On the cost-ineffectiveness of redundancy in commercial P2P computing

We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated for work). We study the cost of implementing redundant task allocation (redundancy, for short) as a means of preventing cheating. Under the assumption that clients are motivated solely by the desire to maximize expected profit, we prove that, within this framework, redundancy is cost effective only when collusion among clients, including the Sybil attack, can be prevented. We show that in situations where this condition cannot be met, non-redundant task allocation is much less costly than redundancy.

[1]  Margo I. Seltzer,et al.  Scooped, Again , 2003, IPTPS.

[2]  Philippe Golle,et al.  Secure Distributed Computing in a Commercial Environment , 2002, Financial Cryptography.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[5]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[6]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[7]  M. Kendall Probability and Statistical Inference , 1956, Nature.

[8]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[9]  Dilip Mookherjee,et al.  Optimal Auditing, Insurance, and Redistribution , 1989 .

[10]  David C. Parkes,et al.  Using redundancy to improve robustness of distributed mechanism implementations , 2003, EC '03.

[11]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[12]  Ueli Maurer,et al.  Information-Theoretic Cryptography , 1999, CRYPTO.

[13]  Joan Feigenbaum,et al.  Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.

[14]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Ian T. Foster,et al.  On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.

[17]  Eric van Damme,et al.  Non-Cooperative Games , 2000 .

[18]  Martin J. Osborne,et al.  An Introduction to Game Theory , 2003 .

[19]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[20]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[21]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[22]  P. J. Green,et al.  Probability and Statistical Inference , 1978 .

[23]  Jin-Yi Cai,et al.  On the Hardness of Permanent , 1999, STACS.

[24]  David Naccache,et al.  Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.

[25]  David C. Parkes,et al.  Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.