Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems

Sarah Edenhofer, Christopher Stifter, Sven Tomforde, Jan Kantert, Christian Müller-Schloer, Jörg Hähner

2016

Abstract

Open, distributed systems face the challenge to maintain an appropriate operation performance even in the presence of bad behaving or malicious agents. A promising mechanism to counter the resulting negative impact of such agents is to establish technical trust. In this paper, we investigate strategies to improve the efficiency of trust mechanisms regarding the isolation of undesired participants by means of reputation and accusation techniques. We demonstrate the potential benefit of the developed techniques within simulations of a Trusted Desktop Computing Grid.

References

  1. Anderson, D. and Fedak, G. (2006). The Computational and Storage Potential of Volunteer Computing. In Proc. of CCGRID 2006, pages 73-80. IEEE.
  2. Anglano, C., Brevik, J., Canonico, M., Nurmi, D., and Wolski, R. (2006). Fault-aware Scheduling for Bag-ofTasks Applications on Desktop Grids. In Proc. of GRID 2006, pages 56-63. IEEE.
  3. Anglano, C., Canonico, M., Guazzone, M., Botta, M., Rabellino, S., Arena, S., and Girardi, G. (2008). Peer-toPeer Desktop Grids in the Real World: The ShareGrid Project. Proc. of CCGrid 2008, pages 609-614.
  4. Buskens, V. (1998). The Social Structure of Trust. Social Networks, 20(3):265 - 289.
  5. Castelfranchi, C. and Falcone, R. (2010). Trust Theory: A Socio-Cognitive and Computational Model, volume 18. John Wiley & Sons.
  6. Chakravarti, A. J., Baumgartner, G., and Lauria, M. (2004). Application-Specific Scheduling for the Organic Grid. In Proc. of GRID 2004 Workshops, pages 146-155, Washington, DC, USA. IEEE.
  7. Choi, S., Buyya, R., Kim, H., and Byun, E. (2008). A Taxonomy of Desktop Grids and its Mapping to State of the Art Systems. Technical report, Grid Computing and Dist. Sys. Laboratory, The University of Melbourne.
  8. Choi, S., Kim, H., Byun, E., Baik, M., Kim, S., Park, C., and Hwang, C. (2007). Characterizing and Classifying Desktop Grid. In Proc. of CCGRID 2007, pages 743- 748.
  9. Domingues, P., Sousa, B., and Moura Silva, L. (2007). Sabotage-tolerance and Trustmanagement in Desktop Grid Computing. In Future Gener. Comput. Syst. 23, 7, pages 904-912.
  10. Edenhofer, S., Stifter, C., Jänen, U., Kantert, J., Tomforde, S., Hähner, J., and Müller-Schloer, C. (2015). An Accusation-Based Strategy to Handle Undesirable Behaviour in Multi-Agent Systems. In 2015 IEEE Eighth International Conference on Autonomic Computing Workshops (ICACW).
  11. Fedak, G., Germain, C., Neri, V., and Cappello, F. (2001). Xtremweb: A Generic Global Computing System. In Cluster Computing and the Grid, 2001. Proceedings. First IEEE/ACM International Symposium on, pages 582-587.
  12. Hewitt, C. (1991). Open Information Systems Semantics for Distributed Artificial Intelligence. Artificial intelligence, 47(1):79-106.
  13. Hume, D. (1739). A Treatise of Human Nature. (Oxford Clarendon Press.
  14. Kantert, J., Edenhofer, S., Tomforde, S., and MüllerSchloer, C. (2015). Representation of Trust and Reputation in Self-Managed Computing Systems. In IEEE 13th International Conference on Dependable, Autonomic and Secure Computing, DASC 2015, pages 1827-1834, Liverpool, UK. IEEE.
  15. Karlins, M. and Abelson, H. (1959). Persuasion: How Opinions and Attitudes are Changed. Springer Pub. Co.
  16. Klejnowski, L. (2014). Trusted community : a novel multiagent organisation for open distributed systems. PhD thesis, Leibniz Universität Hannover.
  17. Klejnowski, L., Bernard, Y., Hähner, J., and MüllerSchloer, C. (2010). An Architecture for TrustAdaptive Agents. In Proc. of SASO Workshops, pages 178-183.
  18. Müller-Schloer, C., Schmeck, H., and Ungerer, T. (2011). Organic Computing - A Paradigm Shift for Complex Systems. Springer.
  19. Ramchurn, S. D., Huynh, D., and Jennings, N. R. (2004). Trust in multi-agent systems. Knowl. Eng. Rev., 19(1):1-25.
  20. Sabater, J. and Sierra, C. (2005). Review on computational trust and reputation models. Artificial Intelligence Review, 24(1):33-60.
  21. Steghöfer, J.-P. and Reif, W. (2012). Die Guten, die Bösen und die Vertrauenswürdigen Vertrauen im Organic Computing. Informatik-Spektrum, 35(2):119-131.
  22. Wang, Y. and Vassileva, J. (2004). Trust-Based Community Formation in Peer-to-Peer File Sharing Networks. In Proc. on Web Intelligence, pages 341-348.
Download


Paper Citation


in Harvard Style

Edenhofer S., Stifter C., Tomforde S., Kantert J., Müller-Schloer C. and Hähner J. (2016). Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems . In Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-758-172-4, pages 132-140. DOI: 10.5220/0005679201320140


in Bibtex Style

@conference{icaart16,
author={Sarah Edenhofer and Christopher Stifter and Sven Tomforde and Jan Kantert and Christian Müller-Schloer and Jörg Hähner},
title={Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems},
booktitle={Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2016},
pages={132-140},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005679201320140},
isbn={978-989-758-172-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems
SN - 978-989-758-172-4
AU - Edenhofer S.
AU - Stifter C.
AU - Tomforde S.
AU - Kantert J.
AU - Müller-Schloer C.
AU - Hähner J.
PY - 2016
SP - 132
EP - 140
DO - 10.5220/0005679201320140