Source: Journal of Systems and Software, Vol. 140, pp , June 2018

Slides:



Advertisements
Similar presentations
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
Advertisements

Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Online Ad Allocation Hossein Esfandiari & Mohammad Reza Khani Game Theory
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
1 Auction or Tâtonnement – Finding Congestion Prices for Adaptive Applications Xin Wang Henning Schulzrinne Columbia University.
Chit Fund Software. First we will try to see how to create a (Chit Scheme) 1. Enter the Chit Name 2. Enter Chit Value. 3. Total No. of members in that.
Online Auctions in IaaS Clouds: Welfare and Profit Maximization with Server Costs Xiaoxi Zhang 1, Zhiyi Huang 1, Chuan Wu 1, Zongpeng Li 2, Francis C.M.
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
The Incidence of Taxation. The incidence of taxation Indirect taxes.
SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments Author Linlin Wu, Saurabh Kumar Garg and Rajkumar.
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing Weijie Shi*, Linquan Zhang +, Chuan Wu*, Zongpeng Li +, Francis C.M. Lau*
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
TRUST:A General Framework for Truthful Double Spectrum Auctions Xia Zhou and Heather Zheng Department of Computer Science, University of California, Santa.
Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society.
Cracow Grid Workshop October 16, 2006 Economic Virtualization of ICT Infrastructures Jochen Stoesser, Arun Anandasivam, Nikolay Borissov, Dirk Neumann.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
1 Computer-assisted learning for mathematical problem solving Source: Computers and Education, Vol.46, February, 2006, pp Author: Chang, Kuo-En;
Ecosel as an Example of Subscription Games Lecture 12 (5/20/2015)
TELECOMMUNICATIONS NUMBERING Susan Horne Project Officer International Training Program 8 September 2006.
Authors: Rajkumar Buyya, David Abramson & Jonathan Giddy
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 The design and application of a web-based self- and peer- assessment system Authors: Sung, Yao-Ting; Chang, Kuo-En; Chiou, Shen-Kuan; Hou, Huei-Tse Source:
Introduction to: Tycoon A Market Based Resource Allocation System by Alejandro García López.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
An AV Control Method Using Natural Language Understanding Author : M. Matsuda, T. Nonaka, and T. Hase Date : Speaker : Sian-Lin Hong IEEE Transactions.
مهندسي سيستم‌هاي تجارت الکترونیکی Electronic Commerce System Engineering (ECSE) رشته مهندسي فناوري اطلاعات- گرايش تجارت الکترونیکی دوره کارشناسی ارشد حضوری.
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Author: Chun-Liang Tung, Tung-Shou Chen and Yung-Chang Chiang
Proxy Blind Signature Scheme
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
JPEG Compressed Image Retrieval via Statistical Features
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Image camouflage by reversible image transformation
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Source: Journal of Visual Communication and Image Representation, Vol
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
Ecosel as an Example of Subscription Games
Centrality Bias Measure for High Density QR Code Module Recognition
Xinbing Wang*, Qian Zhang**
Pricing Model In Cloud Computing
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Decentralized Energy Demand Regulation in Smart Homes
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: Energies, vol. 10, no. 12, pp. 1-22, November 2017
Source : Journal of Visual Communication and Image Representation, vol
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
Source : Journal of Visual Communication and Image Representation, vol
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Source: Pattern Recognition Letters 29 (2008)
Designing Blockchain-based Applications a Case Study for Imported
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Source:Journal of Systems and Software, vol. 140, pp , June 2018
An imperceptible spatial domain color image watermarking scheme
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Pairwise IPVO-Based Reversible Data Hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

A Truthful Combinatorial Double Auction-based Marketplace Mechanism for Cloud Computing Source: Journal of Systems and Software, Vol. 140, pp. 91-108, June 2018 Authors: Dinesh Kumar, Gaurav Baranwal, Zahid Raza, Deo Prakash Vidyarthi Speaker: Chit-Jie Chew Date: 8/23/2018

Outline Introduction Proposed scheme Experimental results Conclusions

Introduction(1/3) - Double Auction $30 $40 Provider 1 Profit: $30 Consumer 1 $35 $50 Provider 2 Consumer 2 Auctioneer $20 $30 Provider 3 Consumer 3

Introduction(2/3) - Combinatorial Double Auction Case 1: Provider 1, 2, 3 Profit: $220 Case 1: Provider 1, 2, 3 Profit: $220 Case 3: Provider 1, 3 Profit: $250 Case 2: Provider 1, 2 Profit: $70 Case 4: Provider 2, 3 Profit: $200 $100 $200 Case 4: Provider 2, 3 Case 3: Provider 1, 3 Case 1: Provider 1, 2, 3 Case 2: Provider 1, 2 Auctioneer Auctioneer Auctioneer Auctioneer -$400 -$250 -$250 -$300 2 2 1 1 3 5 4 3 6 5 5 2 1 2 1 1 1 1 Provider 1 1 2 1 2 2 3 3 1 3 Consumer 1 Consumer 2 Consumer 1 Consumer 2 Consumer 2 +$300 +$300 +$200 +$300 $150 $300 -$ 50 -$100 $ 0 $ 50 2 1 1 1 3 1 3 1 2 1 3 2 1 2 1 2 3 1 1 1 1 2 1 1 1 1 1 1 Consumer 1 Consumer 1 Consumer 1 Consumer 3 +$120 +$200 +$200 +$200 Provider 2 Consumer 2 Auctioneer $100 $250 $70 $200 1 2 1 2 1 1 1 $150 $120 1 2 1 4 Consumer 3 +$120 1 2 Consumer 3 Provider 3 $220 2

Introduction(3/3) – Model based on combinatorial double auction Virtual resource Cloud resource provider 1 · · · · · · Providing bid price · · · · · · Cloud resource consumer n Bidding request Auctioneer Cloud resource provider n Providing bid price · · · · · · Computing resources Storage resources

Proposed scheme(1/3) - Resource allocation 𝑖∈𝑁 𝑞𝑢 𝑘 𝑖 𝑥 𝑖 = 𝑗∈𝑀 𝑧 𝑗𝑘 𝑖∈𝑁 𝑝𝑢 𝑘 𝑖 𝑥 𝑖 − 𝑗∈𝑀 𝑘∈𝐾 𝑝𝑝 𝑘 𝑗 𝑧 𝑗𝑘 >0 − 𝑁,𝑀 : 1 $60 $75 1 1 1 1 1 1 $10 $20 $30 $15 if 𝑝𝑢 𝑖 >𝑐𝑟𝑖𝑡𝑖𝑐𝑎𝑙𝑉𝑎𝑙𝑢𝑒 𝑖 𝑢 go to the next screening − 𝑁,𝑀,𝑣 : 𝑖∈𝑁 𝑝𝑢 𝑘 𝑖 𝑥 𝑖 − 𝑗∈𝑀 𝑘∈𝐾 𝑝𝑝 𝑘 𝑗 𝑧 𝑗𝑘 >0 𝑖∈𝑁 𝑞𝑢 𝑘 𝑖 𝑥 𝑖 + 𝑞𝑢 𝑘 𝑣 = 𝑗∈𝑀 𝑧 𝑗𝑘 2 $25 $35 Provider 1 Consumer 1 $153 $95 1 2 3 1 2 1 $12 $21 $33 $14 $23 $35 Provider 2 Consumer 2 $91 $50 3 1 1 − 𝑁 𝑠 ,𝑀 : 𝑖∈𝑁 𝑝𝑢 𝑘 𝑖 𝑥 𝑖 − 𝑗∈𝑀 𝑘∈𝐾 𝑝𝑝 𝑘 𝑗 𝑧 𝑗𝑘 >0 𝑖∈𝑁 𝑞𝑢 𝑘 𝑖 𝑥 𝑖 = 𝑗∈𝑀 𝑧 𝑗𝑘 3 1 1 1 $13 $20 $32 $8 $17 $25 Provider 3 Consumer 3

Proposed scheme(2/3) - Resource allocation Maximum (Provider) (Consumer) $13 $15 $21 $25 $33 $35 2 Consumer 1 $67 $68 $69 $71 $75 Consumer 2 $88 $89 $90 $91 $94 $100 Consumer 3 $67 $68 $69 $71 $75

Proposed scheme(3/3) - Resource allocation 2 3 2 Consumer demand: $68 $60 $75 Provider Revenue 1 2 3 1 1 1 1 1 1 1 1 1 $65 $10 $20 $30 $15 $25 $35 Provider 1 Consumer 1 1 $89 1 $33 $153 $95 1 1 $53 1 2 3 1 2 1 $12 $21 $33 $14 $23 $35 Provider 2 Consumer 2 $10, $12, $13, $13, $13 $12 $91 $20, $20, $21, $21 $21 Profit = -$65 - $33 - $53 + $68 + $89 3 1 1 = $6 $13 $20 $32 $30, $32, $33, $33, $33 $32 Provider 3 Auctioneer

Experimental results(1/3)

Experimental results(2/3)

Experimental results(3/3) User = 50 Provider = 20

Conclusions Social welfare Budget-balance Individual rational