Skip to main content

Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9603))

Included in the following conference series:

Abstract

Outsourcing computation to remote parties (“workers”) is an increasingly common practice, owing in part to the growth of cloud computing. However, outsourcing raises concerns that outsourced tasks may be completed incorrectly, whether by accident or because workers cheat to minimize their cost and optimize their gain. The goal of this paper is to explore, using game theory, the conditions under which the incentives for all parties can be configured to efficiently disincentivize worker misbehavior, either inadvertent or deliberate. By formalizing multiple scenarios with game theory, we establish conditions to discourage worker cheating that take into account the dynamics of multiple workers, workers with limited capacity, and changing levels of trust. A key novelty of our work is modeling the use of a reputation system to decide how computation tasks are allocated to workers based on their reliability, and we provide insights on strategies for using a reputation system to increase the expected quality of results. Overall, our results contribute to make outsourcing computation more reliable, consistent, and predictable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://home.web.cern.ch/about/computing/worldwide-lhc-computing-grid.

  2. 2.

    https://folding.stanford.edu/.

  3. 3.

    http://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-cias-deal-with-amazon/374632/.

  4. 4.

    https://aws.amazon.com/cloudfront/.

  5. 5.

    https://www.datamaxx.com/.

  6. 6.

    https://www.fbi.gov/about-us/cjis/cjis-security-policy-resource-center.

  7. 7.

    2.3% and 3.9% in the second and third quarters of 2013, respectively, according to a Kaspersky Lab study (http://www.kaspersky.ca/internet-security-center/threats/spam-statistics-report-q2-2013).

  8. 8.

    is the derivative of y with respect to \(q_i\).

References

  1. Aljuraidan, J., Bauer, L., Reiter, M.K., Beckerle, M.: Introducing reputation systems to the economics of outsourcing computations to rational workers. Technical report CMU-CyLab-16-001, Carnegie Mellon University, January 2016

    Google Scholar 

  2. Anati, I., Gueron, S., Johnson, S., Scarlat, V.: Innovative technology for CPU based attestation and sealing. In: Workshop on Hardware and Architectural Support for Security and Privacy (2013)

    Google Scholar 

  3. Awerbuch, B., Kutten, S., Peleg, D.: Competitive distributed job scheduling (extended abstract). In: 24th ACM Symposium on Theory of Computing, pp. 571–580 (1992)

    Google Scholar 

  4. Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon 2008 (2008)

    Google Scholar 

  5. Briggs, H.: Optimal cartel trigger strategies and the number of firms. Rev. Ind. Organ. 11(4), 551–561 (1996)

    Article  Google Scholar 

  6. Commerce, B.E., Jsang, A., Ismail, R.: The beta reputation system. In: 15th Bled Electronic Commerce Conference (2002)

    Google Scholar 

  7. Friedman, J.W.: A non-cooperative equilibrium for supergames. Rev. Econ. Stud. 38(1), 1–12 (1971)

    Article  MATH  Google Scholar 

  8. Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: 40th ACM Symposium on Theory of Computing, May 2008

    Google Scholar 

  9. Hoekstra, M., Lal, R., Pappachan, P., Rozas, C., Phegade, V., del Cuvillo, J.: Using innovative instructions to create trustworthy software solutions. In: Workshop on Hardware and Architectural Support for Security and Privacy (2013)

    Google Scholar 

  10. Ishai, Y., Kushilevitz, E., Ostrovsky, R.: Efficient arguments without short PCPs. In: 22nd IEEE Conference on Computational Complexity, June 2007

    Google Scholar 

  11. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  12. Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: AAMAS 2009, pp. 993–1000 (2009)

    Google Scholar 

  13. Krugman, P.R.: Trigger strategies and price dynamics in equity and foreign exchange markets. Technical report 2459, National Bureau of Economic Research (1987)

    Google Scholar 

  14. Mckeen, F., Alexandrovich, I., Berenzon, A., Rozas, C., Shafi, H., Shanbhogue, V., Savagaonkar, U.: Innovative instructions and software model for isolated execution. In: Workshop on Hardware and Architectural Support for Security and Privacy (2013)

    Google Scholar 

  15. Nojoumian, M., Lethbridge, T.C.: A new approach for the trust calculation in social networks. In: Filipe, J., Obaidat, M.S. (eds.) ICETE 2006. CCIS, vol. 9, pp. 64–77. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70760-8_6

    Chapter  Google Scholar 

  16. Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 18–37. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_2

    Chapter  Google Scholar 

  17. Penmatsa, S.: Game theory based job allocation/load balancing in distributed systems with applications to grid computing. Ph.D. thesis, The University of Texas at San Antonio (2007)

    Google Scholar 

  18. Pham, V., Khouzani, M.H.R., Cid, C.: Optimal contracts for outsourced computation. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 79–98. Springer, Cham (2014). doi:10.1007/978-3-319-12601-2_5

    Google Scholar 

  19. Porter, R.H.: Optimal cartel trigger price strategies. J. Econ. Theor. 29(2), 313–338 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  20. Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G., Russinovich, M.: VC3: trustworthy data analytics in the cloud using SGX. In: 36th IEEE Symposium on Security and Privacy, May 2015

    Google Scholar 

  21. Teacy, W., Patel, J., Jennings, N., Luck, M.: Travos: trust and reputation in the context of inaccurate information sources. Auton. Agent. Multi-Agent Syst. 12(2), 183–198 (2006)

    Article  Google Scholar 

  22. Tran, T., Cohen, R.: Improving user satisfaction in agent-based electronic marketplaces by reputation modelling and adjustable product quality. In: AAMAS 2004, pp. 828–835 (2004)

    Google Scholar 

  23. Trusted Computing Group: Trusted platform module main specification, version 1.2, revision 103 (2007)

    Google Scholar 

  24. Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)

    Article  Google Scholar 

  25. Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of 7th International Workshop on Trust in Agent Societies, vol. 6, pp. 106–117 (2004)

    Google Scholar 

  26. Yagoubi, B., Medebber, M.: A load balancing model for grid environment. In: 22nd International Symposium on Computer and Information Sciences, pp. 1–7 (2007)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by NSF grant 1330599 and by the Army Research Laboratory under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jassim Aljuraidan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Cite this paper

Aljuraidan, J., Bauer, L., Reiter, M.K., Beckerle, M. (2017). Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. In: Grossklags, J., Preneel, B. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54970-4_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54969-8

  • Online ISBN: 978-3-662-54970-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics