Self-enforcing protocols via co-utile reputation management
Autor: | Josep Domingo-Ferrer, Oriol Farràs, Jordi Soria-Comas, Sergio Martínez, David Sánchez |
---|---|
Rok vydání: | 2016 |
Předmět: |
Protocol (science)
Information Systems and Management Computer science Mechanism (biology) media_common.quotation_subject 020206 networking & telecommunications 02 engineering and technology Computer security computer.software_genre Outcome (game theory) Virtuous circle and vicious circle Computer Science Applications Theoretical Computer Science Variety (cybernetics) Artificial Intelligence Control and Systems Engineering Order (exchange) 0202 electrical engineering electronic engineering information engineering Web search engine 020201 artificial intelligence & image processing computer Software Reputation management Reputation media_common |
Zdroj: | Information Sciences. :159-175 |
ISSN: | 0020-0255 |
DOI: | 10.1016/j.ins.2016.05.050 |
Popis: | We study the design of self-enforcing P2P protocols under the umbrella of co-utility.We study how reputation mechanisms can solve obstacles in co-utile protocol design.We propose a distributed reputation management model based on EigenTrust.We demonstrate that our reputation mechanism is also co-utile and self-enforcing.We give a detailed case study focused on anonymous query submission. Well-designed protocols should be self-enforcing, that is, be such that rational participating agents have no motivation to deviate from them. In addition, protocols can have other interesting properties, such as promoting collaboration between agents in a search for a better outcome. We proposed the notion of co-utilityź8, 9, which characterizes a situation in which mutual help is the best rational option to take even for purely selfish agents; in particular, if a protocol is co-utile, it is self-enforcing. However, guaranteeing self-enforcement, let alone co-utility, for any type of agent behavior is not possible. To tackle this issue, in this paper we study how reputation mechanisms can be incorporated into existing protocols in order to make them self-enforcing (and optionally co-utile). Moreover, we adapt and extend the well-known EigenTrust reputation calculation mechanism so that: i) it can be applied to a variety of scenarios and heterogeneous reputation needs and, ii) it is itself co-utile, and hence selfish agents are interested in following it. Obtaining a co-utile reputation mechanism creates a "virtuous circle" because: i) the reputation management is self-enforcing and, ii) as a result, it can be used to turn protocols that were not self-enforcing (resp. co-utile) per se into self-enforcing (resp. co-utile) ones. Our theoretical contribution is illustrated with a detailed case study focused on co-utile P2P privacy-preserving query submission to a web search engine or a database; formal and empirical validations of this case study are provided. |
Databáze: | OpenAIRE |
Externí odkaz: |