Back to Search
Start Over
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work
- Source :
- CLOUD, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD)
- Publication Year :
- 2020
- Publisher :
- Zenodo, 2020.
-
Abstract
- Distributed Ledgers (DLs) like Blockchain have become a popular technique to build collective trust in digital records. The rationale is that any agent wishing to append a block to a DL needs to provide proof of holding some property/asset or having performed some costly activity. Thus, “poisoning” a DL with spurious content requires much more effort than poisoning a conventional shared data structure. Based on this idea, DLs are now being deployed as community stores of trusted transaction records, reputation values and even of trustworthy training data for Machine Learning (ML) models. Certainly, when injecting spurious or hostile content in a DL, a rational attacker has to consider whether the damageδcaused by a spurious blockBis worth the effortϵneeded to appendBto the DL; but practical experience has shown that being certain to disrupt a DL-supported application may be a powerful motivator for digital vandalism even when it is costly. In this paper, we put out an alternative idea: Reciprocally Useful Work (RUW), a novel DL update mechanism where any agent wishing to add a blockBto the ledger must first perform an activity that will improve the utility for the DL-supported application of some other agent's blockB′. We discuss in detail how to apply RUW to DLs storing training data for Machine Learning (ML) models, in order to show that reciprocity can play the role of a direct compensation of the potential disruption, which is measurable in term of the performance of the ML model trained on the DL content.
- Subjects :
- Distributed ledger
Blockchain
Training data
Data structures
Computer science
media_common.quotation_subject
020208 electrical & electronic engineering
Data models
02 engineering and technology
16. Peace & justice
Asset (computer security)
Computer security
computer.software_genre
Reciprocity (evolution)
Ledger
Machine learning
0202 electrical engineering, electronic engineering, information engineering
Performance evaluation
Cloud computing
020201 artificial intelligence & image processing
computer
Reputation
media_common
Block (data storage)
Subjects
Details
- ISBN :
- 978-1-72818-780-8
- ISBNs :
- 9781728187808
- Database :
- OpenAIRE
- Journal :
- CLOUD, 2020 IEEE 13th International Conference on Cloud Computing (CLOUD)
- Accession number :
- edsair.doi.dedup.....2d81db6537959b09d28d04a2ef0ee3bd