IEEE Computational Intelligence Magazine - November 2019 - 74

features multiple stand-alone agents that
execute intelligence modeling collaboration without coordination (e.g. swarm
intelligence), but it might also turn into
competition. It is important to note that
additional combinations of such system's models are possible, especially
when they need to meet specific case
studies' specifications.
In today's modern industrial systems,
the intelligence information exchange is
left to application's implementation,
which applies to all the previously mentioned models. For example, when the
learnings of one node is propagated to all
the others in a cooperative model, or
when a central entity issues intelligence
functions to the edges of the system, it is
performed by applications own mechanisms. Also, in the stand-alone case, the
intelligent function's update and configuration at on-boarding time, or during its
operative lifetime, are also handled by
application's implementations. Currently,
in the industrial world, there is no clear
dominant framework or standard that
enables intelligence distribution; however,
there have been attempts in this direction.
For example, the Agent Communication
Language (ACL) from the Foundation
for Intelligent Physical Agents (FIPA)
model was defined as a protocol for communication in multi-agent systems [21].
C. Intelligence Provisioning
Handshake

Intelligence's own nature and sensitivity
requires more protection and handling
care than, for example, displaying a web
page. For intelligence, confidentiality
and accessibility are the main concerns,
therefore a more generic concept of privacy must be accounted for as well. Data
sources are very valuable by themselves,
not only because of the cost of acquiring
high quality training data, but also for
their significance in a larger context and
in conjunction with correlations. For
example, the information related to one
car accident may not be of great concern
for a car manufacturer, but a collection
of data referring to all accidents involving one of their models might be.
Machine learning algorithms' task is
often finding correlations or models that

74

can be used to make intelligent decisions.
The resulting inferences may be of the
same sensitive nature or even more than
the data sources used by the intelligent
functions. Today, depending on the existing regulatory framework, information
provided or generated by applications
could be exchanged between service
providers and applications with a large
diversity range of detail.
This information flow can be secured
through terms-of-use agreements that
give application users little or no information how the collected data is being
used. Also, these agreements often do not
provide ways for the users to restrict or
discriminate when, what, and with
whom information can be shared. The
user's alternative could be just to quit or
abandon the services, but in the case of
very market dominant applications, it
becomes difficult for users to find suitable fits for their needs. For data sets
of high sensitivities such as customer
records, intelligence service users require
full data privacy coverage even if the data
is processed outside of their premises or
devices. This requirement implies that
intelligence providers should be able to
install machine learning algorithms
without needing to know the actual values utilized as input. This process can be
achieved with measures such as homomorphic encryption [22] or secure multiparty computations [23].
The intelligence providers may be
also concerned about the confidentiality
of the algorithms used from their intelligence harvesting, both from the perspectives of learning processes setup and
recall phase parameters. Providers often
wish to protect their internal knowledge
as well as their research and development investments from intelligence copy
attempts or unauthorized cloning. This
issue becomes even more difficult to
address when the attacks use MI to
clone the knowledge [24], [25] and to
put in place relevant protections is
another area requiring more research.
1) Intelligence Request and
Capabilities Exchange
Configuring and managing a D-MI
requires high flexibility to address the

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | NOVEMBER 2019

existence of multiple types of devices,
scenarios, services, and topologies of
connectivity. Such flexibility is necessary
from the very starting point when intelligence is first being requested. An initial
exchange of capabilities and relevant
characteristics between the target device
and the intelligence providers allows
providers to assess what type of algorithms and intelligence setup are proper
and relevant for the device according to
the application layer's expected services.
During this exchange, the provider can
evaluate if such provisioning for the
requested intelligence on the target
device is feasible or supported. The re quest process involves negotiation
of data sharing policies and may also
include charging aspects of the intelligence and data provisioning in any
direction. The request can be done
directly to an Intelligence Provider or
through a mediator entity such as an
Intelligence Market implementation.
The market may use part of the in formation contained in the request to
match the intelligence needs requested
to the capabilities and services offered
by the Intelligence Providers available in
the market. This process of requesting
the intelligence, exchanging capabilities,
sharing policies and charging policies
comprises an Intelligence Handshake.
Figure 8 displays an example of
how different ecosystem entities interact
amongst each other in order to enable
intelligence provisioning. The different
procedures are grouped according to
some of the distinct phases of the MI
LCM as defined in Figure 2.
2) Sharing Policies
Sharing policies include what data can
be shared and how, which services can
access which data, and what data requires
additional anonymization. Instead of
being solely left to the parties involved,
data sharing polices should be enforceable by protocols and processes introduced to set up the intelligence services.
Otherwise, there is no warranty that a
change of terms of service agreements
would retroactively affect data exchanged
under different agreed conditions. Profiles can be provisioned in multiple ways



IEEE Computational Intelligence Magazine - November 2019

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2019

Contents
IEEE Computational Intelligence Magazine - November 2019 - Cover1
IEEE Computational Intelligence Magazine - November 2019 - Cover2
IEEE Computational Intelligence Magazine - November 2019 - Contents
IEEE Computational Intelligence Magazine - November 2019 - 2
IEEE Computational Intelligence Magazine - November 2019 - 3
IEEE Computational Intelligence Magazine - November 2019 - 4
IEEE Computational Intelligence Magazine - November 2019 - 5
IEEE Computational Intelligence Magazine - November 2019 - 6
IEEE Computational Intelligence Magazine - November 2019 - 7
IEEE Computational Intelligence Magazine - November 2019 - 8
IEEE Computational Intelligence Magazine - November 2019 - 9
IEEE Computational Intelligence Magazine - November 2019 - 10
IEEE Computational Intelligence Magazine - November 2019 - 11
IEEE Computational Intelligence Magazine - November 2019 - 12
IEEE Computational Intelligence Magazine - November 2019 - 13
IEEE Computational Intelligence Magazine - November 2019 - 14
IEEE Computational Intelligence Magazine - November 2019 - 15
IEEE Computational Intelligence Magazine - November 2019 - 16
IEEE Computational Intelligence Magazine - November 2019 - 17
IEEE Computational Intelligence Magazine - November 2019 - 18
IEEE Computational Intelligence Magazine - November 2019 - 19
IEEE Computational Intelligence Magazine - November 2019 - 20
IEEE Computational Intelligence Magazine - November 2019 - 21
IEEE Computational Intelligence Magazine - November 2019 - 22
IEEE Computational Intelligence Magazine - November 2019 - 23
IEEE Computational Intelligence Magazine - November 2019 - 24
IEEE Computational Intelligence Magazine - November 2019 - 25
IEEE Computational Intelligence Magazine - November 2019 - 26
IEEE Computational Intelligence Magazine - November 2019 - 27
IEEE Computational Intelligence Magazine - November 2019 - 28
IEEE Computational Intelligence Magazine - November 2019 - 29
IEEE Computational Intelligence Magazine - November 2019 - 30
IEEE Computational Intelligence Magazine - November 2019 - 31
IEEE Computational Intelligence Magazine - November 2019 - 32
IEEE Computational Intelligence Magazine - November 2019 - 33
IEEE Computational Intelligence Magazine - November 2019 - 34
IEEE Computational Intelligence Magazine - November 2019 - 35
IEEE Computational Intelligence Magazine - November 2019 - 36
IEEE Computational Intelligence Magazine - November 2019 - 37
IEEE Computational Intelligence Magazine - November 2019 - 38
IEEE Computational Intelligence Magazine - November 2019 - 39
IEEE Computational Intelligence Magazine - November 2019 - 40
IEEE Computational Intelligence Magazine - November 2019 - 41
IEEE Computational Intelligence Magazine - November 2019 - 42
IEEE Computational Intelligence Magazine - November 2019 - 43
IEEE Computational Intelligence Magazine - November 2019 - 44
IEEE Computational Intelligence Magazine - November 2019 - 45
IEEE Computational Intelligence Magazine - November 2019 - 46
IEEE Computational Intelligence Magazine - November 2019 - 47
IEEE Computational Intelligence Magazine - November 2019 - 48
IEEE Computational Intelligence Magazine - November 2019 - 49
IEEE Computational Intelligence Magazine - November 2019 - 50
IEEE Computational Intelligence Magazine - November 2019 - 51
IEEE Computational Intelligence Magazine - November 2019 - 52
IEEE Computational Intelligence Magazine - November 2019 - 53
IEEE Computational Intelligence Magazine - November 2019 - 54
IEEE Computational Intelligence Magazine - November 2019 - 55
IEEE Computational Intelligence Magazine - November 2019 - 56
IEEE Computational Intelligence Magazine - November 2019 - 57
IEEE Computational Intelligence Magazine - November 2019 - 58
IEEE Computational Intelligence Magazine - November 2019 - 59
IEEE Computational Intelligence Magazine - November 2019 - 60
IEEE Computational Intelligence Magazine - November 2019 - 61
IEEE Computational Intelligence Magazine - November 2019 - 62
IEEE Computational Intelligence Magazine - November 2019 - 63
IEEE Computational Intelligence Magazine - November 2019 - 64
IEEE Computational Intelligence Magazine - November 2019 - 65
IEEE Computational Intelligence Magazine - November 2019 - 66
IEEE Computational Intelligence Magazine - November 2019 - 67
IEEE Computational Intelligence Magazine - November 2019 - 68
IEEE Computational Intelligence Magazine - November 2019 - 69
IEEE Computational Intelligence Magazine - November 2019 - 70
IEEE Computational Intelligence Magazine - November 2019 - 71
IEEE Computational Intelligence Magazine - November 2019 - 72
IEEE Computational Intelligence Magazine - November 2019 - 73
IEEE Computational Intelligence Magazine - November 2019 - 74
IEEE Computational Intelligence Magazine - November 2019 - 75
IEEE Computational Intelligence Magazine - November 2019 - 76
IEEE Computational Intelligence Magazine - November 2019 - 77
IEEE Computational Intelligence Magazine - November 2019 - 78
IEEE Computational Intelligence Magazine - November 2019 - 79
IEEE Computational Intelligence Magazine - November 2019 - 80
IEEE Computational Intelligence Magazine - November 2019 - 81
IEEE Computational Intelligence Magazine - November 2019 - 82
IEEE Computational Intelligence Magazine - November 2019 - 83
IEEE Computational Intelligence Magazine - November 2019 - 84
IEEE Computational Intelligence Magazine - November 2019 - 85
IEEE Computational Intelligence Magazine - November 2019 - 86
IEEE Computational Intelligence Magazine - November 2019 - 87
IEEE Computational Intelligence Magazine - November 2019 - 88
IEEE Computational Intelligence Magazine - November 2019 - 89
IEEE Computational Intelligence Magazine - November 2019 - 90
IEEE Computational Intelligence Magazine - November 2019 - 91
IEEE Computational Intelligence Magazine - November 2019 - 92
IEEE Computational Intelligence Magazine - November 2019 - Cover3
IEEE Computational Intelligence Magazine - November 2019 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com