Smart Contracts for Incentivized Outsourcing of Computation

被引:0
|
作者
Kupcu, Alptekin [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] Koc Univ, Istanbul, Turkey
[2] Univ Calgary, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Incentivized computation; Outsourced computation; Smart contract; Game theory; Mechanism design; COMPLEXITY;
D O I
10.1007/978-3-030-93944-1_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing computation allows a resource limited client to expand its computational capabilities by outsourcing computation to other computing nodes or clouds. A basic requirement of outsourcing is providing assurance that the computation result is correct. We consider a smart contract based outsourcing system that achieves assurance by replicating the computation on two servers, and accepts the computation result if the two responses match. Correct computation result is obtained by using incentivization to instigate correct behaviour in servers. We show that all previous replication based incentivized outsourcing protocols with proven correctness fail when automated by a smart contract, because of the copy attack where a contractor simply copies the submitted response of the other contractor. We then design an incentivization mechanism that uses two lightweight challenge-response protocols that are used when the submitted results are compared, and employs monetary rewards, fines, and bounties to incentivize correct computation. We use game theory to model and analyze our mechanism, and prove that with appropriate choices of the mechanism parameters, there is a single Nash equilibrium corresponding to the contractors' strategy of correctly computing the result. Our work provides a foundation for replicated incentivized computation in smart contract setting, and opens new research directions.
引用
收藏
页码:245 / 261
页数:17
相关论文
共 50 条
  • [1] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83
  • [2] Verifiable Computation using Smart Contracts
    Avizheh, Sepideh
    Nabi, Mahmudun
    Safavi-Naini, Reihaneh
    Venkateswarlu, Muni K.
    [J]. CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 17 - 28
  • [3] A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts
    Muzumdar, Ajit
    Modi, Chirag
    Madhu, G. M.
    Vyjayanthi, C.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 183
  • [4] Enabling MapReduce based Parallel Computation in Smart Contracts
    Muchhala, Nash
    Singhania, Harshit
    Sheth, Sahil
    Devadkar, Kailas
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 537 - 543
  • [5] A Conceptual Framework for Trustworthy and Incentivized Trading of Food Grains using Distributed Ledger and Smart Contracts
    Jaiswal, Alok
    Chandel, Sheetal
    Muzumdar, Ajit
    Madhu, G. M.
    Modi, Chirag
    Vyjayanthi, C.
    [J]. 2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,
  • [6] Interpretation of Contracts and Smart Contracts: Smart Interpretation or Interpretation of Smart Contracts?
    Cannarsa, Michel
    [J]. EUROPEAN REVIEW OF PRIVATE LAW, 2018, 26 (06): : 773 - 785
  • [7] Smart Contracts Contracts
    Bartoletti, Massimo
    [J]. FRONTIERS IN BLOCKCHAIN, 2020, 3
  • [8] Secure Replication-Based Outsourced Computation Using Smart Contracts
    Susilo, Willy
    Guo, Fuchun
    Zhao, Zhen
    Jiang, Yinhao
    Ge, Chunpeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3711 - 3722
  • [9] Renegotiation of Software Outsourcing Contracts
    Huang, He
    Hu, Minhui
    Kauffman, Robert J.
    Xu, Hongyan
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 6612 - 6618
  • [10] Managing security for outsourcing contracts
    Sherwood, J
    [J]. COMPUTERS & SECURITY, 1997, 16 (07) : 603 - 609