DeCloud: Truthful Decentralized Double Auction for Edge Clouds

N
Nitinder MohanPost doctoral fellow at Technical University of Munich
DeCloud: Truthful Decentralized
Double Auction for Edge Clouds
A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and
J. Kangasharju
Motivation
• Growing demand for edge resources, making edge pervasive
• Seeking an alternative to big cloud providers, tackling monopoly and
ossification
• Current crowdsourced systems (e.g., iExec, Golem) lack market model
• Devise a market model that would eliminate the need for complex
strategizing
2
Our Proposal – DeCloud
• Provides the market model where rational participants achieve best payoff by
following dominant strategy
• Incorporates custom heuristics for matching highly heterogenous resources with
diverse demands
• Runs on top of distributed ledger
• Requires no central authority
• Enables to use consumer, crowdsourced or any other devices for edge purposes,
i.e. anyone can become an edge service provider (ESP) and get compensation
• Crowdsourced devices are generally underutilized and located exactly where they are most
needed for edge computing – at the edge of the network
3
Overview of DeCloud
• Clients and providers submit
their bids: requests and offers
• P2P network of miners
aggregates bids in block
candidates (similarly to
transactions in any other
blockchain system)
• Miner which discovers a block
also computes allocation, i.e.
match between clients and
providers
4
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenges
1. P2P network is open, truthful
auction needs sealed bids
üTwo-phase bid expose protocol
2. High heterogeneity of resources
and demand
üCustom matching heuristics
3. Finding optimal market behavior
is complex
üTruthful auction – bid your privately
known valuation
5
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenge #1: Sealed Bids on a Blockchain
• Since offers and requests are propagated as transactions across P2P
blockchain network, we need to encrypt them and establish two
major phases:
• Bids are sealed
• Bids are open and allocation (matching) can be computed
• Main idea is to tie bids to cryptographically secured block
• Set of bids may not be altered after block is generated
• It is possible for other miners to verify the correctness of allocation algorithm
execution
• Bids are decrypted only after they are tied to valid block
6
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
10
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
11
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
12
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
13
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
14
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
15
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
16
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
17
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
18
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Submit
container or
VM to
provider
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Challenge #2: Matching Requests and Offers
• The common problems of open crowdsourced environment:
• heterogeneity of resources
• diversity of demand
• Edge imposes own requirements, e.g., latency, and location becomes
important:
• Someone may want just a Raspberry Pi but in specific location
• DeCloud:
• Let participants describe exactly what they want and give them the best possible
match out of available resources
• Since exact match is not always possible, let participants express importance of the
resources by weights
• Everything is a resource: location, reputation, etc.
19
Finding the Best Match
• Offers and requests are represented as normalized vectors
• For example, assume client wants 4 CPU cores
• Distance does not work well:
• if there are two offers with 2 and 8 cores, then 2 is closest to 4
• Vector dot product does not address the flexibility well:
• If there are offers with 3 and 8 cores, vector product will match the request
with offer having 8 cores
• For a flexible client 3 cores is likely to be a better match.
20
21
Quality of Match
Challenge #3: Truthful Auction
• Dominant strategy incentive compatible (DSIC) auction
• Dominant strategy – a strategy that provides best payoff no matter what
other players do
• Incentive compatibility – acting according to true preferences, in our context
bidding privately known valuation
• Most known example – Vickrey or second price auction
• Sealed bids submitted to auctioneer for some single indivisible good
• The highest bid wins
• The winner pays what second highest bidder has offered for the good
22
Some Auction Terms and Metrics
• Payoff or utility – this is what rational participants want to maximize:
• Difference between amount paid and privately known (true) valuation
• Revenue:
• What seller(s) receives, Vickrey auction clearly does not optimize for this
• Welfare:
• Giving the goods to those who value them most, i.e. maximizing the sum of
valuations, Vickrey auction achieves best possible welfare
23
• In double auction both sellers and buyers submit their bids, forming
the market
• Optimizing for revenue puts sellers in the privileged position
• Thus, welfare is more suitable as a performance metric for DeCloud
• In double auction, welfare is sum of valuations of allocated (winning)
participants minus all costs of allocated sellers:
Double Auction in DeCloud
24
Fraction of resources
allocated to r
Cost of
offer o
Valuation of
request r
For all requests and
offers in block beta
Allocation
vector {0,1}
DSIC Double Auction
• McAfee has shown1), that for double auction with just one seller and
buyer DSIC auction is not possible
• McAfee has offered a double auction mechanism where DSIC
property is achieved for more than one pair of participants
• McAfee’s solution became known as trade reduction mechanism,
because the valid seller-buyer pair that determines the trading price
must be excluded.
251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
McAfee’s Mechanism
100% of optimal welfare achieved Trade reduction performed
26
DeCloud Double Action Challenges
• Complex environment
• In cloud auctions, bidders might misreport not only their valuations, but also
hardware requirements or delay bid submission to get better payoff
• Goods are not of single type
• Moreover, in DeCloud there are no discrete types of goods
• Buyers and sellers do not necessarily form pairs
• One seller may serve multiple buyers
• How to minimize negative effect of trade reduction?
27
DeCloud Mechanism Design
• We group offers and requests together into
clusters using our gravity-like matching
heuristics
• In each cluster there are requests and offers
which are the best match for each other
• To minimize negative effect of trade
reduction we group price-compatible
clusters in mini-auctions
• In mini-auction, only one cluster
determines the price and potentially
suffers from trade reduction
28
Measuring the Performance
• Google Cluster Data to emulate requests of clients
• Amazon EC2 M5 instance types as providers
• For costs and valuations we used randomized Amazon EC2 costs
• Truthfulness (DSIC property) affects welfare negatively:
• We exclude requests or offers in the case they define price
• We use pseudo randomness in the case there are not enough requests to
allocate all the valid (by price) offers (or visa versa).
• How much we loose if we would just assume truthful bids and not
take any measures to make truthful bidding the dominant strategy?
29
Results: Welfare
As size of the market grows, the fraction of
reduced trades becomes marginal
DeCloud approaches its non-DSIC
benchmark given enough participants
30
Results: Client Satisfaction
Client satisfaction heatmap Client satisfaction with fixed flexibility
31Client satisfaction indicates the fraction of the accepted clients
Summary and Potential
• Our contribution: DeCloud, truthful double auction with no
auctioneer
• Tackling demand for edge resources with open crowdsourced (and
not only) environment
• Distributed auctions do not have to be limited to edge/cloud
computing
• There is a potential for removing the middleman and minimizing the
costs also in the other areas, involving crowdsourcing or not
32
Thank you!
aleksandr.zavodovski@helsinki.fi
1 of 33

Recommended

Cryptography by
CryptographyCryptography
CryptographyPradeep Balasubramanian
1.3K views30 slides
Cryptography by
CryptographyCryptography
Cryptographysuresh0506
1.9K views38 slides
Cryptography by
CryptographyCryptography
CryptographyDarshanWaghmare
80 views9 slides
Algorand by
AlgorandAlgorand
AlgorandAndrew Huang
1.5K views28 slides
Open bazaar by
Open bazaarOpen bazaar
Open bazaarBrian Hoffman
5.8K views21 slides
Blockchain-Presentation.pptx by
Blockchain-Presentation.pptxBlockchain-Presentation.pptx
Blockchain-Presentation.pptxMeganaaGodhala
4 views43 slides

More Related Content

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds

english_sample_exam_blockchainf_202202.pdf by
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfJyotirmayaMaharana2
6 views34 slides
Icsa2018 blockchain tutorial by
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
2.8K views96 slides
My internwork by
My internworkMy internwork
My internworkV C
120 views8 slides
What is MultiChain Technology? by
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?Blockchain Council
19.3K views8 slides
Blockchain seminar by
Blockchain seminarBlockchain seminar
Blockchain seminarAmiyabablu
40 views17 slides
The future of crowdfunding by
The future of crowdfundingThe future of crowdfunding
The future of crowdfundingWanfeng Chen
407 views24 slides

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds(20)

Icsa2018 blockchain tutorial by Len Bass
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass2.8K views
My internwork by V C
My internworkMy internwork
My internwork
V C120 views
Blockchain seminar by Amiyabablu
Blockchain seminarBlockchain seminar
Blockchain seminar
Amiyabablu40 views
The future of crowdfunding by Wanfeng Chen
The future of crowdfundingThe future of crowdfunding
The future of crowdfunding
Wanfeng Chen407 views
Application Layer Protocols for the IoT by Damien Magoni
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
Damien Magoni1.2K views
MyCrypto Release 9/14/18 by ChronoLogic
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18
ChronoLogic35 views
Ico processes n_li by nikinew1
Ico processes n_liIco processes n_li
Ico processes n_li
nikinew182 views
Distributed systems and blockchain technology by Alket Cecaj
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
Alket Cecaj1.6K views
Agile Network India | Block Chain - New usecases | Abhilash Aravind by AgileNetwork
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash Aravind
AgileNetwork66 views
Secured REST Microservices with Spring Cloud by Orkhan Gasimov
Secured REST Microservices with Spring CloudSecured REST Microservices with Spring Cloud
Secured REST Microservices with Spring Cloud
Orkhan Gasimov2K views
Blockchain Tech by Iqbal Matheen.pptx by EgguIqbal
Blockchain Tech by Iqbal Matheen.pptxBlockchain Tech by Iqbal Matheen.pptx
Blockchain Tech by Iqbal Matheen.pptx
EgguIqbal10 views
Blockchain general presentation nov 2017 v eng by David Vangulick
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
David Vangulick2.7K views

More from Nitinder Mohan

Pruning Edge Research with Latency Shears by
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsNitinder Mohan
108 views20 slides
Edge Computing Platforms and Protocols - Ph.D. thesis by
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisNitinder Mohan
542 views77 slides
Big Data Frameworks: A primer on Apache Spark and MapReduce by
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceNitinder Mohan
90 views38 slides
Open Infrastructure for Edge: A Distributed Ledger Outlook by
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookNitinder Mohan
172 views11 slides
ExEC: Elastic Extensible Edge Cloud by
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud Nitinder Mohan
209 views31 slides
ICON: Intelligent Container Overlays by
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysNitinder Mohan
239 views56 slides

More from Nitinder Mohan(12)

Pruning Edge Research with Latency Shears by Nitinder Mohan
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency Shears
Nitinder Mohan108 views
Edge Computing Platforms and Protocols - Ph.D. thesis by Nitinder Mohan
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
Nitinder Mohan542 views
Big Data Frameworks: A primer on Apache Spark and MapReduce by Nitinder Mohan
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduce
Nitinder Mohan90 views
Open Infrastructure for Edge: A Distributed Ledger Outlook by Nitinder Mohan
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger Outlook
Nitinder Mohan172 views
ExEC: Elastic Extensible Edge Cloud by Nitinder Mohan
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud
Nitinder Mohan209 views
ICON: Intelligent Container Overlays by Nitinder Mohan
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container Overlays
Nitinder Mohan239 views
Redesigning MPTCP in Edge clouds by Nitinder Mohan
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge clouds
Nitinder Mohan238 views
Anveshak: Placing Edge Servers In The Wild by Nitinder Mohan
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The Wild
Nitinder Mohan285 views
MUTE: Multi-Tier Edge networks by Nitinder Mohan
MUTE: Multi-Tier Edge networksMUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networks
Nitinder Mohan354 views
Managing data in computational edge clouds by Nitinder Mohan
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge clouds
Nitinder Mohan506 views
Edge-Fog Cloud: Scaling IoT computations on the edge by Nitinder Mohan
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
Nitinder Mohan1.1K views

Recently uploaded

Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy... by
Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...
Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...Anmol Vishnu Gupta
8 views10 slides
Oral_Presentation_by_Fatma (2).pdf by
Oral_Presentation_by_Fatma (2).pdfOral_Presentation_by_Fatma (2).pdf
Oral_Presentation_by_Fatma (2).pdffatmaalmrzqi
8 views7 slides
Determination of color fastness to rubbing(wet and dry condition) by crockmeter. by
Determination of color fastness to rubbing(wet and dry condition) by crockmeter.Determination of color fastness to rubbing(wet and dry condition) by crockmeter.
Determination of color fastness to rubbing(wet and dry condition) by crockmeter.ShadmanSakib63
8 views6 slides
Worldviews and their (im)plausibility: Science and Holism by
Worldviews and their (im)plausibility: Science and HolismWorldviews and their (im)plausibility: Science and Holism
Worldviews and their (im)plausibility: Science and HolismJohnWilkins48
44 views19 slides
Presentation on experimental laboratory animal- Hamster by
Presentation on experimental laboratory animal- HamsterPresentation on experimental laboratory animal- Hamster
Presentation on experimental laboratory animal- HamsterKanika13641
6 views8 slides

Recently uploaded(20)

Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy... by Anmol Vishnu Gupta
Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...
Evaluation and Standardization of the Marketed Polyherbal drug Patanjali Divy...
Oral_Presentation_by_Fatma (2).pdf by fatmaalmrzqi
Oral_Presentation_by_Fatma (2).pdfOral_Presentation_by_Fatma (2).pdf
Oral_Presentation_by_Fatma (2).pdf
fatmaalmrzqi8 views
Determination of color fastness to rubbing(wet and dry condition) by crockmeter. by ShadmanSakib63
Determination of color fastness to rubbing(wet and dry condition) by crockmeter.Determination of color fastness to rubbing(wet and dry condition) by crockmeter.
Determination of color fastness to rubbing(wet and dry condition) by crockmeter.
ShadmanSakib638 views
Worldviews and their (im)plausibility: Science and Holism by JohnWilkins48
Worldviews and their (im)plausibility: Science and HolismWorldviews and their (im)plausibility: Science and Holism
Worldviews and their (im)plausibility: Science and Holism
JohnWilkins4844 views
Presentation on experimental laboratory animal- Hamster by Kanika13641
Presentation on experimental laboratory animal- HamsterPresentation on experimental laboratory animal- Hamster
Presentation on experimental laboratory animal- Hamster
Kanika136416 views
DNA manipulation Enzymes 2.pdf by NetHelix
DNA manipulation Enzymes 2.pdfDNA manipulation Enzymes 2.pdf
DNA manipulation Enzymes 2.pdf
NetHelix6 views
Ellagic Acid and Its Metabolites as Potent and Selective Allosteric Inhibitor... by Trustlife
Ellagic Acid and Its Metabolites as Potent and Selective Allosteric Inhibitor...Ellagic Acid and Its Metabolites as Potent and Selective Allosteric Inhibitor...
Ellagic Acid and Its Metabolites as Potent and Selective Allosteric Inhibitor...
Trustlife184 views
Exploring the nature and synchronicity of early cluster formation in the Larg... by Sérgio Sacani
Exploring the nature and synchronicity of early cluster formation in the Larg...Exploring the nature and synchronicity of early cluster formation in the Larg...
Exploring the nature and synchronicity of early cluster formation in the Larg...
Sérgio Sacani1.5K views
selection of preformed arch wires during the alignment stage of preadjusted o... by MaherFouda1
selection of preformed arch wires during the alignment stage of preadjusted o...selection of preformed arch wires during the alignment stage of preadjusted o...
selection of preformed arch wires during the alignment stage of preadjusted o...
MaherFouda18 views
RADIATION PHYSICS.pptx by drpriyanka8
RADIATION PHYSICS.pptxRADIATION PHYSICS.pptx
RADIATION PHYSICS.pptx
drpriyanka815 views
Factors affecting fluorescence and phosphorescence.pptx by SamarthGiri1
Factors affecting fluorescence and phosphorescence.pptxFactors affecting fluorescence and phosphorescence.pptx
Factors affecting fluorescence and phosphorescence.pptx
SamarthGiri19 views
Cyanobacteria as a Biofertilizer (BY- Ayushi).pptx by AyushiKardam
Cyanobacteria as a Biofertilizer (BY- Ayushi).pptxCyanobacteria as a Biofertilizer (BY- Ayushi).pptx
Cyanobacteria as a Biofertilizer (BY- Ayushi).pptx
AyushiKardam5 views
Note on the Riemann Hypothesis by vegafrank2
Note on the Riemann HypothesisNote on the Riemann Hypothesis
Note on the Riemann Hypothesis
vegafrank29 views
A giant thin stellar stream in the Coma Galaxy Cluster by Sérgio Sacani
A giant thin stellar stream in the Coma Galaxy ClusterA giant thin stellar stream in the Coma Galaxy Cluster
A giant thin stellar stream in the Coma Galaxy Cluster
Sérgio Sacani23 views
Study on Drug Drug Interaction Through Prescription Analysis of Type II Diabe... by Anmol Vishnu Gupta
Study on Drug Drug Interaction Through Prescription Analysis of Type II Diabe...Study on Drug Drug Interaction Through Prescription Analysis of Type II Diabe...
Study on Drug Drug Interaction Through Prescription Analysis of Type II Diabe...
2. Natural Sciences and Technology Author Siyavula.pdf by ssuser821efa
2. Natural Sciences and Technology Author Siyavula.pdf2. Natural Sciences and Technology Author Siyavula.pdf
2. Natural Sciences and Technology Author Siyavula.pdf
ssuser821efa13 views

DeCloud: Truthful Decentralized Double Auction for Edge Clouds

  • 1. DeCloud: Truthful Decentralized Double Auction for Edge Clouds A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and J. Kangasharju
  • 2. Motivation • Growing demand for edge resources, making edge pervasive • Seeking an alternative to big cloud providers, tackling monopoly and ossification • Current crowdsourced systems (e.g., iExec, Golem) lack market model • Devise a market model that would eliminate the need for complex strategizing 2
  • 3. Our Proposal – DeCloud • Provides the market model where rational participants achieve best payoff by following dominant strategy • Incorporates custom heuristics for matching highly heterogenous resources with diverse demands • Runs on top of distributed ledger • Requires no central authority • Enables to use consumer, crowdsourced or any other devices for edge purposes, i.e. anyone can become an edge service provider (ESP) and get compensation • Crowdsourced devices are generally underutilized and located exactly where they are most needed for edge computing – at the edge of the network 3
  • 4. Overview of DeCloud • Clients and providers submit their bids: requests and offers • P2P network of miners aggregates bids in block candidates (similarly to transactions in any other blockchain system) • Miner which discovers a block also computes allocation, i.e. match between clients and providers 4 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 5. Challenges 1. P2P network is open, truthful auction needs sealed bids üTwo-phase bid expose protocol 2. High heterogeneity of resources and demand üCustom matching heuristics 3. Finding optimal market behavior is complex üTruthful auction – bid your privately known valuation 5 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 6. Challenge #1: Sealed Bids on a Blockchain • Since offers and requests are propagated as transactions across P2P blockchain network, we need to encrypt them and establish two major phases: • Bids are sealed • Bids are open and allocation (matching) can be computed • Main idea is to tie bids to cryptographically secured block • Set of bids may not be altered after block is generated • It is possible for other miners to verify the correctness of allocation algorithm execution • Bids are decrypted only after they are tied to valid block 6
  • 7. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Miner A Rest of the miners Phase I: bidding
  • 8. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Phase I: bidding
  • 9. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 10. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 10 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 11. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 11 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 12. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 12 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 13. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block 13 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 14. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 14 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 15. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 15 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 16. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 16 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 17. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 17 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 18. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 18 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Submit container or VM to provider Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 19. Challenge #2: Matching Requests and Offers • The common problems of open crowdsourced environment: • heterogeneity of resources • diversity of demand • Edge imposes own requirements, e.g., latency, and location becomes important: • Someone may want just a Raspberry Pi but in specific location • DeCloud: • Let participants describe exactly what they want and give them the best possible match out of available resources • Since exact match is not always possible, let participants express importance of the resources by weights • Everything is a resource: location, reputation, etc. 19
  • 20. Finding the Best Match • Offers and requests are represented as normalized vectors • For example, assume client wants 4 CPU cores • Distance does not work well: • if there are two offers with 2 and 8 cores, then 2 is closest to 4 • Vector dot product does not address the flexibility well: • If there are offers with 3 and 8 cores, vector product will match the request with offer having 8 cores • For a flexible client 3 cores is likely to be a better match. 20
  • 22. Challenge #3: Truthful Auction • Dominant strategy incentive compatible (DSIC) auction • Dominant strategy – a strategy that provides best payoff no matter what other players do • Incentive compatibility – acting according to true preferences, in our context bidding privately known valuation • Most known example – Vickrey or second price auction • Sealed bids submitted to auctioneer for some single indivisible good • The highest bid wins • The winner pays what second highest bidder has offered for the good 22
  • 23. Some Auction Terms and Metrics • Payoff or utility – this is what rational participants want to maximize: • Difference between amount paid and privately known (true) valuation • Revenue: • What seller(s) receives, Vickrey auction clearly does not optimize for this • Welfare: • Giving the goods to those who value them most, i.e. maximizing the sum of valuations, Vickrey auction achieves best possible welfare 23
  • 24. • In double auction both sellers and buyers submit their bids, forming the market • Optimizing for revenue puts sellers in the privileged position • Thus, welfare is more suitable as a performance metric for DeCloud • In double auction, welfare is sum of valuations of allocated (winning) participants minus all costs of allocated sellers: Double Auction in DeCloud 24 Fraction of resources allocated to r Cost of offer o Valuation of request r For all requests and offers in block beta Allocation vector {0,1}
  • 25. DSIC Double Auction • McAfee has shown1), that for double auction with just one seller and buyer DSIC auction is not possible • McAfee has offered a double auction mechanism where DSIC property is achieved for more than one pair of participants • McAfee’s solution became known as trade reduction mechanism, because the valid seller-buyer pair that determines the trading price must be excluded. 251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
  • 26. McAfee’s Mechanism 100% of optimal welfare achieved Trade reduction performed 26
  • 27. DeCloud Double Action Challenges • Complex environment • In cloud auctions, bidders might misreport not only their valuations, but also hardware requirements or delay bid submission to get better payoff • Goods are not of single type • Moreover, in DeCloud there are no discrete types of goods • Buyers and sellers do not necessarily form pairs • One seller may serve multiple buyers • How to minimize negative effect of trade reduction? 27
  • 28. DeCloud Mechanism Design • We group offers and requests together into clusters using our gravity-like matching heuristics • In each cluster there are requests and offers which are the best match for each other • To minimize negative effect of trade reduction we group price-compatible clusters in mini-auctions • In mini-auction, only one cluster determines the price and potentially suffers from trade reduction 28
  • 29. Measuring the Performance • Google Cluster Data to emulate requests of clients • Amazon EC2 M5 instance types as providers • For costs and valuations we used randomized Amazon EC2 costs • Truthfulness (DSIC property) affects welfare negatively: • We exclude requests or offers in the case they define price • We use pseudo randomness in the case there are not enough requests to allocate all the valid (by price) offers (or visa versa). • How much we loose if we would just assume truthful bids and not take any measures to make truthful bidding the dominant strategy? 29
  • 30. Results: Welfare As size of the market grows, the fraction of reduced trades becomes marginal DeCloud approaches its non-DSIC benchmark given enough participants 30
  • 31. Results: Client Satisfaction Client satisfaction heatmap Client satisfaction with fixed flexibility 31Client satisfaction indicates the fraction of the accepted clients
  • 32. Summary and Potential • Our contribution: DeCloud, truthful double auction with no auctioneer • Tackling demand for edge resources with open crowdsourced (and not only) environment • Distributed auctions do not have to be limited to edge/cloud computing • There is a potential for removing the middleman and minimizing the costs also in the other areas, involving crowdsourcing or not 32