SlideShare a Scribd company logo
Personal Data Privacy Semantics in
Multi-Agent Systems Interactions
Davide Calvaresi • Michael Schumacher • Jean-Paul Calbimonte
University of Applied Sciences and Arts Western Switzerland (HES-SO)
International Conference on Practical Applications of Agents and Multi-Agent Systems – PAAMS 2020
October 2020
@jpcik
2
HES-SO:
University of Applied Sciences and Arts Western Switzerland
3
Motivation: Personal data protection
demographics diagnosis morbidities
mobile data
self-reported
Personal data
sensor data
Decentralizedhealthcare
Who owns the data?
Who manages the data?
Who grants access to the data?
Who can contribute to the data?
Who can transfer the data?
Who can process the data?
Complex compliance restrictions
Institutional boundaries
Participatory data collection
Decentralized decision-makingChallenges
4
What this paper is about
o personal data privacy interaction requirements
o design principles of privacy-aware agent interactions
o conceptual architecture
o multi-agent protocol specifications
o semantic information: purpose – recipient – processing - consent
decentralized agent-based data privacy
negotiation
coordination
enforcement
semantic
representations
privacy conditions/handling
A B
Next →
5
Use-case: digital rehabilitation
θ
request aggregated
sensor data
data access consent
request access
request access
accept
reject
motion
monitoring
sensors
knee rehabilitation exercises
track exercise and physical activity
Patient-centric data control?
Personal data reuse?
Data sharing negotiation?
6
Information needs
o timely access all collected data during the interventions?
o opt-out of specific processing/monitoring activities?
o establish restrictions on types of data to be collected/reused?
o trace the actions and data access of healthcare providers?
o limit read/write access to specific healthcare providers?
o delete or withdraw her data completely or partially?
o change consent conditions/restrictions on data handling purposes?
o be notified of risks/evidence of privacy breach or undesired activities?
Can the
subject …
7
Requirements
R1: Data handling actors
R2: Decentralized interactions
R3: Semantic data privacy modelling
R4: Interaction protocols
R5: Legal compliance
establish shared understanding of data handling actors:
data controllers, subjects, recipients
specify possible interactions among data handling actors
without a centralized entity governing their decisions.
rely on standard semantic models that represent data
handling purposes, processes, consent, privacy
follow a well-defined interaction pattern, specified as a set
of behaviors, allowing negotiation / collaboration
comply with the applicable legal
framework, e.g., GDPR
8
Requirements
R6: Verification
R7: Tracking
R8: Explainability
R9: Transparency
R10: Granularity
verify the compliance to regulations across institutional
boundaries
keep track of all interactions, reuse, access, processing,
and handling events
controllers expose explainable and understandable
interfaces for all data handling processes.
controllers timely communicate any event concerning data
privacy, such as risks, breaches, compromises, etc.
choose the granularity at which personal data
handling is performed
9
Design Principles
decentralized agents
Data autonomy
Goal setting
Policies
Consent conditions
Data quality
Anonymization
Negotiation protocols
Collaboration patterns
Data tracking petition
Data exclusion requests
semantic representation
knowledge
beliefs
goals
Privacy
specifications
Privacy ontologies
10
Decentralized Agents
Controllers
Subjects
Recipients
Processors
people, organizations, or authorities that govern and
decide about the purpose and processing of personal data
persons to which the data is related
people or entities to which the personal information
is disclosed
persons or entities that perform any processing of
the personal data on behalf of the controller
11
Decentralized Agents
Subject Subject
Processor
Recipient
consent
consent
Controller
analytics request
12
Shared semantic vocabularies
Processing
PersonalData
Handling
PersonalDataCategory
hasPersonalDataCategory
Purpose
LegalBasis
DataController
Recipient
DataSubject
TechnicalOrganisationalMeasure
hasRecipient
establishment of interactions among decentralized agents
common model for representing privacy data
Data Privacy Vocabulary (DPV): W3C Data Privacy Vocabularies and Control Community Group
https://www.w3.org/ns/dpv
13
Data privacy agent interactions
– Controller requests personal data (with consent) to a specific subject.
– Subject provides personal data (with a consent granted).
– Controller calls for personal data to a set of individuals represented by their subject agents.
– Subject selects only a certain purpose for data handling.
– Subject rejects request for data.
– Subject grants access to personal data only for a certain purpose.
– Subject/Controller customizes permissions and access rights.
– Controller tracks personal data reuse and processing.
– Subject deletes or withholds own personal data.
– Subject/controller verifies personal data use and policy
– Subject objects to data reuse or processing.
– Subject requests access to own personal data collected (and metadata)
– Controller notifies about data breaches or risk.
non-comprehensive minimum set of interactions:
14
Data privacy agent interactions
Controller Subject
request access
refuse
agree
failure
inform-done
inform-result
[refused]
[agreed and notification necessary]
[agreed]
consent
Controller Subject
Call-for-data
refuse
propose
inform-done
inform-result
reject-proposal
accept-proposal
failure
consent
15
Semantic representation of interactions
{
"prov:generatedAtTime": "2020-02-01T04:00:00.000Z",
"@id": "ex:callForActivityData",
"@graph": [
{ "@id": "ex:callForData1",
"ag:permormative": "ag:CallForProposals",
"ag:sender": "ex:controller1",
"ag:protocol": "ag:ContractNet",
"ag:ontology": "http://w3id.org/ns/dpv#",
"ag:content": "ex:consentPatient1"
}
]
}
Data request
through a bid
FIPA protocol
Proposed
consent
JSON-LD representation
16
Example: Data collection
ex:dataRequest a dpv:PersonalDataHandling ;
dpv:hasDataSubject ex:patient1 ;
dpv:hasPurpose [a dpv:AcacemicResearch] ;
dpv:hasProcessing [a dpv:Collect];
dpv:hasLegalBasis [a dpv:Consent];
dpv:hasDataController ex:hospital1;
dpv:haRecipient ex:physician3;
dpv:hasPersonalDataCategory [a dpv:PhysicalHealth];
dcterms:title "Personal Data Collection for clinical study ..."
.
patient subject
controller
17
Example: Consent
ex:consentPatient1 a dpv:Consent ;
dpv:hasDataSubject ex:patient1 ;
dpv:hasPurpose [a dpv:AcacemicResearch],
[a dpv:CommercialResearch],
[a dpv:CreatePersonalizedRecommendations] ;
dpv:hasProcessing [a dpv:Analyse];
dcterms:title "Consent for Health data analysis in a clinical study ..." ;
dpv:hasDataController ex:hospital1;
dpv:haRecipient ex:physiotherapist1;
dpv:hasPersonalDataCategory [a dpv:PhysicalHealth].
Consent
purposes
Data
recepient
18
Example: Processing
ex:dataAnalysis a dpv:Analysis ;
dpv:hasDataSubject ex:patient1 ;
prov:used ex:patientDataset1 ;
dcterms:title "Data Analysis activity for patient data ..." ;
prov:isAssociatedWith ex:dataScientist1;
prov:wasStartedAtTime "2020-01-11T04:00:00.000Z".
ex:analyticsResults a prov:Entity ;
prov:wasGeneratedBy ex:dataAnalysis;
prov:wasDerivedFrom ex:patientDataset1
19
Related work
20
Conclusions
semantic data models
A vision for decentralized personal data privacy interactions.
tackle current regulations such as the GDPR.
autonomy
decentralization
negotiation
interactions
multi-agent systems
DPV ontology
heterogeneity
privacy policies
consent
Future work
o Domain-specific vocabularies/ontologies that describe detailed data processing
conditions, purposes and data handling policies
o Development of multi-agent environments that implement the interactions,
deployable in mobile and sensing devices.
o Study and implementation of agent negotiation protocols for personal data privacy
workflows.
o Specification and validation of consent and policies for data privacy, checking for
compliance with regulations.
o The validation and evaluation of the proposed model, real environment
¿questions?
Jean-Paul Calbimonte
University of Applied Sciences and Arts Western Switzerland
HES-SO Valais-Wallis
@jpcik

More Related Content

DOCX
Scalable and secure of personal health records in cloud computing using attri...
PPTX
Developing a Healthcare Blockchain Solution
PPTX
Centrifuge Systems Overview
PDF
Blockchain- Transforming Healthcare Ecosystem
PDF
Patientory Blockchain Privacy, How is it Achieved?
PPTX
Knowing me, knowing you, knowing your disease
PDF
How Privacy in the Cloud Affects Organizations
PPTX
Data lake protection ft 3119 -ver1.0
Scalable and secure of personal health records in cloud computing using attri...
Developing a Healthcare Blockchain Solution
Centrifuge Systems Overview
Blockchain- Transforming Healthcare Ecosystem
Patientory Blockchain Privacy, How is it Achieved?
Knowing me, knowing you, knowing your disease
How Privacy in the Cloud Affects Organizations
Data lake protection ft 3119 -ver1.0

What's hot (20)

PPTX
Blockchain in Healthcare: An Overview
PDF
Blockchain for medical records
PPTX
Centrifuge Systems Overview 2 14
PPTX
A Little Security For Big Data
PDF
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
PDF
Digital Representation of Privacy Terms
PDF
Unstructured Data Fact Sheet
PPTX
Big data security challenges and recommendations!
PPTX
kpit ppt
PPT
Context Broker Introduction and Reference Architecure
PPTX
HealthBlock: A Secured Healthcare Data using Blockchain
PDF
Blockchain Technology for Patients Medical Records
PDF
Role Of Blockchain Technology In Healthcare Sector
PDF
Privacy preserving detection of sensitive data exposure
PDF
Who should I trust with my data?
PDF
Protecting Personal Data in a IoT Network with UMA
PDF
Blockchain & Healthcare | Strategy, Implications and Implementation
PDF
Blockchain in Healthcare
PPTX
Security bigdata
PDF
11 ways blockchain can improve the healthcare industry
Blockchain in Healthcare: An Overview
Blockchain for medical records
Centrifuge Systems Overview 2 14
A Little Security For Big Data
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...
Digital Representation of Privacy Terms
Unstructured Data Fact Sheet
Big data security challenges and recommendations!
kpit ppt
Context Broker Introduction and Reference Architecure
HealthBlock: A Secured Healthcare Data using Blockchain
Blockchain Technology for Patients Medical Records
Role Of Blockchain Technology In Healthcare Sector
Privacy preserving detection of sensitive data exposure
Who should I trust with my data?
Protecting Personal Data in a IoT Network with UMA
Blockchain & Healthcare | Strategy, Implications and Implementation
Blockchain in Healthcare
Security bigdata
11 ways blockchain can improve the healthcare industry
Ad

Similar to Personal Data Privacy Semantics in Multi-Agent Systems Interactions (20)

PPTX
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
PPTX
Privacy experience in Plone and other open source CMS
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PPTX
Ethics and Politics of Big Data
PPTX
Gdpr brief and controls ver2.0
PDF
DAMA Ireland - GDPR
PDF
Data security and privacy
PDF
Protecting Personal Data in a IoT Network with UMA
PDF
Setting the right GDPR priorities
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PDF
Accenture-Informed-Consent-Data-Motion
PPTX
GDPR: Protecting Your Data
PDF
50 Most Asked Interview Questions for DPO
PDF
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
PDF
50 Asked Interview Questions for Data Protection Officer
PDF
Top Interview Questions for Data Protection Officer (DPO).pdf
PDF
Ready to Become a Data Protection Officer (DPO)?
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
Vuzion Love Cloud GDPR Event
PPTX
Are You GDPR Ready?
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
Privacy experience in Plone and other open source CMS
The Rise of Data Ethics and Security - AIDI Webinar
Ethics and Politics of Big Data
Gdpr brief and controls ver2.0
DAMA Ireland - GDPR
Data security and privacy
Protecting Personal Data in a IoT Network with UMA
Setting the right GDPR priorities
Keep Calm and Comply: 3 Keys to GDPR Success
Accenture-Informed-Consent-Data-Motion
GDPR: Protecting Your Data
50 Most Asked Interview Questions for DPO
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Asked Interview Questions for Data Protection Officer
Top Interview Questions for Data Protection Officer (DPO).pdf
Ready to Become a Data Protection Officer (DPO)?
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Vuzion Love Cloud GDPR Event
Are You GDPR Ready?
Ad

More from Jean-Paul Calbimonte (20)

PDF
Towards Collaborative Creativity in Persuasive Multi-agent Systems
PDF
A Platform for Difficulty Assessment and Recommendation of Hiking Trails
PDF
Stream reasoning agents
PPTX
Decentralized Management of Patient Profiles and Trajectories through Semanti...
PPTX
RDF data validation 2017 SHACL
PPTX
SanTour: Personalized Recommendation of Hiking Trails to Health Pro files
PPTX
Multi-agent interactions on the Web through Linked Data Notifications
PPTX
The MedRed Ontology for Representing Clinical Data Acquisition Metadata
PPTX
Linked Data Notifications for RDF Streams
PPTX
Fundamentos de Scala (Scala Basics) (español) Catecbol
PPTX
Connecting Stream Reasoners on the Web
PPTX
RDF Stream Processing Tutorial: RSP implementations
PPTX
Query Rewriting in RDF Stream Processing
PPTX
Toward Semantic Sensor Data Archives on the Web
PPTX
Detection of hypoglycemic events through wearable sensors
PPTX
RDF Stream Processing and the role of Semantics
PPTX
The Schema Editor of OpenIoT for Semantic Sensor Networks
PPTX
Scala Programming for Semantic Web Developers ESWC Semdev2015
PPTX
Streams of RDF Events Derive2015
PPTX
RDF Stream Processing: Let's React
Towards Collaborative Creativity in Persuasive Multi-agent Systems
A Platform for Difficulty Assessment and Recommendation of Hiking Trails
Stream reasoning agents
Decentralized Management of Patient Profiles and Trajectories through Semanti...
RDF data validation 2017 SHACL
SanTour: Personalized Recommendation of Hiking Trails to Health Pro files
Multi-agent interactions on the Web through Linked Data Notifications
The MedRed Ontology for Representing Clinical Data Acquisition Metadata
Linked Data Notifications for RDF Streams
Fundamentos de Scala (Scala Basics) (español) Catecbol
Connecting Stream Reasoners on the Web
RDF Stream Processing Tutorial: RSP implementations
Query Rewriting in RDF Stream Processing
Toward Semantic Sensor Data Archives on the Web
Detection of hypoglycemic events through wearable sensors
RDF Stream Processing and the role of Semantics
The Schema Editor of OpenIoT for Semantic Sensor Networks
Scala Programming for Semantic Web Developers ESWC Semdev2015
Streams of RDF Events Derive2015
RDF Stream Processing: Let's React

Recently uploaded (20)

PPTX
Introduction to Information and Communication Technology
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
DOCX
Unit-3 cyber security network security of internet system
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
tcp ip networks nd ip layering assotred slides
Introduction to Information and Communication Technology
SAP Ariba Sourcing PPT for learning material
Power Point - Lesson 3_2.pptx grad school presentation
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
The Internet -By the Numbers, Sri Lanka Edition
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
WebRTC in SignalWire - troubleshooting media negotiation
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Unit-3 cyber security network security of internet system
Job_Card_System_Styled_lorem_ipsum_.pptx
Sims 4 Historia para lo sims 4 para jugar
tcp ip networks nd ip layering assotred slides

Personal Data Privacy Semantics in Multi-Agent Systems Interactions

  • 1. Personal Data Privacy Semantics in Multi-Agent Systems Interactions Davide Calvaresi • Michael Schumacher • Jean-Paul Calbimonte University of Applied Sciences and Arts Western Switzerland (HES-SO) International Conference on Practical Applications of Agents and Multi-Agent Systems – PAAMS 2020 October 2020 @jpcik
  • 2. 2 HES-SO: University of Applied Sciences and Arts Western Switzerland
  • 3. 3 Motivation: Personal data protection demographics diagnosis morbidities mobile data self-reported Personal data sensor data Decentralizedhealthcare Who owns the data? Who manages the data? Who grants access to the data? Who can contribute to the data? Who can transfer the data? Who can process the data? Complex compliance restrictions Institutional boundaries Participatory data collection Decentralized decision-makingChallenges
  • 4. 4 What this paper is about o personal data privacy interaction requirements o design principles of privacy-aware agent interactions o conceptual architecture o multi-agent protocol specifications o semantic information: purpose – recipient – processing - consent decentralized agent-based data privacy negotiation coordination enforcement semantic representations privacy conditions/handling A B Next →
  • 5. 5 Use-case: digital rehabilitation θ request aggregated sensor data data access consent request access request access accept reject motion monitoring sensors knee rehabilitation exercises track exercise and physical activity Patient-centric data control? Personal data reuse? Data sharing negotiation?
  • 6. 6 Information needs o timely access all collected data during the interventions? o opt-out of specific processing/monitoring activities? o establish restrictions on types of data to be collected/reused? o trace the actions and data access of healthcare providers? o limit read/write access to specific healthcare providers? o delete or withdraw her data completely or partially? o change consent conditions/restrictions on data handling purposes? o be notified of risks/evidence of privacy breach or undesired activities? Can the subject …
  • 7. 7 Requirements R1: Data handling actors R2: Decentralized interactions R3: Semantic data privacy modelling R4: Interaction protocols R5: Legal compliance establish shared understanding of data handling actors: data controllers, subjects, recipients specify possible interactions among data handling actors without a centralized entity governing their decisions. rely on standard semantic models that represent data handling purposes, processes, consent, privacy follow a well-defined interaction pattern, specified as a set of behaviors, allowing negotiation / collaboration comply with the applicable legal framework, e.g., GDPR
  • 8. 8 Requirements R6: Verification R7: Tracking R8: Explainability R9: Transparency R10: Granularity verify the compliance to regulations across institutional boundaries keep track of all interactions, reuse, access, processing, and handling events controllers expose explainable and understandable interfaces for all data handling processes. controllers timely communicate any event concerning data privacy, such as risks, breaches, compromises, etc. choose the granularity at which personal data handling is performed
  • 9. 9 Design Principles decentralized agents Data autonomy Goal setting Policies Consent conditions Data quality Anonymization Negotiation protocols Collaboration patterns Data tracking petition Data exclusion requests semantic representation knowledge beliefs goals Privacy specifications Privacy ontologies
  • 10. 10 Decentralized Agents Controllers Subjects Recipients Processors people, organizations, or authorities that govern and decide about the purpose and processing of personal data persons to which the data is related people or entities to which the personal information is disclosed persons or entities that perform any processing of the personal data on behalf of the controller
  • 12. 12 Shared semantic vocabularies Processing PersonalData Handling PersonalDataCategory hasPersonalDataCategory Purpose LegalBasis DataController Recipient DataSubject TechnicalOrganisationalMeasure hasRecipient establishment of interactions among decentralized agents common model for representing privacy data Data Privacy Vocabulary (DPV): W3C Data Privacy Vocabularies and Control Community Group https://www.w3.org/ns/dpv
  • 13. 13 Data privacy agent interactions – Controller requests personal data (with consent) to a specific subject. – Subject provides personal data (with a consent granted). – Controller calls for personal data to a set of individuals represented by their subject agents. – Subject selects only a certain purpose for data handling. – Subject rejects request for data. – Subject grants access to personal data only for a certain purpose. – Subject/Controller customizes permissions and access rights. – Controller tracks personal data reuse and processing. – Subject deletes or withholds own personal data. – Subject/controller verifies personal data use and policy – Subject objects to data reuse or processing. – Subject requests access to own personal data collected (and metadata) – Controller notifies about data breaches or risk. non-comprehensive minimum set of interactions:
  • 14. 14 Data privacy agent interactions Controller Subject request access refuse agree failure inform-done inform-result [refused] [agreed and notification necessary] [agreed] consent Controller Subject Call-for-data refuse propose inform-done inform-result reject-proposal accept-proposal failure consent
  • 15. 15 Semantic representation of interactions { "prov:generatedAtTime": "2020-02-01T04:00:00.000Z", "@id": "ex:callForActivityData", "@graph": [ { "@id": "ex:callForData1", "ag:permormative": "ag:CallForProposals", "ag:sender": "ex:controller1", "ag:protocol": "ag:ContractNet", "ag:ontology": "http://w3id.org/ns/dpv#", "ag:content": "ex:consentPatient1" } ] } Data request through a bid FIPA protocol Proposed consent JSON-LD representation
  • 16. 16 Example: Data collection ex:dataRequest a dpv:PersonalDataHandling ; dpv:hasDataSubject ex:patient1 ; dpv:hasPurpose [a dpv:AcacemicResearch] ; dpv:hasProcessing [a dpv:Collect]; dpv:hasLegalBasis [a dpv:Consent]; dpv:hasDataController ex:hospital1; dpv:haRecipient ex:physician3; dpv:hasPersonalDataCategory [a dpv:PhysicalHealth]; dcterms:title "Personal Data Collection for clinical study ..." . patient subject controller
  • 17. 17 Example: Consent ex:consentPatient1 a dpv:Consent ; dpv:hasDataSubject ex:patient1 ; dpv:hasPurpose [a dpv:AcacemicResearch], [a dpv:CommercialResearch], [a dpv:CreatePersonalizedRecommendations] ; dpv:hasProcessing [a dpv:Analyse]; dcterms:title "Consent for Health data analysis in a clinical study ..." ; dpv:hasDataController ex:hospital1; dpv:haRecipient ex:physiotherapist1; dpv:hasPersonalDataCategory [a dpv:PhysicalHealth]. Consent purposes Data recepient
  • 18. 18 Example: Processing ex:dataAnalysis a dpv:Analysis ; dpv:hasDataSubject ex:patient1 ; prov:used ex:patientDataset1 ; dcterms:title "Data Analysis activity for patient data ..." ; prov:isAssociatedWith ex:dataScientist1; prov:wasStartedAtTime "2020-01-11T04:00:00.000Z". ex:analyticsResults a prov:Entity ; prov:wasGeneratedBy ex:dataAnalysis; prov:wasDerivedFrom ex:patientDataset1
  • 20. 20 Conclusions semantic data models A vision for decentralized personal data privacy interactions. tackle current regulations such as the GDPR. autonomy decentralization negotiation interactions multi-agent systems DPV ontology heterogeneity privacy policies consent
  • 21. Future work o Domain-specific vocabularies/ontologies that describe detailed data processing conditions, purposes and data handling policies o Development of multi-agent environments that implement the interactions, deployable in mobile and sensing devices. o Study and implementation of agent negotiation protocols for personal data privacy workflows. o Specification and validation of consent and policies for data privacy, checking for compliance with regulations. o The validation and evaluation of the proposed model, real environment
  • 22. ¿questions? Jean-Paul Calbimonte University of Applied Sciences and Arts Western Switzerland HES-SO Valais-Wallis @jpcik