Co-Utility: Self-Enforcing protocols for the mutual benefit of participants

被引:20
作者
Domingo-Ferrer, Josep [1 ]
Martinez, Sergio [1 ]
Sanchez, David [1 ]
Soria-Comas, Jordi [1 ]
机构
[1] Univ Rovira & Virgili, Dept Comp Sci & Math, UNESCO Chair Data Privacy, Ave Paisos Catalans 26, E-43007 Tarragona, Catalonia, Spain
基金
欧盟地平线“2020”;
关键词
Agents; Protocols; P2P; Self-enforcement; Game theory; PRIVACY;
D O I
10.1016/j.engappai.2016.12.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocols govern the interactions between agents, both in the information society and in the society at large. Protocols based on mutually beneficial cooperation are especially interesting because they improve the societal welfare and no central authority is needed to enforce them (which eliminates a single point of failure and possible bottlenecks). In order to guide the design of such protocols, we introduce co-utility as a framework for cooperation between rational agents such that the best strategy for each agent is to help another agent achieve her best outcome. Specifically, in this work we study and characterize self-enforcing protocols in game-theoretic terms. Then, we use this characterization to develop the concept of co-utile protocol and study under which circumstances co-utility arises. Furthermore, we give a detailed study of co-utile protocol design in the case of anonymous query submission to a web search engine. The theoretical analysis is complemented with empirical results obtained from an implementation in a simulated multi-agent environment, which illustrates how co-utility can make cooperation self-enforcing and improve the agents' welfare.
引用
收藏
页码:148 / 158
页数:11
相关论文
共 30 条
[21]  
Murugesan Mummoorthy., 2009, PROVIDING PRIVACY PL, P768
[22]  
Nisan N., 2014, Handbook of Game Theory, P477
[23]  
Osborne M. J., 1994, A Course in Game Theory
[24]  
Papamarcos M. S., 1984, 11th Annual International Symposium on Computer Architecture. Conference Proceedings (Cat. No. 84CH2051-1), P348, DOI 10.1145/800015.808204
[25]  
Rahman R., P ACM SIGCOMM 2011 C, P182
[26]   Co-utile P2P ridesharing via decentralization and reputation management [J].
Sanchez, David ;
Martinez, Sergio ;
Domingo-Ferrer, Josep .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2016, 73 :147-166
[27]  
Schneier B, 2009, THREATPOST 0810
[28]  
Turi A.N., REV MANAGER IN PRESS
[29]   COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERS [J].
VICKREY, W .
JOURNAL OF FINANCE, 1961, 16 (01) :8-37
[30]   Preventing automatic user profiling in Web 2.0 applications [J].
Viejo, Alexandre ;
Sanchez, David ;
Castella-Roca, Jordi .
KNOWLEDGE-BASED SYSTEMS, 2012, 36 :191-205