Incentivizing Outsourced Computation

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=OK5rl0Tuc7Q



Duration: 56:26
56 views
3


We describe different strategies a central authority, the boss, can use to distribute computation to untrusted contractors. Our problem is inspired by volunteer distributed computing projects such as SETI@home, which outsource computation to large numbers of participants. For many tasks, verifying a task's output requires as much work as computing it again; additionally, some tasks may produce certain outputs with greater probability than others. A selfish contractor may try to exploit these factors, by submitting potentially incorrect results and claiming a reward. Further, malicious contractors may respond incorrectly, to cause direct harm or to create additional overhead for result-checking. We consider the scenario where there is a credit system whereby users can be rewarded for good work and fined for cheating. We show how to set rewards and fines that incentivize proper behavior from rational contractors, and mitigate the damage caused by malicious contractors. We analyze two strategies: random double-checking by the boss, and hiring multiple contractors to perform the same job. We also present a bounty mechanism when multiple contractors are employed; the key insight is to give a reward to a contractor who catches another worker cheating. Furthermore, if we can assume that at least a small fraction h of the contractors are honest (1), then we can provide graceful degradation for the accuracy of the system and the work the boss has to perform. This is much better than the Byzantine approach, which typically assumes h > 60.




Other Videos By Microsoft Research


2016-09-08In the Plex: How Google Thinks, Works, and Shapes Our Lives
2016-09-08When Gadgets Betray Us: The Dark Side of our Infatuation with New Technologies
2016-09-08Modernist Cuisine: The Art and Science of Cooking
2016-09-08An Optimist's Tour of the Future: One Curious Man Sets Out to Answer What's
2016-09-08The Net Delusion: The Dark Side of Internet Freedom
2016-09-08A Rigorous Perspective on Liouville Quantum Gravity & KPZ
2016-09-08Computing class polynomials with the Chinese Remainder Theorem
2016-09-08Theory Plus Practice in Computer Security: Radio Frequency Identification and Whitebox Fuzzing [1/4]
2016-09-08Why the Rich Get Richer, Cheaters Get Caught and Your Neighbor Usually Looks Like You [1/2]
2016-09-08Embedded Memory in Nanometer Regime
2016-09-08Incentivizing Outsourced Computation
2016-09-08Random Sorting Networks
2016-09-08SOLAR REVOLUTION: THE ECONOMIC TRANSFORMATION OF THE GLOBAL ENERGY INDUSTRY
2016-09-08Are You Ready to Succeed? Unconventional Strategies to Achieving Mastery in Business and Life [1/2]
2016-09-08Counting independent sets up to the tree threshold
2016-09-08Randomly coloring planar graphs with fewer colors than the maximum degree
2016-09-07Drop Dead Healthy: One Man's Humble Quest for Bodily Perfection
2016-09-07Corner percolation and the square root of 17
2016-09-07Information Interfaces: Blending Information Visualization and Human-Computer Interaction
2016-09-07Towards Agnostically Learning Halfspace [1/6]
2016-09-07Approximability of the Unique Coverage Problem



Tags:
microsoft research