A Faithful Mechanism for Privacy-Sensitive Distributed Constraint Satisfaction Problems

被引:0
|
作者
Farhadi, Farzaneh [1 ]
Jennings, Nicholas R. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
关键词
Constraint satisfaction problems; Incentive mechanism design; Privacy; OPTIMIZATION;
D O I
10.1007/978-3-030-66412-1_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We consider a constraint satisfaction problem (CSP) in which constraints are distributed among multiple privacy-sensitive agents. Agents are self-interested (they may reveal misleading information/constraints if that increases their benefits) and privacy-sensitive (they prefer to reveal as little information as possible). For this setting, we design a multi-round negotiation-based incentive mechanism that guarantees truthful behavior of the agents, while protecting them against unreasonable leakage of information. This mechanism possesses several desirable properties, including Bayesian incentive compatibility and individual rationality. Specifically, we prove that our mechanism is faithful, meaning that no agent can benefit by deviating from his required actions in the mechanism. Therefore, the mechanism can be implemented by selfish agents themselves, with no need for a trusted party to gather the information and make the decisions centrally.
引用
收藏
页码:143 / 158
页数:16
相关论文
共 50 条
  • [1] A privacy-sensitive approach to distributed clustering
    Merugu, S
    Ghosh, J
    [J]. PATTERN RECOGNITION LETTERS, 2005, 26 (04) : 399 - 410
  • [2] Privacy-Sensitive Congestion Charging
    Beresford, Alastair R.
    Davies, Jonathan J.
    Harle, Robert K.
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 97 - 104
  • [3] Distributed constraint satisfaction and optimization with privacy enforcement
    Silaghi, MC
    Mitra, D
    [J]. IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2004, : 531 - 535
  • [4] Distributed splitting of constraint satisfaction problems
    Arbab, F
    Monfroy, E
    [J]. COORDINATION LANGUAGES AND MODELS, PROCEEDINGS, 2000, 1906 : 115 - 132
  • [5] Privacy-Sensitive Data in Connected Cars
    Nawrath, T.
    Fischer, D.
    Markscheffel, B.
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 392 - 393
  • [6] Towards Privacy-Sensitive Participatory Sensing
    Huang, Kuan Lun
    Kanhere, Salil S.
    Hu, Wen
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 637 - +
  • [7] Compressed and Privacy-Sensitive Sparse Regression
    Zhou, Shuheng
    Lafferty, John
    Wasserman, Larry
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (02) : 846 - 866
  • [8] Privacy-Sensitive Robotics [Workshop Summary]
    Rueben, Matthew
    Smart, William D.
    Grimm, Cindy M.
    Cakmak, Maya
    [J]. COMPANION OF THE 2017 ACM/IEEE INTERNATIONAL CONFERENCE ON HUMAN-ROBOT INTERACTION (HRI'17), 2017, : 425 - 426
  • [9] An approach to over-constrained distributed constraint satisfaction problems: Distributed hierarchical constraint satisfaction
    Hirayama, K
    Yokoo, M
    [J]. FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, 2000, : 135 - 142
  • [10] Incentive Schemes for Privacy-Sensitive Consumers
    Huang, Chong
    Sankar, Lalitha
    Sarwate, Anand D.
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 358 - 369