Nothing Special   »   [go: up one dir, main page]

Skip to main content

Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Abstract

The previous schemes for rational delegation of computation resorting to game theory focus on what is the possible equilibrium results. However, they seem to ignore how to design an optimal incentive mechanism scientifically and effectively so that the final result meets designer’s expectations when a information structure is given. More importantly, there is an open question that whether the designed rational delegation of computation protocol is still secure in the UC framework. To address these challenges, in this paper, we first construct a reputation model leveraging Gompertz model to ensure that client can choose high-quality computing parties. Secondly, we design an optimal mechanism resorting to contract theory in the case of information asymmetry. Then we construct an ideal functionality for rational delegation of computation based on reputation and contract theory. In addition, we design a protocol for rational delegation of computation based on reputation and contract theory to securely realize the functionality. In the end, we prove that the proposed protocol is still secure in the UC framework.

Supported by the National Natural Science Foundation of China under Grant Nos. 61662009 and 61772008; Science and Technology Major Support Program of Guizhou Province under Grant No. 20183001; Ministry of Education-China Mobile Research Fund Project under Grant No. MCM20170401; Key Program of the National Natural Science Union Foundation of China under Grant No. U1836205; Science and Technology Program of Guizhou Province under Grant No. [2019]1098; Project of High-level Innovative Talents of Guizhou Province under Grant No. [2020]6008; Innovative talent team of Guizhou ordinary colleges and Universitie(Guizhou-Education-Talent-Team[2013]09).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Feigenbaum, J., Yang, Y.R. (eds.) NetEcon 2008, pp. 85–90. ACM, New York (2008). https://doi.org/10.1145/1403027.1403046

    Chapter  Google Scholar 

  2. Bolton, P., Dewatripont, M.: Contract Theory. The MIT Press, Cambridge (2005)

    Google Scholar 

  3. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136–145. IEEE (2001). https://doi.org/10.1109/SFCS.2001.959888

  4. Dong, C., Wang, Y., Aldweesh, A., McCorry, P., van Moorsel, A.: Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) CCS 2017, pp. 211–227. ACM, New York (2017). https://doi.org/10.1145/3133956.3134032

    Chapter  Google Scholar 

  5. Huang, K.L., Kanhere, S.S., Hu, W.: On the need for a reputation system in mobile phone based sensing. Ad Hoc Netw. 12, 130–149 (2014)

    Article  Google Scholar 

  6. Kang, J., Xiong, Z., Niyato, D., Xie, S., Zhang, J.: Incentive mechanism for reliable federated learning: a joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 6(6), 10700–10714 (2019)

    Article  Google Scholar 

  7. Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D.I., Zhao, J.: Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 68(3), 2906–2920 (2019)

    Article  Google Scholar 

  8. Kenney, J.F., Keeping, E.S.: Mathematics of statistics-part one (1954)

    Google Scholar 

  9. Küpçü, A.: Incentivized outsourced computation resistant to malicious contractors. IEEE Trans. Dependable Secur. Comput. 14(6), 633–649 (2017)

    Article  Google Scholar 

  10. Ma, X., Ma, J., Hui, L., Qi, J., Sheng, G.: RTRC: a reputation-based incentive game model for trustworthy crowdsourcing service. Commun. China 13(12), 199–215 (2016)

    Article  Google Scholar 

  11. Tian, Y., Guo, J., Wu, Y., Lin, H.: Towards attack and defense views of rational delegation of computation. IEEE Access 7, 44037–44049 (2019)

    Article  Google Scholar 

  12. Zeng, M., Li, Y., Zhang, K., Waqas, M., Jin, D.: Incentive mechanism design for computation offloading in heterogeneous fog computing: a contract-based approach. In: ICC 2018, pp. 1–6. IEEE (2018). https://doi.org/10.1109/ICC.2018.8422684

  13. Zhang, Y., van der Schaar, M.: Reputation-based incentive protocols in crowdsourcing applications. In: Greenberg, A.G., Sohraby, K. (eds.) INFOCOM 2012, pp. 2140–2148. IEEE (2012). https://doi.org/10.1109/INFCOM.2012.6195597

  14. Zhou, Z., Liu, P., Feng, J., Zhang, Y., Mumtaz, S., Rodriguez, J.: Computation resource allocation and task assignment optimization in vehicular fog computing: a contract-matching approach. IEEE Trans. Veh. Technol. 68(4), 3113–3125 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their valuable comments and helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youliang Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jiang, X., Tian, Y. (2020). Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics