Progress in Artificial Intelligence

, Volume 5, Issue 2, pp 105–110 | Cite as


Self-enforcing collaborative protocols with mutual help
  • Josep Domingo-Ferrer
  • David Sánchez
  • Jordi Soria-Comas
Regular Paper


Peer-to-peer scenarios are increasingly important in globalized information societies. To guide the interaction between (rational) agents in these P2P settings, self-enforcing collaborative protocols are desirable, so that agents have no motivation to deviate from them. Moreover, to increase social welfare and ensure the success of protocols, it would be desirable to make the collaboration between agents mutually beneficial. In this paper, we present the notion of co-utility, which refers to protocols in which mutual help is the best rational option to take, even for purely selfish agents. This concept is illustrated through several P2P scenarios, framed both in the information society and in the physical world, for which we present and discuss co-utile self-enforcing protocols.


Protocols Game theory Multi-agent systems Self-enforcement Co-utility 



Funding by the Templeton World Charity Foundation (Grant TWCF0095/AB60 “CO-UTILITY”) is gratefully acknowledged. Also, partial support to this work has been received from the Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer and grant 2014 SGR 537), the Spanish Government (projects TIN2011-27076-C03-01 “CO-PRIVACY” and TIN2014-57364-C2-1-R “SmartGlacis”) and the European Commission (project H2020-644024 “CLARUS”). The authors are with the UNESCO Chair in Data Privacy, but the views in this paper are the authors’ own and are not necessarily shared by UNESCO.


  1. 1.
    BlaBlaCar. (2015). Accessed 11 Nov 2015
  2. 2.
    Carminati, B., Ferrari, E., Tran, N.H.: A privacy-preserving framework for constrained choreographed service composition. In: 2015 IEEE International Conference on Web Services, pp. 297–304. IEEE (2015)Google Scholar
  3. 3.
    Chang, C.-C., Tsai, H.-C., Hsieh, Y.-P.: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2), 269–277 (2010)CrossRefGoogle Scholar
  4. 4.
    Daries, J.P., Reich, J., Waldo, J., Young, E.M., Whittinghill, J., Seaton, D.T., Ho, A.D., Chuang, I.: Privacy, anonymity and big data in the social sciences. Commun. ACM 57(9), 56–63 (2014)CrossRefGoogle Scholar
  5. 5.
    Domingo-Ferrer, J., González-Nicolás, Ú.: Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search. Inf. Sci. 185, 191–204 (2012)CrossRefGoogle Scholar
  6. 6.
    Domingo-Ferrer, J., Farràs, O., Martínez, S., Sánchez, D., Soria-Comas, J.: Self-enforcing protocols via co-utile reputation management. Submitted manuscript (2015)Google Scholar
  7. 7.
    Domingo-Ferrer, J., Soria-Comas, J., Ciobotaru, O.: Co-utility: self-enforcing protocols without coordination mechanisms. In: Proceedings of the 5th International Conference on Industrial Engineering and Operations Management, pp. 1–7. IEEE (2015)Google Scholar
  8. 8.
    Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Schulte Nordholt, E., Spicer, K., de Wolf, P.-P.: Statistical Disclosure Control. Wiley, New York (2012)Google Scholar
  9. 9.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003)Google Scholar
  10. 10.
    Leyton-Brown, K., Shoham, Y.: Essentials of Game Theory: A Concise, Multidisciplinary Introduction. Morgan & Claypool, San Rafael (2008)MATHGoogle Scholar
  11. 11.
    Megías, D., Domingo-Ferrer, J.: Privacy-aware peer-to-peer content distribution using automatically recombined ringerprints. Multimed. Syst. 20(2), 105–125 (2014)CrossRefGoogle Scholar
  12. 12.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)Google Scholar
  13. 13.
    Soria-Comas, J., Domingo-Ferrer, J.: Co-utile collaborative anonymization of microdata. Lecture Notes in Computer Science, vol. 9321, pp. 192–206 (2015)Google Scholar
  14. 14.
    Turi, A.N., Domingo-Ferrer, J., Sánchez, D., Osmani, D.: Co-utility: conciliating individual freedom and common good for the crowd-based business model. In: Proceedings of the 12th International Conference on e-Business Engineering (2015)Google Scholar
  15. 15.
    Viejo, A., Sánchez, D.: Profiling social networks to provide useful and privacy-preserving web search. J. Assoc. Inf. Sci. Technol. 65(12), 2444–2458 (2014)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Josep Domingo-Ferrer
    • 1
  • David Sánchez
    • 1
  • Jordi Soria-Comas
    • 1
  1. 1.UNESCO Chair in Data Privacy, Department of Computer Engineering and MathematicsUniversitat Rovira i VirgiliTarragona, CataloniaSpain

Personalised recommendations