Abstract
Volunteer Computing (VC) is one of methods of distributed computing. In VC process, several volunteers provide their computing resources for some computational purposes. Because most VC is supposed to be executed based on a situation that each volunteer is an honest one, in a case that some malicious volunteers are inside the VC network, the VC contains potential risk of causing to output an unreliable computational result. To improve the reliability of the computational result, several existing VCs adopt a method of majority voting using reliability parameters. However, this method contains potential vulnerability against to “Sybil Attack”. Therefore, in this paper, we propose our VC system using blockchain technology named “Hierarchy-System” to solve these problems and also show the evaluation result executed on a VC system simulated our proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, Burlington (1999)
Kondo, D., et al.: Cost-benefit analysis of cloud computing versus desktop grids. In: IPDPS, vol. 9 (2009)
Anderson, D.P., Fedak, G.: The computational and storage potential of volunteer computing. In: Sixth IEEE International Symposium on Cluster Computing and the Grid, CCGRID 2006, vol. 1. IEEE (2006)
Anderson, D.P.: Boinc: a system for public-resource computing and storage. In: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing. IEEE (2004)
Woltman, G.: GIMPS, The Great Internet Mersenne Prime Search (2007)
Shirts, M., Pande, V.S.: Screen savers of the world unite! Science 290(5498), 1903–1904 (2000)
Anderson, D.P., et al.: SETI@ home: an experiment in public-resource computing. Commun. ACM 45(11), 56–61 (2002)
FightAIDS@Home. http://fightaidsathome.scripps.edu/
Folding@home: Lessons from eight years of volunteer distributed computing. IEEEIPDPS (2009)
Cochran, E.S., et al.: The quake-catcher network: citizen science expanding seismic horizons. Seismol. Res. Lett. 80(1), 26–30 (2009)
Sarmenta, L.F.G.: Volunteer computing. Ph.D. thesis. Department of Electrical Engineering and Computer Science, MIT, Cambridge, MA, December 2000
Douceur, J.R. The sybil attack. In: International workshop on peer-to-peer systems. Springer, Heidelberg (2002)
Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. In: Proceedings of the First IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 337–346. IEEE (2001)
Watanabe, K., et al.: The effectiveness for spot-checking about Secure VC. Inst. Electroni. Inf. Commun. Eng. 111(408), 103–108 (2012)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382–401 (1982)
Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: International Conference on Financial Cryptography and Data Security. Springer, Heidelberg (2016)
Castro, L.M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398–461 (2002)
Bastiaan, M.: Preventing the 51%-attack: a stochastic analysis of two phase proof of work in Bitcoin (2015). http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf
Acknowledgment
This research was supported by the National Institute of Science and Technology Corporation (JST) Strategic International Collaborative Research Program (SICORP) and the grant of JSPS Grant-in-Aid for Scientific Research JP18H03240, we thank you here.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shota, J., Kosuke, K., Sharma, S., Kouichi, S. (2020). Simulation of Secure Volunteer Computing by Using Blockchain. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_74
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_74
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)