A rational delegating computation protocol based on reputation and smart contract

被引:0
作者
Juan Ma
Yuling Chen
Ziping Wang
Guoxu Liu
Hongliang Zhu
机构
[1] Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology
[2] Guangxi Key Laboratory of Cryptography and Information Security,Blockchain Laboratory of Agricultural Vegetables
[3] Guilin University of Electronic Technology,Engineering Lab for Cloud Security and Information Security Center
[4] Weifang University of Science and Technology,undefined
[5] Beijing University of Posts and Telecommunications,undefined
来源
Journal of Cloud Computing | / 10卷
关键词
Rational delegating computation; Smart contract; Nash equilibrium; Incentive contract; Reputation mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
The delegating computation has become an irreversible trend, together comes the pressing need for fairness and efficiency issues. To solve this problem, we leverage game theory to propose a smart contract-based solution. First, according to the behavioral preferences of the participants, we design an incentive contract to describe the motivation of the participants. Next, to satisfy the fairness of the rational delegating computation, we propose a rational delegating computation protocol based on reputation and smart contract. More specifically, rational participants are to gain the maximum utility and reach the Nash equilibrium in the protocol. Besides, we design a reputation mechanism with a reputation certificate, which measures the reputation from multiple dimensions. The reputation is used to assure the client’s trust in the computing party to improve the efficiency of the protocol. Then, we conduct a comprehensive experiment to evaluate the proposed protocol. The simulation and analysis results show that the proposed protocol solves the complex traditional verification problem. We also conduct a feasibility study that involves implementing the contracts in Solidity and running them on the official Ethereum network. Meanwhile, we prove the fairness and correctness of the protocol.
引用
收藏
相关论文
共 167 条
[1]  
Xu X(2021)Trust-aware service offloading for video surveillance in edge computing enabled internet of vehicles IEEE Trans Intell Transp Syst 22 1787-1796
[2]  
Wu Q(2021)Distributed scheduling problems in intelligent manufacturing systems Tsinghua Sci Technol 26 625-645
[3]  
Qi L(2020)Trust-oriented iot service placement for smart cities in edge computing IEEE Internet Things J 7 4084-4091
[4]  
Dou W(2015)Progress in verifiable computation Sci Sin Informationis 45 1370-1388
[5]  
Tsai S(2017)Incentivized outsourced computation resistant to malicious contractors IEEE Trans Dependable Secure Comput 14 633-649
[6]  
Bhuiyan M(2021)A new entropic criterion model in rational secure two-party computation J Ambient Intell Humanized Comput 9 1-10
[7]  
Fu Y(2020)Belief and fairness: A secure two-party protocol toward the view of entropy for iot devices J Netw Comput Appl 161 102641-25
[8]  
Hou Y(2016)Data verification and verifiable commissioned computing scheme based on fully homomorphic encryption J Beijing Electron Sci Technol Inst 24 21-94
[9]  
Wang Z(2020)Incentive compatible and anti-compounding of wealth in proof-of-stake Inf Sci 530 85-585
[10]  
Wu X(2015)Batch verifiable computation of outsourced functions Des Codes Crypt 77 563-730