Abstract
The assignment and execution of tasks over the Internet is an inexpensive solution in contrast with supercomputers. We consider an Internet-based Master-Worker task computing approach, such as SETI@home. A master process sends tasks, across the Internet, to worker processors. Workers execute, and report back a result. Unfortunately, the disadvantage of this approach is the unreliable nature of the worker processes. Through different studies, workers have been categorized as either malicious (always report an incorrect result), altruistic (always report a correct result), or rational (report whatever result maximizes their benefit). We develop a reputation-based mechanism that guarantees that, eventually, the master will always be receiving the correct task result. We model the behavior of the rational workers through reinforcement learning, and we present three different reputation types to choose, for each computational round, the most reputable from a pool of workers. As workers are not always available, we enhance our reputation scheme to select the most responsive workers. We prove sufficient conditions for eventual correctness under the different reputation types. Our analysis is complemented by simulations exploring various scenarios. Our simulation results expose interesting trade-offs among the different reputation types, workers availability, and cost.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
We call these workers malicious for compliance with Volunteer Computing [4] literature. This must not be confused with Byzantine malice assumed in classical distributed computing.
- 2.
In BOINC, honesty means that the worker’s task result agrees with the majority, while in our work this decision is well-founded, since the master audits.
- 3.
The omitted proofs can be found at http://arxiv.org/abs/1603.04394.
- 4.
As we have seen experimentally, first the system reaches a reliable state and then \(p_{\mathcal {A}} =p_{\mathcal {A}} ^{min}\).
References
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of ACM PODC 2006, pp. 53–62 (2006)
Allen, B.: The Einstein@home Project (2014). http://einstein.phys.uwm.edu
Amazon’s Mechanical Turk (2014). https://www.mturk.com
Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of 5th IEEE/ACM International Workshop on Grid Computing, pp. 4–10 (2004)
Anderson, D.P.: Volunteer computing: the ultimate cloud. ACM Crossroads 16(3), 7–10 (2010)
Anderson, D.P.: BOINC reputation (2014). http://boinc.berkeley.edu/trac/wiki/AdaptiveReplication
Anderson, D.P.: BOINC (2016). http://boinc.berkeley.edu/
Bush, R.R., Mosteller, F.: Stochastic Models for Learning (1955)
Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A.: Algorithmic mechanisms for reliable master-worker internet-based computing. IEEE Trans. Comput. 63(1), 179–195 (2014)
Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A., Sánchez, A.: Applying the dynamics of evolution to achieve reliability in master-worker computing. Concurr. Comput.: Pract. Exp. 25(17), 2363–2380 (2013)
Christoforou, E., Anta, A.F., Georgiou, C., Mosteiro, M.A., Sánchez, A.A.: Reputation-based mechanisms for evolutionary master-worker computing. In: Baldoni, R., Nisse, N., van Steen, M. (eds.) OPODIS 2013. LNCS, vol. 8304, pp. 98–113. Springer, Heidelberg (2013)
Estrada, T., Taufer, M., Anderson, D.P.: Performance prediction and analysis of BOINC projects: an empirical study with EMBOINC. J. Grid Comput. 7(4), 537–554 (2009)
Fernández Anta, A., Georgiou, C., López, L., Santos, A.: Reliable internet-based master-worker computing in the presence of malicious workers. Parallel Process. Lett. 22(1) (2012)
Fernández Anta, A., Georgiou, C., Mosteiro, M.A.: Designing mechanisms for reliable Internet-based computing. In: Proceedings of IEEE NCA 2008, pp. 315–324 (2008)
Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425–440. Springer, Heidelberg (2001)
Heien, E.M., Anderson, D.P., Hagihara, K.: Computing low latency batches with unreliable workers in volunteer computing environments. J. Grid Comput. 7(4), 501–518 (2009)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Kondo, D., Araujo, F., Malecot, P., Domingues, P., Silva, L.M., Fedak, G., Cappello, F.: Characterizing result errors in internet desktop grids. In: Kermarrec, A.-M., Bougé, L., Priol, T. (eds.) Euro-Par 2007. LNCS, vol. 4641, pp. 361–371. Springer, Heidelberg (2007)
Konwar, K.M., Rajasekaran, S., Shvartsman, M.M.A.A.: Robust network supercomputing with malicious processes. In: Dolev, S. (ed.) DISC 2006. LNCS, vol. 4167, pp. 474–488. Springer, Heidelberg (2006)
Korpela, E., Werthimer, D., Anderson, D.P., Cobb, J., Lebofsky, M.: SETI@home: massively distributed computing for SETI. Comput. Sci. Eng. 3(1), 78–83 (2001)
Sarmenta, L.F.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561–572 (2002)
Shneidman, J., Parkes, D.C.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 139–148. Springer, Heidelberg (2003)
Smith, J.M.: Evolution and the Theory of Games. Cambridge University Press, Cambridge (1982)
Sonnek, J., Chandra, A., Weissman, J.B.: Adaptive reputation-based scheduling on unreliable distributed infrastructures. IEEE PDS 18(11), 1551–1564 (2007)
Szepesvári, C.: Algorithms for reinforcement learning. Synth. Lect. Artif. Intell. Mach. Learn. 4(1), 1–103 (2010)
Taufer, M., Anderson, D.P., Cicotti, P., Brooks III, C.L.: Homogeneous redundancy: a technique to ensure integrity of molecular simulation results using public computing. In: Proceedings of IEEE IPDPS 2005 (2005)
Yurkewych, M., Levine, B.N., Rosenberg, A.L.: On the cost-ineffectiveness of redundancy in commercial P2P computing. In: Proceedings of ACM CCS 2005, pp. 280–288 (2005)
Acknowledgments
Supported in part by MINECO grant TEC2014- 55713-R, Regional Government of Madrid (CM) grant Cloud4BigData (S2013/ICE-2894, co- funded by FSE & FEDER), NSF of China grant 61520106005, EC H2020 grants ReCred and NOTRE, U. of Cyprus (ED-CG2015), the MECD grant FPU2013-03792 and Kean University RTR2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Christoforou, E., Fernández Anta, A., Georgiou, C., Mosteiro, M.A. (2016). Internet Computing: Using Reputation to Select Workers from a Pool. In: Abdulla, P., Delporte-Gallet, C. (eds) Networked Systems. NETYS 2016. Lecture Notes in Computer Science(), vol 9944. Springer, Cham. https://doi.org/10.1007/978-3-319-46140-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-46140-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46139-7
Online ISBN: 978-3-319-46140-3
eBook Packages: Computer ScienceComputer Science (R0)