Algorithmic mechanisms for internet-based master-worker computing with untrusted and selfish workers

We consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of untrusted worker processors, and collects their responses; examples of such computations are the ¿@home¿ projects such as SETI. Prior work dealing with Internet-based task computations has either considered only rational, or only malicious and altruistic workers. Altruistic workers always return the correct result of the task, malicious workers always return an incorrect result, and rational workers act based on their self-interest. However, in a massive computation platform, such as the Internet, it is expected that all three type of workers coexist. Therefore, in this work we study Internet-based master-worker computations in the presence of Malicious, Altruistic, and Rational workers. A stochastic distribution of the workers over the three types is assumed. Considering all the three types of workers renders a combination of game-theoretic and classical distributed computing approaches to the design of mechanisms for reliable Internet-based computing. Indeed, in this work, such an algorithmic mechanism that makes use of realistic incentives to obtain the correct task result with a parametrized probability is designed. Only when necessary, the incentives are used to force the rational players to a certain equilibrium (which forces the workers to be truthful) that overcomes the attempts of the malicious workers to deceive the master. Finally, the mechanism is analyzed in two realistic Internet-based master-worker applications. This work is an example of how game theory can be used as a tool to formalize and solve a practical Distributed Computing problem such as Internet supercomputing.

[1]  G. Mailath,et al.  Repeated Games and Reputations , 2006 .

[2]  R. Rosenthal A class of games possessing pure-strategy Nash equilibria , 1973 .

[3]  W. G. Horner,et al.  A new method of solving numerical equations of all orders, by continuous approximation , 1815 .

[4]  Dimitris Fotakis,et al.  Memoryless facility location in one pass , 2006, TALG.

[5]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[6]  Martin Gairing,et al.  Malicious Bayesian Congestion Games , 2008, WAOA.

[7]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[8]  Christos H. Papadimitriou,et al.  Worst-case Equilibria , 1999, STACS.

[9]  Joseph Y. Halpern Computer Science and Game Theory: A Brief Survey , 2007, ArXiv.

[10]  Chryssis Georgiou,et al.  Reliably Executing Tasks in the Presence of Untrusted Entities , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[11]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[13]  David P. Anderson,et al.  SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..

[14]  Arnold L. Rosenberg,et al.  On the cost-ineffectiveness of redundancy in commercial P2P computing , 2005, CCS '05.

[15]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[16]  Michael Dahlin,et al.  BAR fault tolerance for cooperative services , 2005, SOSP '05.

[17]  Steve Chien,et al.  Convergence to approximate Nash equilibria in congestion games , 2007, SODA '07.

[18]  Ron Lavi,et al.  Algorithmic Mechanism Design , 2008, Encyclopedia of Algorithms.

[19]  Stefan Schmid,et al.  When selfish meets evil: byzantine players in a virus inoculation game , 2006, PODC '06.

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Sanguthevar Rajasekaran,et al.  Robust Network Supercomputing with Malicious Processes , 2006, DISC.

[22]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[23]  Joseph Y. Halpern,et al.  Ra-tional secret sharing and multiparty computation , 2004, STOC 2004.

[24]  Michael Dahlin,et al.  FlightPath: Obedience vs. Choice in Cooperative Services , 2008, OSDI.

[25]  K. Eliaz Fault Tolerant Implementation , 2002 .

[26]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[27]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[28]  Tim Roughgarden,et al.  How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[29]  Ian T. Foster,et al.  On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.

[30]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[31]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[32]  Moshe Babaioff,et al.  Mixed Strategies in Combinatorial Agency , 2006, WINE.

[33]  Michael Dahlin,et al.  BAR gossip , 2006, OSDI '06.

[34]  Vahab S. Mirrokni,et al.  On spectrum sharing games , 2004, PODC '04.

[35]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[36]  Paul G. Spirakis,et al.  The price of selfish routing , 2001, STOC '01.

[37]  David C. Parkes,et al.  Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.

[38]  Chryssis Georgiou,et al.  Designing Mechanisms for Reliable Internet-based Computing , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[39]  Elias Koutsoupias,et al.  Mechanism Design for Scheduling , 2009, Bull. EATCS.

[40]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..