • (vi) unauthorized dissemination of data. • Such et.al., argued: agent based privacy solutions should be incorporated in the design of information technology systems. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 9. Methodology – The Proposed SIED Data Privacy Engineering Framework • SIED phases – Specifications, Implementation, Evaluation, and Dissemination COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 10. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 11. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 12. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 13. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 14. Methodology – The Proposed SIED Data Privacy Engineering Framework – Implementation Phase: Bowie State University Department of Computer Science COGNITIVE 2014 – Venice Italy Engineering Privacy Data
  • 15. Methodology – The Proposed SIED Data Privacy Engineering Framework – Evaluation Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 16. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 17. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 18. Methodology – Privacy Parameter Mapping Heuristic. • Categorize parameters for effective fine-tuning. •What parameters need adjustment in the data privacy process? COGNITIVE 2014 – Venice Italy CATEGORY 1 PARAMETERS CATEGORY 2 PARAMETERS CATEGORY 3 PARAMETERS Data Utility Goal Parameters: For example Accuracy, Currency, and Completeness. Data Privacy Algorithm Parameters: Values k in k-anonymity, ε in Noise addition and Differential privacy. Application Parameters (e.g. Machine Learning Classifier): For example weak learners in AdaBoost. Parameter Adjustment and Fine-tuning Trade-offs Data Privacy and Utility Preservation Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 19. Experiment Results – Non-Interactive Differential Privacy (DP) COGNITIVE 2014 – Venice Italy Data Specifications and Requirements • Used the Fisher Iris data set at the UCI repository • Contained 150 data points – multivariate • Both numeric and categorical data items • Applied vertical partitioning • Applied data privacy to only numerical data • Applied data privacy to each vertical partition • Used differential privacy as SDC method • Evaluated data utility using machine learning as a gauge • Publication of privatized data was non- interactive mode Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 20. Results – Non-Interactive Differential Privacy (DP) and Signal Processing (Filtering) COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 21. Results – Non-Interactive Differential Privacy – Non-filtered and Filtered DP Classification Error COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 22. Conclusion • An abstract view of SIED, an agent-based data privacy engineering framework has been presented. • We believe that this a contribution to the privacy-by-design challenge. • A survey of related work on agent-based software engineering and the influence on data privacy engineering, has been presented. • While SIED is proposed as a framework for agent-based data privacy engineering, it could be generalized for other non-agent- based data privacy processing as well. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 23. Conclusion • The subject of data privacy remains a challenge and more research, design, implementation, and metrics is needed to accommodate the ambiguous and fuzzy privacy requirements of individuals and entities. • We believe that intelligent agent-based architectures offer optimism for data privacy solutions. • For future works, we plan on expanding this study to take a decomposition approach in dealing with the complexity of agent- based data privacy engineering. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 24. References [1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009. [2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413. [3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7. [4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38. [5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139. [6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20. [7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419. [8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206. [9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29. [10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50. [11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20. [12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26. [13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27. [14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296. [15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14. [16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002. [17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4. [18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250. [19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236. [20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283. [21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271. [22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21. [23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8. [24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304. [25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25. [26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb. [27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011. [28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31. [29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12. [30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20. [31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43. [32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 25. Thank You! Questions? Contact: kmivule@gmail.com COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science