Proceedings of the 12th ACM Conference on Computer and Communications Security 2005
DOI: 10.1145/1102120.1102157
|View full text |Cite
|
Sign up to set email alerts
|

On the cost-ineffectiveness of redundancy in commercial P2P computing

Abstract: We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated for work). We study the cost of implementing redundant task allocation (redundancy, for short) as a means of preventing cheating. Under the assumption that clients are motivated solely by the desire to maximize expected profit, we prove that, within this framework, redundancy is cost effective only when collusion among clients, includ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(30 citation statements)
references
References 21 publications
0
30
0
Order By: Relevance
“…In the realm of collusion characterization, prior works include group-based agreement techniques [8], the use of checkpoints (trickle messages) for incremental checking [15], game theoretic approaches [16], graph clustering techniques [17], and detection of errors in dependent task chains [18]. However, these papers do not address the task allocation problem in the presence of collusion.…”
Section: Related Workmentioning
confidence: 99%
“…In the realm of collusion characterization, prior works include group-based agreement techniques [8], the use of checkpoints (trickle messages) for incremental checking [15], game theoretic approaches [16], graph clustering techniques [17], and detection of errors in dependent task chains [18]. However, these papers do not address the task allocation problem in the presence of collusion.…”
Section: Related Workmentioning
confidence: 99%
“…However, Internetbased computing (referred sometimes as P2P computing-P2PC [13], [39]) has not reached its full potential due to the untrustworthy nature of the platform's components [3], [16]. Typically, in Internet-based computing (e.g., in SETI) the following Master-Worker approach is employed: A master computer sends jobs or tasks, across the Internet, to worker computers that are willing to execute them.…”
Section: A Motivation and Prior Workmentioning
confidence: 99%
“…Ensuring that quiz tasks are indistinguishable from regular tasks, however, is a difficult problem. Similarly, Yurkewych, Levine, and Rosenberg propose a way to estimate the cost of a redundancy mechanism in the presence of colluders using game theory (see [9]). In this work, the goal is to determine the probability of auditing a task that minimizes the risk of collusion.…”
Section: Related Workmentioning
confidence: 99%