Skip to main content

Internet Computing: Using Reputation to Select Workers from a Pool

  • Conference paper
  • First Online:
Networked Systems (NETYS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9944))

Included in the following conference series:

  • 541 Accesses

Abstract

The assignment and execution of tasks over the Internet is an inexpensive solution in contrast with supercomputers. We consider an Internet-based Master-Worker task computing approach, such as SETI@home. A master process sends tasks, across the Internet, to worker processors. Workers execute, and report back a result. Unfortunately, the disadvantage of this approach is the unreliable nature of the worker processes. Through different studies, workers have been categorized as either malicious (always report an incorrect result), altruistic (always report a correct result), or rational (report whatever result maximizes their benefit). We develop a reputation-based mechanism that guarantees that, eventually, the master will always be receiving the correct task result. We model the behavior of the rational workers through reinforcement learning, and we present three different reputation types to choose, for each computational round, the most reputable from a pool of workers. As workers are not always available, we enhance our reputation scheme to select the most responsive workers. We prove sufficient conditions for eventual correctness under the different reputation types. Our analysis is complemented by simulations exploring various scenarios. Our simulation results expose interesting trade-offs among the different reputation types, workers availability, and cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We call these workers malicious for compliance with Volunteer Computing [4] literature. This must not be confused with Byzantine malice assumed in classical distributed computing.

  2. 2.

    In BOINC, honesty means that the worker’s task result agrees with the majority, while in our work this decision is well-founded, since the master audits.

  3. 3.

    The omitted proofs can be found at http://arxiv.org/abs/1603.04394.

  4. 4.

    As we have seen experimentally, first the system reaches a reliable state and then \(p_{\mathcal {A}} =p_{\mathcal {A}} ^{min}\).

References

  1. Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of ACM PODC 2006, pp. 53–62 (2006)

    Google Scholar 

  2. Allen, B.: The Einstein@home Project (2014). http://einstein.phys.uwm.edu

  3. Amazon’s Mechanical Turk (2014). https://www.mturk.com

  4. Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of 5th IEEE/ACM International Workshop on Grid Computing, pp. 4–10 (2004)

    Google Scholar 

  5. Anderson, D.P.: Volunteer computing: the ultimate cloud. ACM Crossroads 16(3), 7–10 (2010)

    Article  Google Scholar 

  6. Anderson, D.P.: BOINC reputation (2014). http://boinc.berkeley.edu/trac/wiki/AdaptiveReplication

  7. Anderson, D.P.: BOINC (2016). http://boinc.berkeley.edu/

  8. Bush, R.R., Mosteller, F.: Stochastic Models for Learning (1955)

    Google Scholar 

  9. Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A.: Algorithmic mechanisms for reliable master-worker internet-based computing. IEEE Trans. Comput. 63(1), 179–195 (2014)

    Article  MathSciNet  Google Scholar 

  10. Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A., Sánchez, A.: Applying the dynamics of evolution to achieve reliability in master-worker computing. Concurr. Comput.: Pract. Exp. 25(17), 2363–2380 (2013)

    Article  Google Scholar 

  11. Christoforou, E., Anta, A.F., Georgiou, C., Mosteiro, M.A., Sánchez, A.A.: Reputation-based mechanisms for evolutionary master-worker computing. In: Baldoni, R., Nisse, N., van Steen, M. (eds.) OPODIS 2013. LNCS, vol. 8304, pp. 98–113. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Estrada, T., Taufer, M., Anderson, D.P.: Performance prediction and analysis of BOINC projects: an empirical study with EMBOINC. J. Grid Comput. 7(4), 537–554 (2009)

    Article  Google Scholar 

  13. Fernández Anta, A., Georgiou, C., López, L., Santos, A.: Reliable internet-based master-worker computing in the presence of malicious workers. Parallel Process. Lett. 22(1) (2012)

    Google Scholar 

  14. Fernández Anta, A., Georgiou, C., Mosteiro, M.A.: Designing mechanisms for reliable Internet-based computing. In: Proceedings of IEEE NCA 2008, pp. 315–324 (2008)

    Google Scholar 

  15. Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425–440. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Heien, E.M., Anderson, D.P., Hagihara, K.: Computing low latency batches with unreliable workers in volunteer computing environments. J. Grid Comput. 7(4), 501–518 (2009)

    Article  Google Scholar 

  17. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  18. Kondo, D., Araujo, F., Malecot, P., Domingues, P., Silva, L.M., Fedak, G., Cappello, F.: Characterizing result errors in internet desktop grids. In: Kermarrec, A.-M., Bougé, L., Priol, T. (eds.) Euro-Par 2007. LNCS, vol. 4641, pp. 361–371. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Konwar, K.M., Rajasekaran, S., Shvartsman, M.M.A.A.: Robust network supercomputing with malicious processes. In: Dolev, S. (ed.) DISC 2006. LNCS, vol. 4167, pp. 474–488. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Korpela, E., Werthimer, D., Anderson, D.P., Cobb, J., Lebofsky, M.: SETI@home: massively distributed computing for SETI. Comput. Sci. Eng. 3(1), 78–83 (2001)

    Article  Google Scholar 

  21. Sarmenta, L.F.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561–572 (2002)

    Article  MATH  Google Scholar 

  22. Shneidman, J., Parkes, D.C.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 139–148. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Smith, J.M.: Evolution and the Theory of Games. Cambridge University Press, Cambridge (1982)

    Book  MATH  Google Scholar 

  24. Sonnek, J., Chandra, A., Weissman, J.B.: Adaptive reputation-based scheduling on unreliable distributed infrastructures. IEEE PDS 18(11), 1551–1564 (2007)

    Google Scholar 

  25. Szepesvári, C.: Algorithms for reinforcement learning. Synth. Lect. Artif. Intell. Mach. Learn. 4(1), 1–103 (2010)

    Article  MATH  Google Scholar 

  26. Taufer, M., Anderson, D.P., Cicotti, P., Brooks III, C.L.: Homogeneous redundancy: a technique to ensure integrity of molecular simulation results using public computing. In: Proceedings of IEEE IPDPS 2005 (2005)

    Google Scholar 

  27. Yurkewych, M., Levine, B.N., Rosenberg, A.L.: On the cost-ineffectiveness of redundancy in commercial P2P computing. In: Proceedings of ACM CCS 2005, pp. 280–288 (2005)

    Google Scholar 

Download references

Acknowledgments

Supported in part by MINECO grant TEC2014- 55713-R, Regional Government of Madrid (CM) grant Cloud4BigData (S2013/ICE-2894, co- funded by FSE & FEDER), NSF of China grant 61520106005, EC H2020 grants ReCred and NOTRE, U. of Cyprus (ED-CG2015), the MECD grant FPU2013-03792 and Kean University RTR2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Evgenia Christoforou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A. (2016). Internet Computing: Using Reputation to Select Workers from a Pool. In: Abdulla, P., Delporte-Gallet, C. (eds) Networked Systems. NETYS 2016. Lecture Notes in Computer Science(), vol 9944. Springer, Cham. https://doi.org/10.1007/978-3-319-46140-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46140-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46139-7

  • Online ISBN: 978-3-319-46140-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics