ABSTRACT
Proof of Capacity (PoC) is an eco-friendly alternative to Proof of Work for consensus in blockchains since it determines mining rights based on miners' storage rather than computation. In PoC, for every block, a miner executes hashing on part of his dedicated storage. The miner that comes up with the smallest hash value among all miners will win the block. PoC has yet to be applied to mobile applications, due to the storage limitation of mobile devices. Storage offloading can be a viable solution that allows miners to offload mining all files to a cloud storage. In each mining round, a miner can decide whether to mine on his local device or by a cloud virtual machine (VM). Self-mining requires no extra cost but it incurs download delay, which will reduce the chance of winning. Cloud-mining experiences no delay but it brings cost on VMs. This delay-cost tradeoff challenges each miner to determine a ratio between self-mining and cloud-mining to maximize his utility. We model interactions among miners as a non-cooperative game and formulate a Nash equilibrium problem to investigate the effects of offloading on miners' utilities. We analyze the existence and uniqueness of equilibrium and propose a distributed algorithm to achieve the equilibrium in a uniform-delay setting. Further, we extend our results to non-uniform delays since miners may choose different network settings, e.g. 5G, 4G, or 3G. Both numerical evaluation and testbed experiments on Burstcoin are conducted to show the feasibility of storage offloading and to validate the proposed models and theoretical results.
- P Andrew. 2019. What is Burstcoin?Google Scholar
- Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).Google Scholar
- Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) (2002).Google Scholar
- Bram Cohen and Krzysztof Pietrzak. 2019. The Chia Network Blockchain.Google Scholar
- Christian Decker, Jochen Seidel, and Roger Wattenhofer. 2016. Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM.Google ScholarDigital Library
- Jianbo Du, Liqiang Zhao, Jie Feng, and Xiaoli Chu. 2018. Computation offloading and resource allocation in mixed fog/cloud computing systems with min-max fairness guarantee. IEEE Transactions on Communications 66, 4 (2018), 1594--1608.Google ScholarCross Ref
- Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 45--59.Google ScholarDigital Library
- Franco Giannessi and Antonino Maugeri. 1995. Variational inequalities and network equilibrium problems. Springer.Google ScholarCross Ref
- Google. 2019. Google Cloud. https://cloud.google.com/Google Scholar
- Tai Manh Ho, Nguyen H Tran, Cuong T Do, SM Ahsan Kazmi, Tuan LeAnh, and Choong Seon Hong. 2015. Data offloading in heterogeneous cellular networks: Stackelberg game based approach. In 2015 Asia-Pacific Network Operations and Management Symposium. IEEE, 168--173.Google ScholarCross Ref
- Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure Information Networks. Springer, 258--272.Google ScholarDigital Library
- Suhan Jiang, Xinyi Li, and Jie Wu. 2019. Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game. In Proc. of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Vol. 15.Google ScholarCross Ref
- Ari Juels and Burton S Kaliski Jr. 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security. Acm.Google ScholarDigital Library
- Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer.Google ScholarCross Ref
- Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August (2012).Google Scholar
- Daniel Larimer. 2014. Delegated proof-of-stake (dpos). Bitshare whitepaper (2014).Google Scholar
- Liqing Liu, Zheng Chang, Xijuan Guo, Shiwen Mao, and Tapani Ristaniemi. 2017. Multiobjective optimization for computation offloading in fog computing. IEEE Internet of Things Journal 5, 1 (2017), 283--294.Google ScholarCross Ref
- Mengting Liu, F Richard Yu, Yinglei Teng, Victor CM Leung, and Mei Song. 2018. Joint computation offloading and content caching for wireless blockchain networks. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops.Google ScholarCross Ref
- Yang Liu, Changqiao Xu, Yufeng Zhan, Zhixin Liu, Jianfeng Guan, and Hongke Zhang. 2017. Incentive mechanism for computation offloading using edge computing: a Stackelberg game approach. Computer Networks 129 (2017), 399--409.Google ScholarDigital Library
- Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In 2014 IEEE Symposium on Security and Privacy. IEEE.Google ScholarDigital Library
- Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google Scholar
- Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2018. Spacemint: A cryptocurrency based on proofs of space. Financial Cryptography and Data Security (2018).Google Scholar
- Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.Google Scholar
- Fahad Saleh. 2019. Blockchain without waste: Proof-of-stake. Available at SSRN 3183935 (2019).Google Scholar
- Ali Shoker. 2017. Sustainable blockchain through proof of exercise. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). IEEE, 1--9.Google ScholarCross Ref
- Lingyang Song, Dusit Niyato, Zhu Han, and Ekram Hossain. 2014. Game-theoretic resource allocation methods for device-to-device communication. IEEE Wireless Communications 21, 3 (2014), 136--144.Google ScholarCross Ref
- Youming Sun, Hongxiang Shao, Xin Liu, Jian Zhang, Junfei Qiu, and Yuhua Xu. 2015. Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework. TIIS 9, 11 (2015), 4291--4310.Google Scholar
- Ken's Tech Tips. 2018. Download Speeds: What Do 2G, 3G, 4G and 5G Actually Mean?Google Scholar
- Xiumin Wang, Xiaoming Chen, Weiwei Wu, Ning An, and Lusheng Wang. 2016. Cooperative application execution in mobile cloud computing: A Stackelberg game approach. IEEE Communications Letters 20, 5 (2016), 946--949.Google ScholarCross Ref
- Qiufen Xia, Weifa Liang, Zichuan Xu, and Bingbing Zhou. 2014. Online algorithms for location-aware task offloading in two-tiered mobile cloud environments. In Proceedings of the 2014 IEEE/ACM 7th international conference on utility and cloud computing. IEEE Computer Society, 109--116.Google ScholarDigital Library
- Liang Xiao, Caixia Xie, Tianhua Chen, Huaiyu Dai, and H Vincent Poor. 2016. A mobile offloading game against smart attacks. IEEE Access 4 (2016), 2281--2291.Google ScholarCross Ref
- Zehui Xiong, Shaohan Feng, Dusit Niyato, Ping Wang, and Zhu Han. 2018. Optimal pricing-based edge computing resource management in mobile blockchain. In 2018 IEEE International Conference on Communications.Google ScholarCross Ref
- Huaqing Zhang, Yong Xiao, Shengrong Bu, Dusit Niyato, Richard Yu, and Zhu Han. [n.d.]. Fog computing in multi-tier data center networks: a hierarchical game approach. In 2016 IEEE international conference on communications.Google Scholar
- Xiaonan Zhang, Linke Guo, Ming Li, and Yuguang Fang. 2016. Social-enabled data offloading via mobile participation-a game-theoretical approach. In 2016 IEEE Global Communications Conference.Google ScholarCross Ref
Index Terms
- A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining
Recommendations
Stackelberg Game Based Edge Computing Resource Management for Mobile Blockchain
ACM TURC '20: Proceedings of the ACM Turing Celebration Conference - ChinaBlockchain can provide a dependable environment for mobile applications. As the core of blockchain, mining consumes a large amount of computing resources, while mobile devices are too resource-limited to perform the mining. Offloading mining computation ...
A game-theoretic approach to the financial benefits of infrastructure-as-a-service
Financial benefits are an important factor when cloud infrastructure is considered to meet processing demand. The dynamics of on-demand pricing and service usage are investigated in a two-stage game model for a monopoly Infrastructure-as-a-Service (IaaS)...
Game-theoretic Analysis of Computation Offloading for Cloudlet-based Mobile Cloud Computing
MSWiM '15: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile SystemsMobile cloud computing (MC2) is emerging as a promising computing paradigm which helps alleviate the conflict between resource-constrained mobile devices and resource-consuming mobile applications through computation offloading. In this paper, we ...
Comments