False-Name-Proofness in Social Networks

In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave strategically. An emerging phenomenon is to run such mechanisms on a social network; for example, Facebook recently allowed its users to vote on its future terms of use. One significant complication for such mechanisms is that it may be possible for a user to participate multiple times by creating multiple identities. Prior work has investigated the design of false-nameproof mechanisms, which guarantee that there is no incentive to use additional identifiers. Arguably, this work has produced mostly negative results. In this paper, we show that it is in fact possible to create good mechanisms that are robust to false-name-manipulation, by taking the social network structure into account. The basic idea is to exclude agents that are separated from trusted nodes by small vertex cuts. We provide key results on the correctness, optimality, and computational tractability of this approach.

[1]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[2]  Vahab S. Mirrokni,et al.  Local Computation of PageRank Contributions , 2007, Internet Math..

[3]  Howard Raiffa,et al.  Games and Decisions: Introduction and Critical Survey. , 1958 .

[4]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2008, TNET.

[5]  Vincent Conitzer,et al.  Limited verification of identities to induce false-name-proofness , 2007, TARK '07.

[6]  Jon M. Kleinberg,et al.  Navigation in a small world , 2000, Nature.

[7]  Vahab S. Mirrokni,et al.  Robust PageRank and locally computable spam detection features , 2008, AIRWeb '08.

[8]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[9]  Vahab S. Mirrokni,et al.  Local Computation of PageRank Contributions , 2007, WAW.

[10]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[11]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[12]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[13]  K. Menger Zur allgemeinen Kurventheorie , 1927 .

[14]  Vincent Conitzer,et al.  Optimal False-Name-Proof Voting Rules with Costly Voting , 2008, AAAI.

[15]  Vincent Conitzer,et al.  Anonymity-Proof Voting Rules , 2008, WINE.

[16]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[17]  Fan Chung Graham,et al.  Internet and Network Economics, Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007, Proceedings , 2007, WINE.

[18]  Hector Garcia-Molina,et al.  Link spam detection based on mass estimation , 2006, VLDB.

[19]  Hiroshi Nagamochi,et al.  Minimum cost source location problem with vertex-connectivity requirements in digraphs , 2001, Inf. Process. Lett..

[20]  H. Raiffa,et al.  GAMES AND DECISIONS; INTRODUCTION AND CRITICAL SURVEY. , 1958 .

[21]  Makoto Yokoo,et al.  Robust double auction protocol against false-name bids , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[22]  Rashmi Raj,et al.  Web Spam Detection with Anti-Trust Rank , 2006, AIRWeb.

[23]  Vincent Conitzer,et al.  Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms , 2010, AAMAS.

[24]  S. Vajda,et al.  GAMES AND DECISIONS; INTRODUCTION AND CRITICAL SURVEY. , 1958 .