Co-Utility: Self-Enforcing protocols for the mutual benefit of participants

被引:20
作者
Domingo-Ferrer, Josep [1 ]
Martinez, Sergio [1 ]
Sanchez, David [1 ]
Soria-Comas, Jordi [1 ]
机构
[1] Univ Rovira & Virgili, Dept Comp Sci & Math, UNESCO Chair Data Privacy, Ave Paisos Catalans 26, E-43007 Tarragona, Catalonia, Spain
基金
欧盟地平线“2020”;
关键词
Agents; Protocols; P2P; Self-enforcement; Game theory; PRIVACY;
D O I
10.1016/j.engappai.2016.12.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocols govern the interactions between agents, both in the information society and in the society at large. Protocols based on mutually beneficial cooperation are especially interesting because they improve the societal welfare and no central authority is needed to enforce them (which eliminates a single point of failure and possible bottlenecks). In order to guide the design of such protocols, we introduce co-utility as a framework for cooperation between rational agents such that the best strategy for each agent is to help another agent achieve her best outcome. Specifically, in this work we study and characterize self-enforcing protocols in game-theoretic terms. Then, we use this characterization to develop the concept of co-utile protocol and study under which circumstances co-utility arises. Furthermore, we give a detailed study of co-utile protocol design in the case of anonymous query submission to a web search engine. The theoretical analysis is complemented with empirical results obtained from an implementation in a simulated multi-agent environment, which illustrates how co-utility can make cooperation self-enforcing and improve the agents' welfare.
引用
收藏
页码:148 / 158
页数:11
相关论文
共 30 条
  • [1] [Anonymous], 2003, P 12 INT C WORLD WID
  • [2] [Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
  • [3] [Anonymous], 1989, Games and decisions: Introduction and critical survey
  • [4] Bin Yu, 2002, Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, P294
  • [5] Trigger happy or gun shy? Dissolving common-value partnerships with Texas shootouts
    Brooks, Richard R. W.
    Landeo, Claudia M.
    Spier, Kathryn E.
    [J]. RAND JOURNAL OF ECONOMICS, 2010, 41 (04) : 649 - 673
  • [6] Buccafurri F, 2008, AI COMMUN, V21, P49
  • [7] Buccafurri F, 2006, FRONT ARTIF INTEL AP, V141, P347
  • [8] A game theoretic framework for incentives in P2P systems
    Buragohain, C
    Agrawal, D
    Suri, S
    [J]. THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 48 - 56
  • [9] Preserving user's privacy in web search engines
    Castella-Roca, Jordi
    Viejo, Alexandre
    Herrera-Joancomarti, Jordi
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (13-14) : 1541 - 1551
  • [10] Cooperative Game Theory: Basic Concepts and Computational Challenges
    Chalkiadakis, Georgios
    Elkind, Edith
    Wooldridge, Michael
    [J]. IEEE INTELLIGENT SYSTEMS, 2012, 27 (03) : 86 - 90