skip to main content
10.1145/3397166.3409136acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining

Published:11 October 2020Publication History

ABSTRACT

Proof of Capacity (PoC) is an eco-friendly alternative to Proof of Work for consensus in blockchains since it determines mining rights based on miners' storage rather than computation. In PoC, for every block, a miner executes hashing on part of his dedicated storage. The miner that comes up with the smallest hash value among all miners will win the block. PoC has yet to be applied to mobile applications, due to the storage limitation of mobile devices. Storage offloading can be a viable solution that allows miners to offload mining all files to a cloud storage. In each mining round, a miner can decide whether to mine on his local device or by a cloud virtual machine (VM). Self-mining requires no extra cost but it incurs download delay, which will reduce the chance of winning. Cloud-mining experiences no delay but it brings cost on VMs. This delay-cost tradeoff challenges each miner to determine a ratio between self-mining and cloud-mining to maximize his utility. We model interactions among miners as a non-cooperative game and formulate a Nash equilibrium problem to investigate the effects of offloading on miners' utilities. We analyze the existence and uniqueness of equilibrium and propose a distributed algorithm to achieve the equilibrium in a uniform-delay setting. Further, we extend our results to non-uniform delays since miners may choose different network settings, e.g. 5G, 4G, or 3G. Both numerical evaluation and testbed experiments on Burstcoin are conducted to show the feasibility of storage offloading and to validate the proposed models and theoretical results.

References

  1. P Andrew. 2019. What is Burstcoin?Google ScholarGoogle Scholar
  2. Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).Google ScholarGoogle Scholar
  3. Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) (2002).Google ScholarGoogle Scholar
  4. Bram Cohen and Krzysztof Pietrzak. 2019. The Chia Network Blockchain.Google ScholarGoogle Scholar
  5. Christian Decker, Jochen Seidel, and Roger Wattenhofer. 2016. Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jianbo Du, Liqiang Zhao, Jie Feng, and Xiaoli Chu. 2018. Computation offloading and resource allocation in mixed fog/cloud computing systems with min-max fairness guarantee. IEEE Transactions on Communications 66, 4 (2018), 1594--1608.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 45--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Franco Giannessi and Antonino Maugeri. 1995. Variational inequalities and network equilibrium problems. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  9. Google. 2019. Google Cloud. https://cloud.google.com/Google ScholarGoogle Scholar
  10. Tai Manh Ho, Nguyen H Tran, Cuong T Do, SM Ahsan Kazmi, Tuan LeAnh, and Choong Seon Hong. 2015. Data offloading in heterogeneous cellular networks: Stackelberg game based approach. In 2015 Asia-Pacific Network Operations and Management Symposium. IEEE, 168--173.Google ScholarGoogle ScholarCross RefCross Ref
  11. Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure Information Networks. Springer, 258--272.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Suhan Jiang, Xinyi Li, and Jie Wu. 2019. Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game. In Proc. of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Vol. 15.Google ScholarGoogle ScholarCross RefCross Ref
  13. Ari Juels and Burton S Kaliski Jr. 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security. Acm.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  15. Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August (2012).Google ScholarGoogle Scholar
  16. Daniel Larimer. 2014. Delegated proof-of-stake (dpos). Bitshare whitepaper (2014).Google ScholarGoogle Scholar
  17. Liqing Liu, Zheng Chang, Xijuan Guo, Shiwen Mao, and Tapani Ristaniemi. 2017. Multiobjective optimization for computation offloading in fog computing. IEEE Internet of Things Journal 5, 1 (2017), 283--294.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mengting Liu, F Richard Yu, Yinglei Teng, Victor CM Leung, and Mei Song. 2018. Joint computation offloading and content caching for wireless blockchain networks. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops.Google ScholarGoogle ScholarCross RefCross Ref
  19. Yang Liu, Changqiao Xu, Yufeng Zhan, Zhixin Liu, Jianfeng Guan, and Hongke Zhang. 2017. Incentive mechanism for computation offloading using edge computing: a Stackelberg game approach. Computer Networks 129 (2017), 399--409.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In 2014 IEEE Symposium on Security and Privacy. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  22. Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2018. Spacemint: A cryptocurrency based on proofs of space. Financial Cryptography and Data Security (2018).Google ScholarGoogle Scholar
  23. Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.Google ScholarGoogle Scholar
  24. Fahad Saleh. 2019. Blockchain without waste: Proof-of-stake. Available at SSRN 3183935 (2019).Google ScholarGoogle Scholar
  25. Ali Shoker. 2017. Sustainable blockchain through proof of exercise. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  26. Lingyang Song, Dusit Niyato, Zhu Han, and Ekram Hossain. 2014. Game-theoretic resource allocation methods for device-to-device communication. IEEE Wireless Communications 21, 3 (2014), 136--144.Google ScholarGoogle ScholarCross RefCross Ref
  27. Youming Sun, Hongxiang Shao, Xin Liu, Jian Zhang, Junfei Qiu, and Yuhua Xu. 2015. Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework. TIIS 9, 11 (2015), 4291--4310.Google ScholarGoogle Scholar
  28. Ken's Tech Tips. 2018. Download Speeds: What Do 2G, 3G, 4G and 5G Actually Mean?Google ScholarGoogle Scholar
  29. Xiumin Wang, Xiaoming Chen, Weiwei Wu, Ning An, and Lusheng Wang. 2016. Cooperative application execution in mobile cloud computing: A Stackelberg game approach. IEEE Communications Letters 20, 5 (2016), 946--949.Google ScholarGoogle ScholarCross RefCross Ref
  30. Qiufen Xia, Weifa Liang, Zichuan Xu, and Bingbing Zhou. 2014. Online algorithms for location-aware task offloading in two-tiered mobile cloud environments. In Proceedings of the 2014 IEEE/ACM 7th international conference on utility and cloud computing. IEEE Computer Society, 109--116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Liang Xiao, Caixia Xie, Tianhua Chen, Huaiyu Dai, and H Vincent Poor. 2016. A mobile offloading game against smart attacks. IEEE Access 4 (2016), 2281--2291.Google ScholarGoogle ScholarCross RefCross Ref
  32. Zehui Xiong, Shaohan Feng, Dusit Niyato, Ping Wang, and Zhu Han. 2018. Optimal pricing-based edge computing resource management in mobile blockchain. In 2018 IEEE International Conference on Communications.Google ScholarGoogle ScholarCross RefCross Ref
  33. Huaqing Zhang, Yong Xiao, Shengrong Bu, Dusit Niyato, Richard Yu, and Zhu Han. [n.d.]. Fog computing in multi-tier data center networks: a hierarchical game approach. In 2016 IEEE international conference on communications.Google ScholarGoogle Scholar
  34. Xiaonan Zhang, Linke Guo, Ming Li, and Yuguang Fang. 2016. Social-enabled data offloading via mobile participation-a game-theoretical approach. In 2016 IEEE Global Communications Conference.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Mobihoc '20: Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
          October 2020
          384 pages
          ISBN:9781450380157
          DOI:10.1145/3397166

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 October 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate296of1,843submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader