Algorithmic Mechanisms for Reliable Master-Worker Internet-Based Computing

We consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of untrusted worker processors, and collects their responses. Examples of such computations are the “@home” projects such as SETI. In this work, various worker behaviors are considered. Altruistic workers always return the correct result of the task, malicious workers always return an incorrect result, and rational workers act based on their self-interest. In a massive computation platform, such as the Internet, it is expected that all three type of workers coexist. Therefore, in this work, we study Internet-based master-worker computations in the presence of malicious, altruistic, and rational workers. A stochastic distribution of the workers over the three types is assumed. In addition, we consider the possibility that the communication between the master and the workers is not reliable, and that workers could be unavailable. Considering all the three types of workers renders a combination of game-theoretic and classical distributed computing approaches to the design of mechanisms for reliable Internet-based computing. Indeed, in this work, we design and analyze two algorithmic mechanisms to provide appropriate incentives to rational workers to act correctly, despite the malicious workers' actions and the unreliability of the communication. Only when necessary, the incentives are used to force the rational players to a certain equilibrium (which forces the workers to be truthful) that overcomes the attempt of the malicious workers to deceive the master. Finally, the mechanisms are analyzed in two realistic Internet-based master-worker settings, a SETI-like one and a contractor-based one, such as Amazon's mechanical turk. We also present plots that illustrate the tradeoffs between reliability and cost, under different system parameters.

[1]  R. Rosenthal A class of games possessing pure-strategy Nash equilibria , 1973 .

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[4]  Paul G. Spirakis,et al.  The Price of Selfish Routing , 2001, STOC '01.

[5]  Francine Berman,et al.  Models and scheduling mechanisms for global computing applications , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[6]  Dimitris Fotakis,et al.  Memoryless facility location in one pass , 2006, TALG.

[7]  Ittai Abraham,et al.  Distributed computing meets game theory: combining insights from two fields , 2011, SIGA.

[8]  Michael Dahlin,et al.  FlightPath: Obedience vs. Choice in Cooperative Services , 2008, OSDI.

[9]  Stefan Schmid,et al.  On the windfall of friendship: inoculation strategies on social networks , 2008, EC '08.

[10]  Vahab S. Mirrokni,et al.  On spectrum sharing games , 2004, PODC '04.

[11]  David C. Parkes,et al.  Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.

[12]  David P. Anderson,et al.  SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..

[13]  Michael Dahlin,et al.  BAR fault tolerance for cooperative services , 2005, SOSP '05.

[14]  Steve Chien,et al.  Convergence to approximate Nash equilibria in congestion games , 2007, SODA '07.

[15]  Stefan Schmid,et al.  Distributed asymmetric verification in computational grids , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[16]  Chryssis Georgiou,et al.  Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion ⋆ , 2009 .

[17]  Chryssis Georgiou,et al.  Designing Mechanisms for Reliable Internet-based Computing , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[18]  A. Mas-Colell,et al.  Microeconomic Theory , 1995 .

[19]  Martin Hoefer,et al.  Altruism in Atomic Congestion Games , 2013, TEAC.

[20]  Chryssis Georgiou,et al.  Reliably Executing Tasks in the Presence of Untrusted Entities , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[21]  Luis F. G. Sarmenta,et al.  Sabotage-tolerance mechanisms for volunteer computing systems , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[22]  W. G. Horner,et al.  A new method of solving numerical equations of all orders, by continuous approximation , 1815 .

[23]  Petr Kuznetsov,et al.  Towards Network Games with Social Preferences , 2010, SIROCCO.

[24]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[25]  Jörgen W. Weibull,et al.  Evolutionary Game Theory , 1996 .

[26]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[27]  Csaba Szepesvári,et al.  Algorithms for Reinforcement Learning , 2010, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[28]  Gilles Fedak,et al.  Characterizing Result Errors in Internet Desktop Grids , 2007, Euro-Par.

[29]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[30]  Tim Roughgarden,et al.  How bad is selfish routing? , 2002, JACM.

[31]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[32]  Kenichi Hagihara,et al.  Computing Low Latency Batches with Unreliable Workers in Volunteer Computing Environments , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[33]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[34]  John R. Douceur,et al.  Lottery trees: motivational deployment of networked systems , 2007, SIGCOMM '07.

[35]  Sanguthevar Rajasekaran,et al.  Robust Network Supercomputing with Malicious Processes , 2006, DISC.

[36]  Josef Hofbauer,et al.  Evolutionary Games and Population Dynamics , 1998 .

[37]  Jonathan Bendor,et al.  Aspiration-Based Reinforcement Learning in Repeated Interaction Games: an Overview , 2001, IGTR.

[38]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[39]  Stefan Schmid,et al.  Combinatorial agency with audits , 2009, 2009 International Conference on Game Theory for Networks.

[40]  Ian T. Foster,et al.  On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.

[41]  K. Eliaz Fault Tolerant Implementation , 2002 .

[42]  Dirk Ifenthaler,et al.  Stochastic Models of Learning , 2012 .

[43]  David P. Anderson,et al.  Homogeneous redundancy: a technique to ensure integrity of molecular simulation results using public computing , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[44]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[45]  Christos H. Papadimitriou,et al.  Worst-case equilibria , 1999 .

[46]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[47]  Moshe Babaioff,et al.  Congestion games with malicious players , 2007, EC '07.

[48]  S. Wong An authentication protocol in Web-computing , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[49]  Elias Koutsoupias,et al.  Mechanism Design for Scheduling , 2009, Bull. EATCS.

[50]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[51]  Moshe Tennenholtz,et al.  k-Implementation , 2003, EC '03.

[52]  David P. Anderson,et al.  Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC , 2009, Journal of Grid Computing.

[53]  Noam Nisan,et al.  Algorithmic Mechanism Design , 2001, Games Econ. Behav..

[54]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[55]  Moshe Babaioff,et al.  Combinatorial agency , 2006, ACM Conference on Economics and Computation.

[56]  Moshe Babaioff,et al.  Mixed Strategies in Combinatorial Agency , 2006, WINE.

[57]  Chryssis Georgiou,et al.  Algorithmic mechanisms for internet-based master-worker computing with untrusted and selfish workers , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).

[58]  Joseph Y. Halpern Computer Science and Game Theory: A Brief Survey , 2007, ArXiv.

[59]  C. Cannings,et al.  Evolutionary Game Theory , 2010 .

[60]  Stefan Schmid,et al.  When selfish meets evil: byzantine players in a virus inoculation game , 2006, PODC '06.

[61]  Arnold L. Rosenberg,et al.  On the cost-ineffectiveness of redundancy in commercial P2P computing , 2005, CCS '05.

[62]  George Karakostas,et al.  Equilibria for networks with malicious users , 2007, ISAAC.

[63]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[64]  Moshe Babaioff,et al.  Free-Riding and Free-Labor in Combinatorial Agency , 2009, SAGT.

[65]  Michael Dahlin,et al.  BAR gossip , 2006, OSDI '06.

[66]  Noga Alon,et al.  Bayesian ignorance , 2010, PODC '10.

[67]  Martin Gairing,et al.  Malicious Bayesian Congestion Games , 2008, WAOA.