skip to main content
10.1145/3281411.3281415acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Mining the web with webcoin

Published:04 December 2018Publication History

ABSTRACT

Four major search engines, Google in particular, hold a unique position in enabling the use of the Internet, as they alone direct over 98% of Internet users to the content they seek, using proprietary indices. While the contribution of these companies is undeniable, their design is necessarily affected by their economic interests, which may or may not align with those of the users, raising concerns regarding their effect on the availability of information around the globe. While multiple academic and commercial projects aimed to distribute and democratize the Web search, they failed to gain much traction, mostly due to inferior results and lack of incentives for participation. In this paper, we show how complex networking-intensive tasks can be crowdsourced using Bitcoin's incentive model. We present Webcoin, a novel distributed digital-currency which utilizes networking resources rather then computational, and can only be mined through Web indexing. Webcoin provides both the incentives and the means to create Google-scale indices, freely available to competing services and the public. Webcoin's design overcomes numerous unique challenges, such as index verification, scalability, and nodes' ability to actively manipulate webpages. We deploy 200 fully-functioning Webcoin nodes and demonstrate their low bandwidth requirements.

Skip Supplemental Material Section

Supplemental Material

p165-klarman.mp4

mp4

289.1 MB

References

  1. Antminer S9 ASIC Bitcoin Miner. http://www.bitmain.com/.Google ScholarGoogle Scholar
  2. ASICS for Litecoin. Here They Come. https://bitcoinmagazine.com/articles/asics-litecoin-come-1394826069/.Google ScholarGoogle Scholar
  3. Bitcoin Energy Consumption Index - Digiconomist. https://digiconomist.net/bitcoin-energy-consumption.Google ScholarGoogle Scholar
  4. Bitcoinity.org. http://www.data.bitcoinity.org.Google ScholarGoogle Scholar
  5. Bitcoinstats. http://www.bitcoinstats.com.Google ScholarGoogle Scholar
  6. Compass. www.compass-project.org/.Google ScholarGoogle Scholar
  7. Faroo Search Engine. http://www.faroo.com/index.en.html.Google ScholarGoogle Scholar
  8. GOOGLE'S PRIVACY WHIPLASH SHOWS BIG TECH'S INHERENT CONTRADICTIONS. https://www.wired.com/story/googles-privacy-whiplash-shows-big-techs-inherent-contradictions/.Google ScholarGoogle Scholar
  9. Majestic 12 Search Engine. https://www.majestic12.co.uk/about.php.Google ScholarGoogle Scholar
  10. Neighborhood Pool Watch. http://www.organofcorti.blogspot.mx/.Google ScholarGoogle Scholar
  11. Pyminer. http://www.github.com/jgarzik/pyminer.Google ScholarGoogle Scholar
  12. Scrapy. http://www.scrapy.org.Google ScholarGoogle Scholar
  13. Steem - An incentivized, blockchain-based, public content platform. www.steem.io/SteemWhitePaper.pdf.Google ScholarGoogle Scholar
  14. YaCy Search Engine. http://www.yacy.net.Google ScholarGoogle Scholar
  15. Yes Facebook is using your 2FA phone number to target you with ads. https://www.techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/.Google ScholarGoogle Scholar
  16. Operating system market share, 2017. http://www.netmarketshare.com/operating-systemmarket-share/.Google ScholarGoogle Scholar
  17. Abliz, M., and Znati, T. A Guided Tour Puzzle for Denial of Service Prevention. In Computer Security Applications Conference, 2009. ACSAC'09. Annual (2009), IEEE, pp. 279--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ali, M., Nelson, J. C., Shea, R., and Freedman, M. J. Blockstack: A global naming and storage system secured by blockchains. In USENIX Annual Technical Conference (2016), pp. 181--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Anh, V. N., and Moffat, A. Inverted Index Compression using Word-Aligned Binary Codes. Information Retrieval 8, 1 (2005), 151--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Arias, E., and Guinot, B. Coordinated Universal Time UTC: Historical Background and Perspectives. In Journees systemes de reference spatio-temporels (2004).Google ScholarGoogle Scholar
  21. Barber, S., Boyen, X., Shi, E., and Uzun, E. Bitter to Better - How to Make Bitcoin a Better Currency. In International Conference on Financial Cryptography and Data Security (2012), Springer, pp. 399--414.Google ScholarGoogle ScholarCross RefCross Ref
  22. Bender, M., Michel, S., Triantafillou, P., Weikum, G., and Zimmer, C. Minerva: Collaborative P2P Search. In Proceedings of the 31st international conference on Very large data bases (2005), VLDB Endowment, pp. 1263--1266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Boldi, P., Codenotti, B., Santini, M., and Vigna, S. Ubicrawler: A Scalable Fully Distributed Web Crawler. Software: Practice and Experience 34, 8 (2004), 711--726. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bosch, A., Bogers, T., and Kunder, M. Estimating Search Engine Index Size Variability: a 9-Year Longitudinal Study. Scientometrics 107, 2 (2016), 839--856. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., and Bowman, M. Planetlab: an Overlay Testbed for Broad-Coverage Services. ACM SIGCOMM Computer Communication Review 33, 3 (2003), 3--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. De Kunder, M. The Size of the World Wide Web. WorldWideWebSize (2012).Google ScholarGoogle Scholar
  27. Dimitri, N. Bitcoin mining as a contest. Ledger 2 (2017), 31--37.Google ScholarGoogle ScholarCross RefCross Ref
  28. Dziembowski, S. Introduction to Cryptocurrencies. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 1700--1701. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Eyal, I., and Sirer, E. G. Majority is Not Enough: Bitcoin Mining is Vulnerable. In International Conference on Financial Cryptography and Data Security (2014), Springer, pp. 436--454.Google ScholarGoogle ScholarCross RefCross Ref
  30. Feily, M., Shahrestani, A., and Ramadass, S. A Survey of Botnet and Botnet Detection. In Emerging Security Information, Systems and Technologies, 2009. SECURWARE'09. Third International Conference on (2009), IEEE, pp. 268--273. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Freund, A., and Stanko, D. The wolf and the caribou: Coexistence of decentralized economies and competitive markets. Journal of Risk and Financial Management 11, 2 (2018), 26.Google ScholarGoogle ScholarCross RefCross Ref
  32. Gilbert, H., and Handschuh, H. Security Analysis of SHA-256 and Sisters. In International Workshop on Selected Areas in Cryptography (2003), Springer, pp. 175--193.Google ScholarGoogle Scholar
  33. Gormley, C., and Tong, Z. Elasticsearch: The Definitive Guide. "O'Reilly Media, Inc.", 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Grainger, T., Potter, T., and Seeley, Y. Solr in Action. Manning, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Hari, A., and Lakshman, T. The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks (2016), ACM, pp. 204--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Isele, R., Umbrich, J., Bizer, C., and Harth, A. LDspider: An Open-Source Crawling Framework for the Web of Linked Data. In Proceedings of the 2010 International Conference on Posters & Demonstrations Track-Volume 658 (2010), CEUR-WS. org, pp. 29--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. Social Phishing. Communications of the ACM 50, 10 (2007), 94--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jung, J., Krishnamurthy, B., and Rabinovich, M. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In Proceedings of the 11th international conference on World Wide Web (2002), ACM, pp. 293--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. King, S., and Nadal, S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. self-published paper, August 19 (2012). www.wallet.peercoin.net/assets/paper/peercoin-paper.pdf.Google ScholarGoogle Scholar
  40. Kong, J. S., Sarshar, N., and Roychowdhury, V. P. Experience versus talent shapes the structure of the web. Proceedings of the National Academy of Sciences 105, 37 (2008), 13724--13729.Google ScholarGoogle ScholarCross RefCross Ref
  41. Langschaedel, J., Armstrong, B. D., and Ehrsam, F. E. Hot wallet for holding bitcoin, Sept. 17 2015. US Patent App. 14/660,418.Google ScholarGoogle Scholar
  42. Laurie, B., and Clayton, R. "Proof-of-Work" Proves Not to Work; version 0.2. In Workshop on Economics and Information, Security (2004).Google ScholarGoogle Scholar
  43. Lee, H.-T., Leonard, D., Wang, X., and Loguinov, D. IRLbot: Scaling to 6 Billion Pages and Beyond. ACM Transactions on the Web (TWEB) 3, 3 (2009), 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Leela, K., and Haritsa, J. SphinX: Schema-Conscious XML Indexing, 2001. http://dsl.cds.iisc.ac.in/pub/TR/TR-2001-04.pdf.Google ScholarGoogle Scholar
  45. McCandless, M., Hatcher, E., and Gospodnetic, O. Lucene in Action: Covers Apache Lucene 3.0. Manning Publications Co., 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. In Proceedings of the 2013 Conference on Internet Measurement Conference (2013), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Miller, A., Juels, A., Shi, E., Parno, B., and Katz, J. Permacoin: Repurposing Bitcoin Work for Data Preservation. In 2014 IEEE Symposium on Security and Privacy (2014), IEEE, pp. 475--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. www.bitcoin.org.Google ScholarGoogle Scholar
  49. of Money Research Collaborative:, F., Nelms, T. C., Maurer, B., Swartz, L., and Mainwaring, S. Social payments: Innovation, trust, bitcoin, and the sharing economy. Theory, Culture & Society 35, 3 (2018), 13--33.Google ScholarGoogle Scholar
  50. Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., and Gazi, P. Spacecoin: A Cryptocurrency Based on Proofs of Space. Tech. rep., IACR Cryptology ePrint Archive, 2015: 528, 2015.Google ScholarGoogle Scholar
  51. Parreira, J. X., Donato, D., Michel, S., and Weikum, G. Efficient and Decentralized Pagerank Approximation in a Peer-to-Peer Web Search Network. In Proceedings of the 32nd international conference on Very large data bases (2006), VLDB Endowment, pp. 415--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Percival, C. Stronger Key Derivation via Sequential Memory-Hard Functions. Self-published (2009), 1--16. www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf.Google ScholarGoogle Scholar
  53. Pujol, J., and Rodriguez, P. Porqpine: a Distributed Social Search Engine. In In Proc. of WWW'09 (Madrid, Spain, Apr. 2009).Google ScholarGoogle Scholar
  54. Sankaralingam, K., Sethumadhavan, S., and Browne, J. C. Distributed Pagerank for P2P Systems. In High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on (2003), IEEE, pp. 58--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Serapiglia, A., Serapiglia, C. P., and McIntyre, J. Crypto Currencies: Core Information Technology and Information System Fundamentals Enabling Currency without Borders. Information Systems Education Journal 13, 3 (2015), 43.Google ScholarGoogle Scholar
  56. Swartz, L. Blockchain dreams: Imagining techno-economic alternatives after bitcoin. Another economy is possible (2017), 82--105.Google ScholarGoogle Scholar
  57. Wang, J., and Guo, Y. Scrapy-Based Crawling and User-Behavior Characteristics Analysis on Taobao. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on (2012), IEEE, pp. 44--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper (2014).Google ScholarGoogle Scholar
  59. Wustrow, E., and VanderSloot, B. Ddoscoin: Cryptocurrency with a malicious proof-of-work. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (2016), USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CoNEXT '18: Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies
    December 2018
    408 pages
    ISBN:9781450360807
    DOI:10.1145/3281411

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 December 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate198of789submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader