Long-term Data Sharing under Exclusivity Attacks

Yotam Gafni, Moshe Tennenholtz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The quality of learning generally improves with the scale and diversity of data. Companies and institutions can therefore benefit from building models over shared data. Many cloud and blockchain platforms, as well as government initiatives, are interested in providing this type of service. These cooperative efforts face a challenge, which we call "exclusivity attacks". A firm can share distorted data, so that it learns the best model fit, but is also able to mislead others. We study protocols for long-term interactions and their vulnerability to these attacks, in particular for regression and clustering tasks. We find that the choice of communication protocol is essential for vulnerability: The protocol is much more vulnerable if firms can continuously initiate communication, instead of periodically asked for their inputs. Vulnerability may also depend on the number of Sybil identities a firm can control.

Original languageEnglish
Title of host publicationEC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation
Pages739-759
Number of pages21
ISBN (Electronic)9781450391504
DOIs
StatePublished - 13 Jul 2022
Event23rd ACM Conference on Economics and Computation, EC 2022 - Boulder, United States
Duration: 11 Jul 202215 Jul 2022

Publication series

NameEC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation

Conference

Conference23rd ACM Conference on Economics and Computation, EC 2022
Country/TerritoryUnited States
CityBoulder
Period11/07/2215/07/22

Keywords

  • collaborative machine learning
  • informational mechanism design
  • non-cooperative computing
  • strategic machine learning

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Computational Mathematics
  • Economics and Econometrics
  • Statistics and Probability

Cite this