Incentive-Based Co-utility: Co-utile Reputation Management

Well-designed protocols should be self-enforcing, that is, be such that rational participating agents have no motivation to deviate from them. In addition, protocols can have other interesting properties, such as promoting collaboration between agents in a search for a better outcome. In [7, 8], we proposed the notion of co-utility, which characterizes a situation in which mutual help is the best rational option to take even for purely selfish agents; in particular, if a protocol is co-utile, it is self-enforcing. However, guaranteeing self-enforcement, let alone co-utility, for any type of agent behavior is not possible. To tackle this issue, in this chapter we detail how reputation mechanisms can be incorporated into existing protocols in order to make them self-enforcing (and optionally co-utile). Moreover, we show how to adapt and extend the well-known EigenTrust reputation calculation mechanism so that: (i) it can be applied to a variety of scenarios and heterogeneous reputation needs and, (ii) it is itself co-utile, and hence selfish agents are interested in following it. Obtaining a co-utile reputation mechanism creates a “virtuous circle” because: (i) the reputation management is self-enforcing and, (ii) as a result, it can be used to turn protocols that were not self-enforcing (resp. co-utile) per se into self-enforcing (resp. co-utile) ones.

[1]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[2]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[3]  Josep Domingo-Ferrer,et al.  Co-utility for digital content protection and digital forgetting , 2016, 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[4]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[5]  Josep Domingo-Ferrer,et al.  Co-utility: Self-enforcing protocols without coordination mechanisms , 2015, 2015 International Conference on Industrial Engineering and Operations Management (IEOM).

[6]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[7]  Kai Hwang,et al.  GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.

[8]  Josep Domingo-Ferrer,et al.  Co-utility: Conciliating Individual Freedom and Common Good in the Crowd Based Business Model , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.

[9]  Josep Domingo-Ferrer,et al.  Co-utile Collaborative Anonymization of Microdata , 2015, MDAI.

[10]  Young Ae Kim,et al.  A trust prediction framework in rating-based experience sharing social networks without a Web of Trust , 2012, Inf. Sci..

[11]  Josep Domingo-Ferrer,et al.  Self-enforcing protocols via co-utile reputation management , 2016, Inf. Sci..

[12]  Josep Domingo-Ferrer,et al.  Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search , 2012, Inf. Sci..

[13]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[14]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[15]  David Sánchez,et al.  A co-utility approach to the mesh economy: the crowd-based business model , 2017 .

[16]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[17]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[18]  Luca de Alfaro,et al.  A content-driven reputation system for the wikipedia , 2007, WWW '07.

[19]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[20]  Josep Domingo-Ferrer,et al.  Co-utile P2P ridesharing via decentralization and reputation management , 2016 .

[21]  Josep Domingo-Ferrer,et al.  Co-Utility: Self-Enforcing protocols for the mutual benefit of participants , 2017, Eng. Appl. Artif. Intell..

[22]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[23]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[24]  Ling Liu,et al.  The SocialTrust framework for trusted social information management: Architecture and algorithms , 2010, Inf. Sci..

[25]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.