A Secure and Efficient Cloud Resource Allocation Scheme with Trust

Slides:



Advertisements
Similar presentations
Comparison of Genetic Algorithm and WASAM Model for Real Time Water Allocation: A Case Study of Song Phi Nong Irrigation Project Bhaktikul, K, Mahidol.
Advertisements

Spie98-1 Evolutionary Algorithms, Simulated Annealing, and Tabu Search: A Comparative Study H. Youssef, S. M. Sait, H. Adiche
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Two-Dimensional Channel Coding Scheme for MCTF- Based Scalable Video Coding IEEE TRANSACTIONS ON MULTIMEDIA,VOL. 9,NO. 1,JANUARY Yu Wang, Student.
1 Auction or Tâtonnement – Finding Congestion Prices for Adaptive Applications Xin Wang Henning Schulzrinne Columbia University.
1 Protocols are programs too The meta-heuristic search for security protocols By John A. Clark.
Game of Life Changhyo Yu Game of Life2 Introduction Conway’s Game of Life  Rule Dies if # of alive neighbor cells =< 2 (loneliness) Dies.
Evolutionary Computation Application Peter Andras peter.andras/lectures.
Using Simulated Annealing and Evolution Strategy scheduling capital products with complex product structure By: Dongping SONG Supervisors: Dr. Chris Hicks.
The Double Auction is like an “Econ Lab” to illustrate How markets work How good the competitive equilibrium model (supply and demand) is as a model of.
Optimization in Engineering Design Georgia Institute of Technology Systems Realization Laboratory Mixed Integer Problems Most optimization algorithms deal.
2004, 9/1 1 Optimal Content-Based Video Decomposition for Interactive Video Navigation Anastasios D. Doulamis, Member, IEEE and Nikolaos D. Doulamis, Member,
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Distributed Demand Scheduling Method to Reduce Energy Cost in Smart Grid Humanitarian Technology Conference (R10-HTC), 2013 IEEE Region 10 Akiyuki Imamura,
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
Applying Genetic Algorithm to the Knapsack Problem Qi Su ECE 539 Spring 2001 Course Project.
Doshisha Univ., Kyoto, Japan CEC2003 Adaptive Temperature Schedule Determined by Genetic Algorithm for Parallel Simulated Annealing Doshisha University,
A genetic approach to the automatic clustering problem Author : Lin Yu Tseng Shiueng Bien Yang Graduate : Chien-Ming Hsiao.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
1 Computer-assisted learning for mathematical problem solving Source: Computers and Education, Vol.46, February, 2006, pp Author: Chang, Kuo-En;
C OMPARING T HREE H EURISTIC S EARCH M ETHODS FOR F UNCTIONAL P ARTITIONING IN H ARDWARE -S OFTWARE C ODESIGN Theerayod Wiangtong, Peter Y. K. Cheung and.
Immune Genetic Algorithms By Jeremy Moreau. References Licheng Jiao, Senior Member, IEEE, and Lei Wang, “A Novel Genetic Algorithm Based on Immunity,”
Chapter 12 FUSION OF FUZZY SYSTEM AND GENETIC ALGORITHMS Chi-Yuan Yeh.
Authors: N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi
國立清華大學高速通訊與計算實驗室 NTHU High-Speed Communication & Computing Laboratory Optimal Provisioning for Elastic Service Oriented Virtual Network Request in Cloud.
Routing and Scheduling in Multistage Networks using Genetic Algorithms Advisor: Dr. Yi Pan Chunyan Ji 3/26/01.
A Multilayer IP Security Protocol for TCP Performance in Wireless Networks Authors: Yongguang Zhang Source: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,
Authors : S.S. Lam, X. Cai Public : Nonlinear Analysis: Real World Applications 3(2002) Adviser : RC. Chen Speaker : CC. Lin Date : 2005/12/27.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
© P. Pongcharoen CCSI/1 Scheduling Complex Products using Genetic Algorithms with Alternative Fitness Functions P. Pongcharoen, C. Hicks, P.M. Braiden.
Parallel Simulated Annealing using Genetic Crossover Tomoyuki Hiroyasu Mitsunori Miki Maki Ogura November 09, 2000 Doshisha University, Kyoto, Japan.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Genetic Algorithm(GA)
Genetic Algorithm (Knapsack Problem)
Experiment Information Theoretical Predictions: Quantity: 10 units Price: $3.90-$4.00 Net Economic Benefits: $20 What were we supposed to learn.
Advanced Computing and Networking Laboratory
Proxy Blind Signature Scheme
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Evolutionary Technique for Combinatorial Reverse Auctions
Author :Shigeomi HARA Hiroshi DOUZONO Yoshio NOGUCHI
Balancing of Parallel Two-Sided Assembly Lines via a GA based Approach
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
A Comparison of Simulated Annealing and Genetic Algorithm Approaches for Cultivation Model Identification Olympia Roeva.
Efficient Time-Bound Hierarchical Key Assignment Scheme
Image camouflage by reversible image transformation
Privacy Preserving Ranked Multi-Keyword
ECE 556 Project Algorithm Presentation
Network Intrusion Detection Using GA
Yu-Chi Ho Jonathan T. Lee Harvard University Sep. 7, 2000
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Centrality Bias Measure for High Density QR Code Module Recognition
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Density-Based Image Vector Quantization Using a Genetic Algorithm
Decentralized Energy Demand Regulation in Smart Homes
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
Md. Tanveer Anwar University of Arkansas
A Tutorial (Complete) Yiming
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Designing Blockchain-based Applications a Case Study for Imported
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Source: Sensors, Volume 19, Issue 9 (May )
Source : Digital Signal Processing. Vol. 73, pp , Feb
Presentation transcript:

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction Source:KSII Transactions on Internet and Information Systems vol. 11, no. 9, Sep. 2017 Authors: Yun-Hao Xia, Han-Shu Hong, Guo-Feng Lin, Zhi-Xin Sun Speaker: Chit-Jie Chew Date: 7/12/2018

Outline Introduction Related works Proposed scheme Experimental result Conclusions

Introduction - Double Auction $30 $40 Provider 1 Consumer 1 Profit: $30 $35 $50 Provider 2 Consumer 2 Auctioneer $30 $20 Consumer 3 Provider 3

Introduction - Combinatorial Double Auction Case 1: Provider 1, 2, 3 Profit: $220 Case 3: Provider 1, 3 Profit: $250 Case 3: Provider 1, 3 Profit: $250 Case 2: Provider 1, 2 Profit: $70 Case 4: Provider 2, 3 Profit: $200 Case 2: Provider 1, 2 Case 4: Provider 2, 3 Case 1: Provider 1, 2, 3 Case 3: Provider 1, 3 1 2 $100 1 $200 Auctioneer Auctioneer Auctioneer Auctioneer -$300 -$250 -$250 -$400 1 1 2 2 3 5 3 4 5 2 6 5 Consumer 2 Consumer 2 Consumer 2 +$200 +$300 +$300 +$300 Consumer 1 -1 -2 -2 -1 -2 -1 -3 -3 -3 Provider 1 Consumer 1 -$50 -$100 $0 $50 1 1 2 1 3 1 1 3 1 3 2 2 1 2 $150 2 3 $300 Consumer 3 +$120 Consumer 1 Consumer 1 Consumer 1 +$200 +$200 +$200 -1 -1 -1 -1 -1 -2 -1 -1 -1 -1 -1 Profit: $70 1 1 1 2 1 1 2 Profit: Profit: $200 $250 $100 Provider 2 Consumer 2 +$120 -1 -2 Consumer 3 Auctioneer 1 2 $120 1 4 $150 Profit: $220 2 Consumer 3 Provider 3

Related Works – Genetic Algorithm(GA) ∆𝑓=250−200=50 ∆𝑓=200−200=0 P1 P2 P3 C1 C2 C3 ∆𝑓=−280− −50 =−230 Population number Chromosome Fitness Parents 0 1 1 0 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 1 1 1 1 0 0 1 1 1 1 0 -$180 -$180 1 5 $200 1 1 0 1 1 0 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 1 -$50 -$50 2 4 $520 -1 -3 -3 Crossover 0 1 1 1 0 0 0 1 1 1 0 0 0 1 1 1 0 0 0 1 1 1 0 0 0 1 1 1 0 0 0 1 1 1 0 0 -$200 2 4 -$100 2 4 1 0 1 0 0 1 1 0 1 0 0 1 1 0 1 0 0 1 1 0 1 1 1 0 1 0 1 1 1 0 -$130 1 5 $250 1 Mutation 0 1 1 1 0 1 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 1 0 0 1 1 1 1 0 $20 -1 4 $200 $200 1 1 1 1 0 0 1 1 1 1 0 0 1 1 1 1 0 0 1 1 0 1 1 1 0 1 0 1 1 1 0 1 0 1 1 1 0 -$280 -$280 1 3 6 $250 $250 1 New Parents 2 4 1 0 1 1 1 0 1 0 1 1 1 0 1 0 1 1 0 0 $250 $250 1 -$50 0 1 1 1 1 0 0 1 1 0 0 1 $200 1 -$180 1 5

Related Works – Simulated Annealing Algorithm(SA) P1 P2 P3 C1 C2 C3 Chromosome Fitness 4 1 Fitness $70 1 1 0 1 0 1 Chromosome 4 2 -$50 1 0 1 1 0 0 4 1 $70 1 1 0 1 0 1 1 $50 0 1 0 1 0 0 Variation of temperature ∆𝑓=70 −(−$50)= 120 ∆𝑓=50 −$70=− 20 𝑒𝑥𝑝 ∆𝑓 𝑇 =𝑒𝑥𝑝 120 100 = 3.32 𝑒𝑥𝑝 ∆𝑓 𝑇 =𝑒𝑥𝑝 −20 90 = 0.8 𝐼𝑓 𝑒𝑥𝑝 ∆𝑓 𝑇 >𝑟𝑎𝑛𝑑𝑜𝑚 0~1 : 𝐼𝑓 𝑒𝑥𝑝 ∆𝑓 𝑇 >𝑟𝑎𝑛𝑑𝑜𝑚 0~1 : accept to new generation accept to new generation 𝑇=𝑇×0.9=100×0.9=90 𝑇=𝑇×0.9=90×0.9=81

Proposed scheme – Model Based on Combinatorial Double Auction

Proposed scheme – The Pricing Determination Model Notations Sign Definition 𝑙𝑜𝑎𝑑 𝑡 Current system load 𝑢𝑠𝑒𝑟_𝑎𝑚𝑜𝑢𝑛𝑡 The amount of demand by buyers 𝑝𝑟𝑜𝑣𝑖𝑑𝑒_𝑎𝑚𝑜𝑢𝑛𝑡 The amount of resources supply 𝑖 Resource consumer 𝑗 Resource 𝜔 𝑗 The weight of each kind of resources 𝑎 𝑖𝑗 The amount of consumer 𝑖 requires type 𝑗 resource ℎ Resource provider 𝑎 ℎ𝑗 The amount of provider ℎ requires type 𝑗 resource 𝑡 Timestamp 𝑝 ℎ 𝑡 The price of provider at the timestamp 𝑡 𝑝 ℎ Auction price of provider ℎ 𝑝 𝑖 𝑡 The price of consumer at the timestamp 𝑡 𝑝 𝑖 Bidding price of user 𝑖 𝑙𝑜𝑎𝑑 𝑡 = 𝑢𝑠𝑒𝑟_𝑎𝑚𝑜𝑢𝑛𝑡 𝑝𝑟𝑜𝑣𝑖𝑑𝑒_𝑎𝑚𝑜𝑢𝑛𝑡 𝑢𝑠𝑒𝑟_𝑎𝑚𝑜𝑢𝑛𝑡= 𝑖=1 𝑁 𝑗=1 𝐾 | 𝜔 𝑗 𝑎 𝑖𝑗 | provide_𝑎𝑚𝑜𝑢𝑛𝑡= ℎ=1 𝑁 𝑗=1 𝐾 | 𝜔 𝑗 𝑎 ℎ𝑗 | If 𝑙𝑜𝑎𝑑 𝑡 >1 𝑝 ℎ 𝑡 = 𝑝 ℎ × 1+ 1 1+ 𝑙𝑜𝑎𝑑 𝑡 If 𝑙𝑜𝑎𝑑 𝑡 <1 𝑝 𝑖 𝑡 = 𝑝 𝑖 × 1− 1 1+ 𝑙𝑜𝑎𝑑 𝑡

Proposed scheme – The Pricing Determination Model 1 2 $100 provide_𝑎𝑚𝑜𝑢𝑛𝑡= ℎ=1 𝑁 𝑗=1 𝐾 | 𝜔 𝑗 𝑎 ℎ𝑗 | = ℎ=1 2 𝑗=1 3 | 𝜔 𝑗 𝑎 ℎ𝑗 | Provider 1 = 0.3×1+0.3×2+0.4×1 + 0.3×1+0.4×4 =3.2 1 4 $150 user_𝑎𝑚𝑜𝑢𝑛𝑡= 𝑖=1 𝑁 𝑗=1 𝐾 | 𝜔 𝑗 𝑎 ℎ𝑗 | = ℎ=1 2 𝑗=1 3 | 𝜔 𝑗 𝑎 𝑖𝑗 | = 0.3×1+0.3×1+0.4×1 + 0.3×2+0.4×3 Provider 2 =2.8 1 $240 𝑝 𝑖 𝑡 = 𝑝 𝑖 × 1− 1 1+ 𝑙𝑜𝑎𝑑 𝑡 𝑙𝑜𝑎𝑑 𝑡 = 𝑢𝑠𝑒𝑟_𝑎𝑚𝑜𝑢𝑛𝑡 𝑝𝑟𝑜𝑣𝑖𝑑𝑒_𝑎𝑚𝑜𝑢𝑛𝑡 If 𝑙𝑜𝑎𝑑 𝑡 <1, Consumer 1 𝑝 1 𝑡 =240× 1− 1 1+0.875 𝑝 1 𝑡 =300× 1− 1 1+0.875 = 2.8 3.2 2 3 $300 =0.875 =112 =140 Consumer 2

Proposed scheme – The Pricing Determination Model 1 2 $100 1 2 $100 Provider 1 Provider 1 1 3 5 -$250 +$240 2 4 -$10 +$300 +$290 1 3 5 -$250 +$112 2 4 -$138 +$140 +$2 1 4 $150 1 4 $150 Provider 2 Provider 2 1 $240 1 $112 Consumer 1 Consumer 1 2 3 $300 2 3 $140 Consumer 2 Consumer 2

Proposed scheme – SAGA ∆𝑓=250−200=50 ∆𝑓=200−200=0 P1 P2 P3 C1 C2 C3 ∆𝑓=−280− −50 =−230 Chromosome Fitness Parents 0 1 1 0 0 1 0 1 1 1 1 0 -$180 1 5 $200 1 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 1 -$50 -$50 2 4 $520 -1 -3 -3 Mutation 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 1 0 $20 -1 4 $200 $200 1 1 1 1 0 0 1 1 1 1 0 0 1 1 0 1 1 1 0 1 0 1 1 1 0 -$280 -$280 1 3 6 $250 $250 1 𝑒𝑥𝑝 ∆𝑓 𝑇 =𝑒𝑥𝑝 −230 100 = 0.1 𝐼𝑓 𝑒𝑥𝑝 ∆𝑓 𝑇 >𝑟𝑎𝑛𝑑𝑜𝑚 0~1 : SA 0.1>0.05 New Parents 1 0 1 1 1 0 1 0 1 1 1 0 1 1 1 0 0 1 $250 $250 1 -$280 1 3 6 0 1 1 1 1 0 1 0 1 1 0 0 $200 1 -$50 2 4

Experimental result – The simulation of the efficiency of SAGA Parameter Value Population number 500 Chromosome number 16 Crossover probability 0.7 Mutation probability 0.08 Number of population genetics 20 Variation of temperature T 𝑇=𝑇×0.95

Experimental result – The simulation of the efficiency of SAGA

The percentage of malicious nodes Experimental result – The simulation of the efficiency of trust model Parameter Value 𝛿 0.8 𝜗 0.2 𝛼 𝛽 The percentage of malicious nodes Providers : 𝟏𝟎% User : 𝟏𝟎% The number of malicious nodes 𝑵×𝟏𝟎+𝟏 𝒏=𝟎~𝟗 𝑵×𝟏𝟎+𝟖

Experimental result – The simulation of the efficiency of trust model The percentage of malicious nodes The average number of successful transactions Malicious SP Normal SP Malicious users Normal users 10% 6.8 619.9 5.3 620.1 20% 5.4 534.6 2.2 535.4 30% 5.6 492.7 2.8 493.9 40% 5.9 507.3 3.7 508.7 50% 2.6 267.5 2.3 268.1

Experimental result – The simulation of the efficiency of trust model Fig. 13. Transaction’s number of normal\malicious users and SP under different percentages

Conclusions Secure and efficient combinatorial double auction SAGA Trust evaluation model