Skip to main content

Regret Freedom Isn’t Free

  • Conference paper
Principles of Distributed Systems (OPODIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7109))

Included in the following conference series:

Abstract

Cooperative, peer-to-peer (P2P) services—distributed systems consisting of participants from multiple administrative domains (MAD)—must deal with the threat of arbitrary (Byzantine) failures while incentivizing the cooperation of potentially selfish (rational) nodes that such services rely on to function. This paper investigates how to specify conditions (i.e., a solution concept) for rational cooperation in an environment that also contains Byzantine and obedient peers. We find that regret-free approaches—which, inspired by traditional Byzantine fault tolerance, condition rational cooperation on identifying a strategy that proves a best response regardless of how Byzantine failures occur—are unattainable in many fault-tolerant distributed systems. We suggest an alternative regret-braving approach, in which rational nodes aim to best respond to their expectations regarding Byzantine failures: the chosen strategy guarantees no regret only to the extent that such expectations prove correct. While work on regret-braving solution concepts is just beginning, our preliminary results show that these solution concepts are not subject to the fundamental limitations inherent to regret freedom.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kazaa Lite, http://en.wikipedia.org/wiki/Kazaa_Lite

  2. Abraham, I., Dolev, D., Halpern, J.Y.: Private communication

    Google Scholar 

  3. Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006 (2006)

    Google Scholar 

  4. Abraham, I., Dolev, D., Halpern, J.Y.: Lower Bounds on Implementing Robust and Resilient Mediators. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 302–319. Springer, Heidelberg (2008), http://portal.acm.org/citation.cfm?id=1802614.1802638

    Chapter  Google Scholar 

  5. Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday 5(10), 2–13 (2000), http://www.firstmonday.org/issues/issue5_10/adar/index.html

    Article  Google Scholar 

  6. Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.P., Porth, C.: BAR fault tolerance for cooperative services. In: SOSP 2005 (2005)

    Google Scholar 

  7. Alon, N., Emek, Y., Feldman, M., Tennenholtz, M.: Adversarial leakage in games. In: ICS 2010 (2010)

    Google Scholar 

  8. Aumann, R.J., Maschler, M.: Some thoughts on the minimax principle. Management Science 18(5), P54–P63 (1972)

    Google Scholar 

  9. Aumman, R.J.: On the non-transferable utility value: A comment on the Roth-Shaper examples. Econometrica 53(3), 667–677 (1985)

    Article  MathSciNet  Google Scholar 

  10. Ben-Porath, E.: Cheap talk in games with incomplete information. Journal of Economic Theory 108 (2003)

    Google Scholar 

  11. Bernheim, B.D., Peleg, B., Whinston, M.D.: Coalition-proof nash equilibria i. concepts. Journal of Economic Theory 42(1), 1–12 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  12. Crawford, V.P., Sobel, J.: Strategic information transmission. Econometrica 50(6), 1431–1451 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  13. d’Aspremont, C., Gerard-Varet, L.A.: Incentives and incomplete information. Journal of Public Economics 11(1), 25–45 (1979)

    Article  Google Scholar 

  14. Einy, E., Peleg, B.: Coalition-proof communication equilibria. In: EISET 1995 (1995)

    Google Scholar 

  15. Eliaz, K.: Fault tolerant implementation. Rev. of Econ. Studies 69, 589–610 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  16. Farrell, J., Rabin, M.: Cheap talk. The Journal of Economic Perspectives 10(3), 103–118 (1996)

    Article  Google Scholar 

  17. Fudenberg, D., Tirole, J.: Game Theory. MIT Press (August 1991)

    Google Scholar 

  18. Gibbard, A.: Manipulation of voting schemes: A general result. Econometrica 41(4), 587–601 (1973)

    Article  MathSciNet  MATH  Google Scholar 

  19. Gradwohl, R.: Rationality in the full-information model. In: Theory of Cryptography (2010)

    Google Scholar 

  20. Green, J., Laffont, J.J.: On coalition incentive compatibility. The Review of Economic Studies 46(2), 243–254 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  21. Hadzilacos, V., Toueg, S.: Fault-tolerant broadcasts and related problems (1993)

    Google Scholar 

  22. Halpern, J., Pass, R.: Game theory with costly computation (2010)

    Google Scholar 

  23. Halpern, J., Teague, V.: Rational secret sharing and multiparty computation. In: STOC 2004 (2004)

    Google Scholar 

  24. Hughes, D., Coulson, G., Walkerdine, J.: Free riding on Gnutella revisited: the bell tolls? IEEE Distributed Systems Online 6(6) (June 2005)

    Google Scholar 

  25. Jehiel, P., Meyer-ter Vehn, M., Moldovanu, B., Zame, W.R.: The limits of ex post implementation. Econometrica 74(3), 585–610 (2006), http://dx.doi.org/10.1111/j.1468-0262.2006.00675.x

    Article  MathSciNet  MATH  Google Scholar 

  26. Lamport, L.: Time, clocks, and the ordering of events in a distributed system. CACM (July 1978)

    Google Scholar 

  27. Levin, D., LaCurts, K., Spring, N., Bhattacharjee, B.: BitTorrent is an auction: analyzing and improving BitTorrent’s incentives. SIGCOMM Comput. Commun. Rev. 38(4), 243–254 (2008)

    Article  Google Scholar 

  28. Li, H., Clement, A., Marchetti, M., Kapritsos, M., Robinson, L., Alvisi, L., Dahlin, M.: FlightPath: Obedience vs choice in cooperative services. In: OSDI 2008 (2008)

    Google Scholar 

  29. Li, H.C., Clement, A., Wong, E., Napper, J., Roy, I., Alvisi, L., Dahlin, M.: BAR Gossip. In: OSDI 2006 (2006)

    Google Scholar 

  30. Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: HotNets 2006 (2006)

    Google Scholar 

  31. Mookherjee, D., Reichelstein, S.: Dominant strategy implementation of Bayesian incentive compatible allocation rules. Journal of Economic Theory 56(2), 378–399 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  32. Moreno, D., Wooders, J.: Coalition-proof equilibrium. Games and Economic Behavior 17, 80–112 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  33. Moscibroda, T., Schmid, S., Wattenhofer, R.: When selfish meets evil: Byzantine players in a virus inoculation game. In: PODC 2006 (2006)

    Google Scholar 

  34. Myerson, R.B., Satterthwaite, M.A.: Efficient mechanisms for bilateral trading. Journal of Economic Theory 29(2), 265–281 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  35. Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Do incentives build robustness in BitTorrent? In: NSDI 2007, pp. 1–14 (April 2007)

    Google Scholar 

  36. Saroiu, S., Gummadi, K.P., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems (January 2002)

    Google Scholar 

  37. Satterthwaite, M.A.: Strategy-proofness and arrow’s conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory 10(2), 187–217 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  38. Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  39. Tennenholtz, M.: Competitive safety analysis: robust decision-making in multi-agent systems. J. Artif. Int. Res. 17, 363–378 (2002), http://portal.acm.org/citation.cfm?id=1622810.1622822

    MathSciNet  MATH  Google Scholar 

  40. Tucker, A.W.: Acceptable points in general cooperative n-person games. Annals of Mathematics Study 40(4), 287–324 (1959)

    Google Scholar 

  41. Wong, E.L., Leners, J.B., Alvisi, L.: It’s on Me! the Benefit of Altruism in BAR Environments. In: Lynch, N.A., Shvartsman, A.A. (eds.) DISC 2010. LNCS, vol. 6343, pp. 406–420. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  42. Wong, E.L., Levy, I., Alvisi, L., Clement, A., Dahlin, M.: Regret freedom isn’t free, http://www.cs.utexas.edu/~elwong/research/publications/bar-no-regret-tr.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wong, E.L., Levy, I., Alvisi, L., Clement, A., Dahlin, M. (2011). Regret Freedom Isn’t Free. In: Fernàndez Anta, A., Lipari, G., Roy, M. (eds) Principles of Distributed Systems. OPODIS 2011. Lecture Notes in Computer Science, vol 7109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25873-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25873-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25872-5

  • Online ISBN: 978-3-642-25873-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics