You are on page 1of 5

Jeshka Internet of Tasks: The next generation

secure, highly scalable ecosystem for activity


management
The Jeshka.io Community
March 7, 2018

Abstract
The Jeshka community is building an open source ecosystem that max-
imizes the net worth of activities performed by humans and machines. The
ecosystem uses a directed acyclic graph network to efficiently interconnect
different networks, their machine learning services and users. The main
objective is to split activities/tasks into micro and nano tasks, so they can
be reused across a wider scope. A secondary goal is to enable learning
during completion.
In this paper we propose the Jeshka Internet of Tasks (JIoT), an in-
novative and distributed ecosystem designed to provide efficient collabo-
ration in near real-time.
This work implements, extends and makes the following contributions:
1. Efficient Distributed Activity Splitting (EDAS) - A machine learning
approach to identify the structure of activities and tasks to efficiently
split them into components that can be reused.
2. Efficient Distributed Activity Merging (EDAM) - A machine learn-
ing approach to merge the components created with EDAS to allow
parallel processing while securing privacy.
3. Proof-of-Reputation (PoR) - A consensus protocol that guarantees
quick response times and validity.
4. IOTA Identity of Things (IDoT) - Provides unique identities for all
participating resources.
5. IOTA Masked Authenticated Messaging (MAM) - Used to create
private data streams between processes/resources.
6. IOTA Oracles - Used to exchange processed results.
7. IOTA Flash Network - Payment Channels enable very rapid high
throughput of transactions.
8. IOTA Private Transactions - A layer to enable transactional privacy.
Note: Jeshka is a work in progress. Active research and testing is under
way and new versions of this paper will be updated at https: // jeshka. io
.

1
Contents
1 Real World Usage 3
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 JESH Token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 IOTA Token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Use Case Example . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2 Proof-of-Reputation 4
2.1 Reputation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Additional proof and loss of reputation . . . . . . . . . . . . . . . 4
2.3 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

3 Transactions 5
3.1 Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 Efficient Distributed Activity Splitting (EDAS) . . . . . . . . . . 5
3.3 Efficient Distributed Activity Merging (EDAM) . . . . . . . . . . 5

2
1 Real World Usage
1.1 Background
We are used to designing and using task/activity specific solutions. JIoT opens
up a revolutionary way to create and complete tasks, so that work is not only
done directly for the specific request, but across a network of tasks. Instead of
the current way, where alice performs an activity for bob, the activity performed
can be split up into many smaller activities that fulfill parts of multiple broader
tasks in parallel. Thereby maximizing the net worth of the activities performed,
because their result can be used by multiple parties at the same time.

1.2 JESH Token


For research and development purposes JIoT uses a unified token for payment
to initiate a process. The amount of JESH needed can be estimated before-
hand. After a process is initiated the paid JESH tokens are split up into a large
number of individual specific rewards across the flow of transactions needed to
successfully deliver the result. Each participants stakes value, when requesting
to complete a task. Individual specific rewards are exchanged back to JESH for
the awardees to ensure ease of use.

1.3 IOTA Token


As soon as all necessary prerequisites are met on the IOTA tangle, especially
for micro transactions, such as streaming activities, JIoT is going to make use
of the IOTA token.

1.4 Use Case Example


Customers Point of View Customer Bob needs a (custom) service or a
(custom) product. Bob queries JIoT for the service or product needed and gets
recommendations that fit the query best. Bob chooses an item and sends the
necessary payment, thereby initiating a process with the first transaction. The
network now assembles the result from all the partial activities available to the
network and returns the result to Bob.

Processors Point of View A processor completes all the individual activities


possible on the network. When a customer initiates a process that eventually
uses any of the possible activities or partials, the processor is rewarded upon
success. Processors are supplied with packaged activities.

3
2 Proof-of-Reputation
2.1 Reputation
The Proof-of-Reputation consensus protocol uses a highest reputation first ap-
proach. Reputation is not a single unit of measurement. Transactions are
grouped by content and different groups of transactions have different repu-
tation units. The protocol puts all processors on a spectrum of reputation.
High reputation processors are assigned with the processes first, high reputa-
tion processors then assign lower reputation processors to provide finality and
verifiability. The initiator has to vote on a result of another random network,
before the transaction is considered successful. Processors form mixed groups,
low reputation processors can gain reputation and help ensure the liveness of
the network. When a low reputation processors becomes a high reputation
processor, it inherently forms a new network with low reputation processors.
Reputation is increased by the number of validations from higher level reputa-
tion processors within the network. Because JIoT doesnt use sequential blocks,
this can take place in parallel. Processors can only earn reputation from high
reputation processors in the groups they join. Reputation is awarded based on
speed and validity of the transaction, as well as the quality of the distribution
of the transaction to lower level processors.

2.2 Additional proof and loss of reputation


Critical transactions can be sent to multiple random networks of processors. All
processors in a network that result with an output that differs from the consen-
sus result lose reputation. This way it is ensured that the critical transaction is
processed correctly and faulty or malicious networks are contra-rewarded.

2.3 Scalability
With a growing number of transactions, there is a growing number of processors
to speed up the entire network. The amount of work done to verify a transaction
is not exponentially growing, but constantly optimized.

4
3 Transactions
The input flows towards lower reputation processors in the network to form
smaller and smaller partial inputs (chunks) and once processed sufficiently flows
to higher reputation processors to form larger and larger outputs (chunks).

3.1 Neural Networks


In the approach used in JIoT, activities can only be efficiently split and merged
using neural networks. The network initiates with a set of Generative Adver-
sarial Neural Networks (GANs) and Capsule Networks (CapsNets). The reward
mechanism inherent in the protocol fosters the development and evolution of a
multitude of algorithms and networks, leaving freedom for a continuous upgrade
process to the network.

3.2 Efficient Distributed Activity Splitting (EDAS)


Every processor on JIoT splits chunks on the network. Because processing
speed, validity and distribution is rewarded, the network moves toward splitting
activities into the best optimal set of chunks to be processed by all processors,
distributed to reach the quickest and most valid result.

3.3 Efficient Distributed Activity Merging (EDAM)


Every processor on JIoT merges chunks on the network. Because processing
speed, validity and distribution is rewarded, the network moves toward merging
the optimal number of chunks into individual chunks, distributed to reach the
quickest and most valid result.

You might also like