Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Incentive-based Mechanism for Volunteer Computing Using Blockchain

Published: 22 July 2021 Publication History

Abstract

The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.

References

[1]
Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, and Martin Randles. 2021. Intelligent control and security of fog resources in healthcare systems via a cognitive fog model. ACM Trans. Internet Technol. 21, 3, Article 54 (June 2021), 23 pages.
[2]
Ala Abu Alkheir, Moayad Aloqaily, and Hussein T. Mouftah. 2018. Connected and autonomous electric vehicles (CAEVs). IT Profess. 20, 6 (2018), 54–61.
[3]
W. Tang, K. Zhang, D. Zhang, J. Ren, Y. Zhang, and X. Shen. 2019. Fog-enabled smart health: Toward cooperative and secure healthcare service provision. IEEE Commun. Mag. 57, 5 (2019), 42–48.
[4]
H. Bi, W. Shang, and Y. Chen. 2020. Cooperative and energy-efficient strategies in emergency navigation using edge computing. IEEE Access 8 (2020), 54441–54455.
[5]
M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi. 2021. Design guidelines for blockchain-assisted 5G-UAV networks. IEEE Network 35, 1 (2021), 64–71.
[6]
M. Aloqaily, I. A. Ridhawi, H. B. Salameh, and Y. Jararweh. 2019. Data and service management in densely crowded environments: Challenges, opportunities, and recent developments. IEEE Commun. Mag. 57, 4 (2019), 81–87.
[7]
Ju Ren, Deyu Zhang, Shiwen He, Yaoxue Zhang, and Tao Li. 2019. A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Comput. Surv. 52, 6 (Oct. 2019).
[8]
I. Al Ridhawi, Y. Kotb, M. Aloqaily, Y. Jararweh, and T. Baker. 2020. A profitable and energy-efficient cooperative fog solution for IoT services. IEEE Trans. Industr. Inform. 16, 5 (2020), 3578–3586.
[9]
Ismaeel Al Ridhawi, Moayad Aloqaily, Yehia Kotb, Yousif Al Ridhawi, and Yaser Jararweh. 2018. A collaborative mobile edge computing and user solution for service composition in 5G systems. Trans. Emerg. Telecommun. Technol. 29 (2018).
[10]
I. Al Ridhawi, Y. Kotb, and Y. Al Ridhawi. 2017. Workflow-net based service composition using mobile edge nodes. IEEE Access 5 (2017), 23719–23735.
[11]
A. Palade and S. Clarke. 2020. Collaborative agent communities for resilient service composition in mobile environments. IEEE Trans. Serv. Comput. (2020), 1–1.
[12]
Lewis Tseng, Xinyu Yao, Safa Otoum, Moayad Aloqaily, and Yaser Jararweh. 2020. Blockchain-based database in an IoT environment: Challenges, opportunities, and analysis. Cluster Comput. (2020), 1–15.
[13]
Ouns Bouachir, Moayad Aloqaily, Lewis Tesng, and Azzedine Boukerche. 2020. Blockchain and fog computing for cyber-physical systems: Case of smart industry. Computer 53, 9 (2020).
[14]
M. Aloqaily, A. Boukerche, O. Bouachir, F. Khalid, and S. Jangsher. 2020. An energy trade framework using smart contracts: Overview and challenges. IEEE Netw. 34, 4 (2020), 119–125.
[15]
Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan. 2019. 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Vehic. Technol. Mag. 14, 3 (2019), 28–41.
[16]
C. Yang, J. Xiao, J. Li, X. Shao, A. Anpalagan, Q. Ni, and M. Guizani. 2018. DISCO: Interference-aware distributed cooperation with incentive mechanism for 5G heterogeneous ultra-dense networks. IEEE Commun. Mag. 56, 7 (2018), 198–204.
[17]
I. A. Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh. 2020. A blockchain-based decentralized composition solution for IoT services. In Proceedings of the IEEE International Conference on Communications (ICC’20). 1–6.
[18]
M. J. M. Chowdhury, A. Colman, M. A. Kabir, J. Han, and P. Sarda. 2018. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE’18). 1330–1335.
[19]
Shichang Xuan, Li Zheng, Ilyong Chung, Wei Wang, Dapeng Man, Xiaojiang Du, Wu Yang, and Mohsen Guizani. 2020. An incentive mechanism for data sharing based on blockchain with smart contracts. Comput. Electric. Eng. 83 (2020), 106587.
[20]
Meng Shen, Junxian Duan, Liehuang Zhu, Jie Zhang, Xiaojiang Du, and Mohsen Guizani. 2020. Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Select. Areas Commun. 38, 6 (2020), 1229–1241.
[21]
L. Li, J. Liu, L. Cheng, S. Qiu, W. Wang, X. Zhang, and Z. Zhang. 2018. CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transport. Syst. 19, 7 (2018), 2204–2220.
[22]
A. Amjid, A. Khan, and M. A. Shah. 2020. VANET-based volunteer computing (VBVC): A computational paradigm for future autonomous vehicles. IEEE Access 8 (2020), 71763–71774.
[23]
Erick Lavoie and Laurie Hendren. 2019. Personal volunteer computing. In Proceedings of the 16th ACM International Conference on Computing Frontiers. 240–246.
[24]
Tessema M. Mengistu, Abdullah Albuali, Abdulrahman Alahmadi, and Dunren Che. 2019. Volunteer cloud as an edge computing enabler. In Proceedings of the International Conference on Edge Computing. Springer, 76–84.
[25]
Muhammad Nouman Durrani and Jawwad A. Shamsi. 2014. Volunteer computing: Requirements, challenges, and solutions. J. Netw. Comput. Applic. 39 (2014), 369–380.
[26]
Oded Nov, David Anderson, and Ofer Arazy. 2010. Volunteer computing: A model of the factors determining contribution to community-based scientific research. In Proceedings of the 19th International Conference on World Wide Web. 741–750.
[27]
Ling Xu, Jianzhong Qiao, Shukuan Lin, and Wanting Zhang. 2019. Dynamic task scheduling algorithm with deadline constraint in heterogeneous volunteer computing platforms. Fut. Internet 11, 6 (2019), 121.
[28]
S. S. Parkhomenko and T. M. Ledeneva. 2019. Scheduling in volunteer computing networks, based on neural network prediction of the job execution time. Int. J. Parallel, Emerg. Distrib. Syst. 34, 4 (2019), 430–447.
[29]
S. Seng, X. Li, C. Luo, H. Ji, and H. Zhang. 2019. A D2D-assisted MEC computation offloading in the blockchain-based framework for UDNs. In Proceedings of the IEEE International Conference on Communications (ICC’19). 1–6.
[30]
Y. Al Ridhawi and A. Karmouch. 2015. QoS-based composition of service specific overlay networks. IEEE Trans. Comput. 64, 3 (2015), 832–846.
[31]
Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily, Yaser Jararweh, and Thar Baker. 2020. Providing secure and reliable communication for next generation networks in smart cities. Sustain. Cities Societ. 56 (2020), 102080.
[32]
S. Shi, Q. Wang, K. Zhao, Z. Tang, Y. Wang, X. Huang, and X. Chu. 2019. A distributed synchronous SGD algorithm with global top-k sparsification for low bandwidth networks. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS’19). 2238–2247.
[33]
Moayad Aloqaily, Safa Otoum, Ismaeel Al Ridhawi, and Yaser Jararweh. 2019. An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90 (2019), 101842.
[34]
A Varga. 2012. OMNeT++ User Manual, Version 4.1. Retrieved from http://www.omnetpp.org/doc/omnetpp/manual/usman.html.
[35]
I. Baumgart, B. Heep, and S. Krause. 2009. OverSim: A scalable and flexible overlay framework for simulation and real network applications. In Proceedings of the IEEE 9th International Conference on Peer-to-Peer Computing. 87–88.
[36]
Grigoris Antoniou and Frank van Harmelen. 2009. Web Ontology Language: OWL. Springer, 91–110. https://EconPapers.repec.org/RePEc:spr:ihichp:978-3-540-92673-3_4.
[37]
Tomasz Adamusiak, Tony Burdett, Natalja Kurbatova, K. Joeri van der Velde, Niran Abeygunawardena, Despoina Antonakaki, Misha Kapushesky, Helen Parkinson, and Morris A. Swertz. 2011. OntoCAT–simple ontology search and integration in Java, R and REST/JavaScript. BMC Bioinfor. 12, 1 (2011), 218.
[38]
Pablo Cingolani. 2012. jFuzzyLogic: Open source fuzzy logic library and FCL language implementation. Retrieved from http://jfuzzylogic. sourceforge. net/html/about. html.

Cited By

View all
  • (2024)Exploiting Blockchain to Make AI Trustworthy: A Software Development Lifecycle ViewACM Computing Surveys10.1145/361442456:7(1-31)Online publication date: 9-Apr-2024
  • (2024)Secure pharmaceutical supply chain using blockchain in IoT cloud systemsInternet of Things10.1016/j.iot.2024.10121526(101215)Online publication date: Jul-2024
  • (2024)Volunteer Computing for fog scalability: A systematic literature reviewInternet of Things10.1016/j.iot.2024.10107225(101072)Online publication date: Apr-2024
  • Show More Cited By

Index Terms

  1. An Incentive-based Mechanism for Volunteer Computing Using Blockchain

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 4
      November 2021
      520 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3472282
      • Editor:
      • Ling Lu
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 July 2021
      Accepted: 01 August 2020
      Revised: 01 August 2020
      Received: 01 June 2020
      Published in TOIT Volume 21, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Blockchain
      2. volunteer computing
      3. 5G
      4. 6G
      5. Internet of Things
      6. AI

      Qualifiers

      • Research-article
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)57
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 02 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Exploiting Blockchain to Make AI Trustworthy: A Software Development Lifecycle ViewACM Computing Surveys10.1145/361442456:7(1-31)Online publication date: 9-Apr-2024
      • (2024)Secure pharmaceutical supply chain using blockchain in IoT cloud systemsInternet of Things10.1016/j.iot.2024.10121526(101215)Online publication date: Jul-2024
      • (2024)Volunteer Computing for fog scalability: A systematic literature reviewInternet of Things10.1016/j.iot.2024.10107225(101072)Online publication date: Apr-2024
      • (2024)EleVMate — A data-driven approach for ‘on-the-fly’ horizontal small datacentre scalability and VM starvationFuture Generation Computer Systems10.1016/j.future.2024.04.036159(91-101)Online publication date: Oct-2024
      • (2024)Merging Blockchain and Deep Learning for Authentication and Security ArchitecturesDecentralized Systems and Distributed Computing10.1002/9781394205127.ch14(277-293)Online publication date: 15-Jul-2024
      • (2023)Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature ReviewACM Computing Surveys10.1145/357858155:14s(1-69)Online publication date: 18-Jul-2023
      • (2023)Machine Learning Assisted Video Stream Offloading for 5G MBMS Mobile Edge ComputingIEEE Transactions on Broadcasting10.1109/TBC.2023.329483769:4(872-881)Online publication date: Dec-2023
      • (2023)Study on IoT: Applications and Security Risks2023 6th International Conference on Information and Communications Technology (ICOIACT)10.1109/ICOIACT59844.2023.10455910(280-285)Online publication date: 10-Nov-2023
      • (2023)Optimisation of Volunteer Node Selection for Scalable and Trustworthy Fog Environments2023 IEEE International Conference on e-Business Engineering (ICEBE)10.1109/ICEBE59045.2023.00025(85-89)Online publication date: 4-Nov-2023
      • (2023)Trust-Aware Scheduling for Edge Computing With Task Dependencies and Unreliable ServersIEEE Access10.1109/ACCESS.2023.332417811(113514-113525)Online publication date: 2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media