Provably manipulation-resistant reputation systems

We consider a community of users who must make periodic decisions about whether to interact with one another. We propose a protocol which allows honest users to reliably interact with each other, while limiting the damage done by each malicious or incompetent user. The worst-case cost per user is sublinear in the average number of interactions per user and is independent of the number of users. Our guarantee holds simultaneously for every group of honest users. For example, multiple groups of users with incompatible tastes or preferences can coexist. As a motivating example, we consider a game where players have periodic opportunities to do one another favors but minimal ability to determine when a favor was done. In this setting, our protocol achieves nearly optimal collective welfare while remaining resistant to exploitation. Our results also apply to a collaborative filtering setting where users must make periodic decisions about whether to interact with resources such as movies or restaurants. In this setting, we guarantee that any set of honest users achieves a payoff nearly as good as if they had identified the optimal set of items in advance and then chosen to interact only with resources from that set.

[1]  Prabhakar Raghavan,et al.  Competitive recommendation systems , 2002, STOC '02.

[2]  Paul Resnick,et al.  The influence limiter: provably manipulation-resistant recommender systems , 2007, RecSys '07.

[3]  Paul Christiano Online local learning via semidefinite programming , 2014, STOC.

[4]  Taghi M. Khoshgoftaar,et al.  A Survey of Collaborative Filtering Techniques , 2009, Adv. Artif. Intell..

[5]  Baruch Awerbuch,et al.  Competitive collaborative learning , 2005, J. Comput. Syst. Sci..

[6]  Paul Resnick,et al.  Sybilproof transitive trust protocols , 2009, EC '09.

[7]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .

[8]  Ramesh Govindan,et al.  Liquidity in credit networks: a little trust goes a long way , 2011, EC '11.

[9]  Johan A. Pouwelse,et al.  BarterCast: A practical approach to prevent lazy freeriding in P2P networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[10]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[11]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[12]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[13]  Feng Xiao,et al.  DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[14]  Rolf Haenni,et al.  Credential Networks: a General Model for Distributed Trust and Authenticity Management , 2005, PST.

[15]  Boaz Patt-Shamir,et al.  Tell Me Who I Am: An Interactive Recommendation System , 2006, SPAA '06.

[16]  Sven Seuken,et al.  Accounting Mechanisms for Distributed Work Systems , 2010, AAAI.

[17]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[18]  Sven Seuken,et al.  Sybil-proof accounting mechanisms with transitive trust , 2014, AAMAS.

[19]  Boaz Patt-Shamir,et al.  Collaborate with Strangers to Find Own Preferences , 2005, SPAA '05.

[20]  Shai Shalev-Shwartz,et al.  Near-Optimal Algorithms for Online Matrix Prediction , 2012, COLT.

[21]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[22]  Shai Shalev-Shwartz,et al.  Online Learning and Online Convex Optimization , 2012, Found. Trends Mach. Learn..