This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Payments for Outsourced Computations
February 2012 (vol. 23 no. 2)
pp. 313-320
Bogdan Carbunar, Florida International University, Miami
Mahesh V. Tripunitara, The University of Waterloo, Waterloo
With the recent advent of cloud computing, the concept of outsourcing computations, initiated by volunteer computing efforts, is being revamped. While the two paradigms differ in several dimensions, they also share challenges, stemming from the lack of trust between outsourcers and workers. In this work, we propose a unifying trust framework, where correct participation is financially rewarded: neither participant is trusted, yet outsourced computations are efficiently verified {and} validly remunerated. We propose three solutions for this problem, relying on an offline bank to generate and redeem payments; the bank is oblivious to interactions between outsourcers and workers. We propose several attacks that can be launched against our framework and study the effectiveness of our solutions. We implemented our most secure solution and our experiments show that it is efficient: the bank can perform hundreds of payment transactions per second and the overheads imposed on outsourcers and workers are negligible.

[1] ABC@Home, http:/abcathome.com/, 2011.
[2] M. Belenkiy, M. Chase, C.C. Erway, J. Jannotti, A. Küpçü, and A. Lysyanskaya, "Incentivizing Outsourced Computation," NetEcon '08: Proc. Third Int'l Workshop Economics of Networked Systems, 2008.
[3] M. Bellare and P. Rogaway, "Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols," Proc. First ACM Conf. Computer and Comm. (CCS '93) Security, pp. 62-73, 1993.
[4] B. Carbunar and R. Sion, "Uncheatable Reputation for Distributed Computation Markets," Proc. Int'l Conf. Financial Cryptography (FC) and Data Security, 2006.
[5] B. Carbunar and M. Tripunitara, "Fair Payments for Outsourced Computations," Proc. Seventh IEEE Int'l Conf. Sensor, Ad Hoc and Mesh Comm. and Networks (SECON), 2010.
[6] B. Carbunar and M.V. Tripunitara, "Conditional Payments for Computing Markets," CANS '08: Proc. Int'l Conf. Cryptology and Network Security, pp. 317-331, Dec. 2008.
[7] W. Du, J. Jia, M. Mangal, and M. Murugesan, "Uncheatable Grid Computing," Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS), 2004.
[8] O. Goldreich, The Foundations of Cryptography, vol. 1. Cambridge Univ. Press, 2001.
[9] P. Golle and I. Mironov, "Uncheatable Distributed Computations," Proc. Conf. Topics in Cryptology: Cryptographer's Track at RSA, pp. 425-440, 2001.
[10] P. Golle and S.G. Stubblebine, "Secure Distributed Computing in a Commercial Environment," FC '01: Proc. Fifth Int'l Conf. Financial Cryptography, pp. 289-304, 2002.
[11] F. Monrose, P. Wyckoff, and A. Rubin, "Distributed Execution with Remote Audit," Proc. Network and Distributed System Security Symp., 1999.
[12] L.F.G. Sarmenta, "Sabotage-Tolerance Mechanisms for Volunteer Computing Systems," Future Generation Computer Systems: Special Issue on Cluster Computing and the Grid, vol. 18, pp. 561-572, Mar. 2002.
[13] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
[14] D. Szajda, B. Lawson, and J. Owen, "Hardening Functions for Large-Scale Distributed Computations," Proc. IEEE Symp. Security and Privacy, pp. 216-224, 2003.
[15] D. Szajda, B. Lawson, and J. Owen, "Toward an Optimal Redundancy Strategy for Distributed Computations," Proc. IEEE Int'l Conf. Cluster Computing (Cluster), 2005.

Index Terms:
Distributed applications, security and privacy protection.
Citation:
Bogdan Carbunar, Mahesh V. Tripunitara, "Payments for Outsourced Computations," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 2, pp. 313-320, Feb. 2012, doi:10.1109/TPDS.2011.163
Usage of this product signifies your acceptance of the Terms of Use.