Co-utility: Conciliating individual freedom and common good in the information society

Similar documents
Tourism applications of Artificial Intelligence techniques. Dr. Antonio Moreno, ITAKA research group, URV

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

Cyber Criminal Methods & Prevention Techniques. By

Fausto Giunchiglia and Mattia Fumagalli

UNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction

Sufficiently Secure Peer-to-Peer Networks

Privacy Protected Spatial Query Processing

Privately Solving Linear Programs

Countering Hidden-Action Attacks on Networked Systems

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

Repairing Multi-Player Games

SCALABLE MPC WITH STATIC ADVERSARY. Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria

Project: A survey and Critique on Algorithmic Mechanism Design

Privacy Policy. Third Party Links

CSE 127: Computer Security. Security Concepts. Kirill Levchenko

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

Algorithms, Games, and Networks February 21, Lecture 12

1.2 This Privacy Policy applies to the games provided by GAMESTURE sp. z o. o. (GAMESTURE, We, Our company)

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

1.1 What is Microeconomics?

Towards the Design of Robust Inter-domain Routing Protocols

Credit-based Network Management

Yes. [No Response] General Questions

Yes. [No Response] General Questions

Lecture 11: Maximum flow and minimum cut

Oman Research & Education Network (OMREN)

Cryptography & Data Privacy Research in the NSRC

Re: Request for Comments National Broadband Research Agenda, Docket Number:

Pre-Requisites: CS2510. NU Core Designations: AD

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i

The Center for Internet Security

DISI - University of Trento APPLICATION OF REPUTATION MANAGEMENT SYSTEMS IN AUTONOMIC COMMUNICATION NETWORKS

Units. Unit 4: Internet. Year 1 Unit 1: Course Overview

ˆ The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

An Ad Omnia Approach to Defining and Achiev ing Private Data Analysis

Cryptography & Data Privacy Research in the NSRC

Formal Verification of e-reputation Protocols 1

European Directives and reglements for Information security

RFP/ODI/03/ Clarification. Questions and answers batch number 2

Privacy Security Trust in the light of the Brazil EU partnership

The Global Cybercrime Industry

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics

Tor, a quick overview

Our Data Protection Officer is Andrew Garrett, Operations Manager

Master Information Security Policy & Procedures [Organization / Project Name]

No opinion. [No Response]

Blockchain (de)constructed

Lecture 18 - Chosen Ciphertext Security

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1

Argumentation Mechanism Design for Preferred Semantics

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

Over-contribution in discretionary databases

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

IGN.COM - PRIVACY POLICY

Intelligent flexible query answering Using Fuzzy Ontologies

PRIVATE INFORMATION RETRIEVAL WITH SIDE INFORMATION

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Privacy-Preserving Data Mining in the Fully Distributed Model

Void main Technologies

Motivation. Problem: With our linear methods, we can train the weights but not the basis functions: Activator Trainable weight. Fixed basis function

Outsourcing Privacy-Preserving Social Networks to a Cloud

Cooperative Games. Lecture 1: Introduction. Stéphane Airiau. ILLC - University of Amsterdam

NYSVMS WEBSITE PRIVACY POLICY

Detering Dishonest Behaviour in Private Information Retrieval

Architectural Styles - Finale

Privacy Statement of Taiwan Cooperative Bank

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

Overview of Cryptography

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Getting Started. Logon to Portal

Units. Year 1 Unit 1: Course Overview. Unit 4: Internet

Qatar s National ICT Plan

CS154, Lecture 18: 1

Units. Unit 4: Internet. Year 1 Unit 1: Course Overview

A Hybrid Peer-to-Peer Recommendation System Architecture Based on Locality-Sensitive Hashing

Samsara: Honor Among Thieves in Peer-to-Peer Storage

Enforcing collaboration in a collaborative content distribution network

CIPT Certified Information Privacy Technologist

P2P Contents Distribution System with Routing and Trust Management

A Practical Look into GDPR for IT

Foundations of Artificial Intelligence

Multi-stage Stackelberg Game Approach for Colocation Datacenter Demand Response

Preserving Data Privacy in the IoT World

THESTREET.COM - PRIVACY POLICY

COALITION FORMATION IN P2P FILE SHARING SYSTEMS

Laws and Regulations & Data Governance

NSPIRES User Guide 2014

Add a video to your property listing. Getting started. Quick Reference Guide > Embedded Video

When and what information does Kantar Worldpanel collect?

Privacy Notice for Meon Bridge Club

Author(s): Rahul Sami, 2009

Management Information Systems

Data Protection Regulations and International Data Flows: Implications for Trade and Development

Searching for Grant- Funding Opportunities. Mark van t Hooft Office of Sponsored Programs

Sarri Gilman Privacy Policy

Midterm I. Introduction to Artificial Intelligence. CS 188 Fall You have approximately 3 hours.

SmartCard-HSM. n-of-m Authentication Scheme

How to Select the Right Marketing Cloud Edition

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Transcription:

Co-utility: Conciliating individual freedom and common good in the information society -short advertisement- Rovira i Virgili University and Templeton World Charity Foundation

Motivation The scenario: We have: We should implement:

Motivation The scenario: Peers only and no central authority. Rational peers interested in optimizing own benefit. We should implement:

Motivation The scenario: Peers only and no central authority. Rational peers interested in optimizing own benefit. Protocols regulating peers interaction should be easy to use and efficient to implement. Protocols should foster collaboration of peers.

Motivation The scenario: Peers only and no central authority. Rational peers interested in optimizing own benefit. Protocols regulating peers interaction should be easy to use and efficient to implement. Protocols should foster collaboration of peers. Simplified example: Matching offer and demand. In general: P2P systems and everywhere in daily life.

Motivation The scenario: Peers only and no central authority. Rational peers interested in optimizing own benefit. Protocols regulating peers interaction should be easy to use and efficient to implement. Protocols should foster collaboration of peers. We present the first rigorous and comprehensive study!

Self-Enforcing Protocols Central concept for rationality: achieve equilibrium. If additionally, all agents get positive utility: the protocol is called self-enforcing. We propose classification of self-enforcing protocols: Coordination (intuition): agents utilities depend on the private types that others report to the protocol. Co-utility (our notion; intuition): agents utilities do not depend on the private types of others. We detail next co-utility.

Co-utility: P2P Anonymous Queries Agents utilities do not depend on others private types: Database D Agent B Agent A No query Query q

Co-utility: P2P Anonymous Queries Agents utilities do not depend on others private types: Database D Agent B Agent A No query Query q Creates agents profiles Privacy towards database Privacy towards database + Functionality: the quick answer to query q

Co-utility: P2P Anonymous Queries Agents utilities do not depend on others private types: Database D Agent B Agent A Creates agents profiles Privacy towards database No query Privacy towards database + Query q Functionality: the quick answer to query q A values privacy α times more than functionality. α is the private type!

Co-utility: P2P Anonymous Queries Agents utilities do not depend on others private types: Database D Agent B Agent A No query Query q Creates agents profiles Privacy towards database Privacy towards database + Functionality: the quick answer to query q A values privacy α times more than functionality. α is the private type! The utility of an agent (e.g., A) is: H(Profile of A) + α (maximum time allowed time lapsed) (1 functionality), where functionality is 0 if query not answered and 1 if query was answered.

Co-Utile Protocols: Formal Definition Co-utility-amenable games: the utility of any agent is independent of the secret types of the other agents. It holds true for the anonymous query example Indeed, the utility of an agent is: H(Profile of A) + α (maximum time allowed time lapsed) (1 functionality)! Co-utile protocols: protocols for co-utilityamenable games where at least one agent maximizes his utility. Easy to reach if types match.

Conclusions Defined co-utility. Described anonymous query submission in relation with co-utility. Future work: how to deal with games that are not co-utility amenable. This will be achieved by adding artificial utilities to the game, e.g., costs for forwarding. The artificial utilities can be enforced using punishments and rewards, e.g., reputation systems.

Thank you!