SlideShare a Scribd company logo
1 of 33
DeCloud: Truthful Decentralized
Double Auction for Edge Clouds
A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and
J. Kangasharju
Motivation
• Growing demand for edge resources, making edge pervasive
• Seeking an alternative to big cloud providers, tackling monopoly and
ossification
• Current crowdsourced systems (e.g., iExec, Golem) lack market model
• Devise a market model that would eliminate the need for complex
strategizing
2
Our Proposal – DeCloud
• Provides the market model where rational participants achieve best payoff by
following dominant strategy
• Incorporates custom heuristics for matching highly heterogenous resources with
diverse demands
• Runs on top of distributed ledger
• Requires no central authority
• Enables to use consumer, crowdsourced or any other devices for edge purposes,
i.e. anyone can become an edge service provider (ESP) and get compensation
• Crowdsourced devices are generally underutilized and located exactly where they are most
needed for edge computing – at the edge of the network
3
Overview of DeCloud
• Clients and providers submit
their bids: requests and offers
• P2P network of miners
aggregates bids in block
candidates (similarly to
transactions in any other
blockchain system)
• Miner which discovers a block
also computes allocation, i.e.
match between clients and
providers
4
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenges
1. P2P network is open, truthful
auction needs sealed bids
üTwo-phase bid expose protocol
2. High heterogeneity of resources
and demand
üCustom matching heuristics
3. Finding optimal market behavior
is complex
üTruthful auction – bid your privately
known valuation
5
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenge #1: Sealed Bids on a Blockchain
• Since offers and requests are propagated as transactions across P2P
blockchain network, we need to encrypt them and establish two
major phases:
• Bids are sealed
• Bids are open and allocation (matching) can be computed
• Main idea is to tie bids to cryptographically secured block
• Set of bids may not be altered after block is generated
• It is possible for other miners to verify the correctness of allocation algorithm
execution
• Bids are decrypted only after they are tied to valid block
6
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
10
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
11
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
12
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
13
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
14
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
15
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
16
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
17
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
18
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Submit
container or
VM to
provider
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Challenge #2: Matching Requests and Offers
• The common problems of open crowdsourced environment:
• heterogeneity of resources
• diversity of demand
• Edge imposes own requirements, e.g., latency, and location becomes
important:
• Someone may want just a Raspberry Pi but in specific location
• DeCloud:
• Let participants describe exactly what they want and give them the best possible
match out of available resources
• Since exact match is not always possible, let participants express importance of the
resources by weights
• Everything is a resource: location, reputation, etc.
19
Finding the Best Match
• Offers and requests are represented as normalized vectors
• For example, assume client wants 4 CPU cores
• Distance does not work well:
• if there are two offers with 2 and 8 cores, then 2 is closest to 4
• Vector dot product does not address the flexibility well:
• If there are offers with 3 and 8 cores, vector product will match the request
with offer having 8 cores
• For a flexible client 3 cores is likely to be a better match.
20
21
Quality of Match
Challenge #3: Truthful Auction
• Dominant strategy incentive compatible (DSIC) auction
• Dominant strategy – a strategy that provides best payoff no matter what
other players do
• Incentive compatibility – acting according to true preferences, in our context
bidding privately known valuation
• Most known example – Vickrey or second price auction
• Sealed bids submitted to auctioneer for some single indivisible good
• The highest bid wins
• The winner pays what second highest bidder has offered for the good
22
Some Auction Terms and Metrics
• Payoff or utility – this is what rational participants want to maximize:
• Difference between amount paid and privately known (true) valuation
• Revenue:
• What seller(s) receives, Vickrey auction clearly does not optimize for this
• Welfare:
• Giving the goods to those who value them most, i.e. maximizing the sum of
valuations, Vickrey auction achieves best possible welfare
23
• In double auction both sellers and buyers submit their bids, forming
the market
• Optimizing for revenue puts sellers in the privileged position
• Thus, welfare is more suitable as a performance metric for DeCloud
• In double auction, welfare is sum of valuations of allocated (winning)
participants minus all costs of allocated sellers:
Double Auction in DeCloud
24
Fraction of resources
allocated to r
Cost of
offer o
Valuation of
request r
For all requests and
offers in block beta
Allocation
vector {0,1}
DSIC Double Auction
• McAfee has shown1), that for double auction with just one seller and
buyer DSIC auction is not possible
• McAfee has offered a double auction mechanism where DSIC
property is achieved for more than one pair of participants
• McAfee’s solution became known as trade reduction mechanism,
because the valid seller-buyer pair that determines the trading price
must be excluded.
251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
McAfee’s Mechanism
100% of optimal welfare achieved Trade reduction performed
26
DeCloud Double Action Challenges
• Complex environment
• In cloud auctions, bidders might misreport not only their valuations, but also
hardware requirements or delay bid submission to get better payoff
• Goods are not of single type
• Moreover, in DeCloud there are no discrete types of goods
• Buyers and sellers do not necessarily form pairs
• One seller may serve multiple buyers
• How to minimize negative effect of trade reduction?
27
DeCloud Mechanism Design
• We group offers and requests together into
clusters using our gravity-like matching
heuristics
• In each cluster there are requests and offers
which are the best match for each other
• To minimize negative effect of trade
reduction we group price-compatible
clusters in mini-auctions
• In mini-auction, only one cluster
determines the price and potentially
suffers from trade reduction
28
Measuring the Performance
• Google Cluster Data to emulate requests of clients
• Amazon EC2 M5 instance types as providers
• For costs and valuations we used randomized Amazon EC2 costs
• Truthfulness (DSIC property) affects welfare negatively:
• We exclude requests or offers in the case they define price
• We use pseudo randomness in the case there are not enough requests to
allocate all the valid (by price) offers (or visa versa).
• How much we loose if we would just assume truthful bids and not
take any measures to make truthful bidding the dominant strategy?
29
Results: Welfare
As size of the market grows, the fraction of
reduced trades becomes marginal
DeCloud approaches its non-DSIC
benchmark given enough participants
30
Results: Client Satisfaction
Client satisfaction heatmap Client satisfaction with fixed flexibility
31Client satisfaction indicates the fraction of the accepted clients
Summary and Potential
• Our contribution: DeCloud, truthful double auction with no
auctioneer
• Tackling demand for edge resources with open crowdsourced (and
not only) environment
• Distributed auctions do not have to be limited to edge/cloud
computing
• There is a potential for removing the middleman and minimizing the
costs also in the other areas, involving crowdsourcing or not
32
Thank you!
aleksandr.zavodovski@helsinki.fi

More Related Content

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds

OpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsOpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsWashington Sanchez
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfJyotirmayaMaharana2
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
My internwork
My internworkMy internwork
My internworkV C
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?Blockchain Council
 
Blockchain seminar
Blockchain seminarBlockchain seminar
Blockchain seminarAmiyabablu
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfundingWanfeng Chen
 
Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptxSwarnaSLcse
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledgersendhilkumarks
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
MyCrypto Release 9/14/18
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18ChronoLogic
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_linikinew1
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technologyAlket Cecaj
 
Agile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgileNetwork
 
Blockchain Webdev.pptx
Blockchain Webdev.pptxBlockchain Webdev.pptx
Blockchain Webdev.pptxhenilvalandpvt
 

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds (20)

OpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsOpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goods
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdf
 
E-auction.pptx
E-auction.pptxE-auction.pptx
E-auction.pptx
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
My internwork
My internworkMy internwork
My internwork
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
 
Blockchain seminar
Blockchain seminarBlockchain seminar
Blockchain seminar
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfunding
 
Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptx
 
Bitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptxBitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptx
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
MyCrypto Release 9/14/18
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_li
 
Managing Initial Coin Offerings
Managing Initial Coin OfferingsManaging Initial Coin Offerings
Managing Initial Coin Offerings
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Agile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash Aravind
 
Blockchain Webdev.pptx
Blockchain Webdev.pptxBlockchain Webdev.pptx
Blockchain Webdev.pptx
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 

More from Nitinder Mohan

Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsNitinder Mohan
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisNitinder Mohan
 
Big Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceNitinder Mohan
 
Open Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookNitinder Mohan
 
ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud Nitinder Mohan
 
ICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysNitinder Mohan
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsNitinder Mohan
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildNitinder Mohan
 
MUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksMUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksNitinder Mohan
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge cloudsNitinder Mohan
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeNitinder Mohan
 

More from Nitinder Mohan (12)

Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency Shears
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
Big Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduce
 
Open Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger Outlook
 
ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud
 
ICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container Overlays
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge clouds
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The Wild
 
MUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksMUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networks
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge clouds
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 

Recently uploaded

Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 

Recently uploaded (20)

Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 

DeCloud: Truthful Decentralized Double Auction for Edge Clouds

  • 1. DeCloud: Truthful Decentralized Double Auction for Edge Clouds A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and J. Kangasharju
  • 2. Motivation • Growing demand for edge resources, making edge pervasive • Seeking an alternative to big cloud providers, tackling monopoly and ossification • Current crowdsourced systems (e.g., iExec, Golem) lack market model • Devise a market model that would eliminate the need for complex strategizing 2
  • 3. Our Proposal – DeCloud • Provides the market model where rational participants achieve best payoff by following dominant strategy • Incorporates custom heuristics for matching highly heterogenous resources with diverse demands • Runs on top of distributed ledger • Requires no central authority • Enables to use consumer, crowdsourced or any other devices for edge purposes, i.e. anyone can become an edge service provider (ESP) and get compensation • Crowdsourced devices are generally underutilized and located exactly where they are most needed for edge computing – at the edge of the network 3
  • 4. Overview of DeCloud • Clients and providers submit their bids: requests and offers • P2P network of miners aggregates bids in block candidates (similarly to transactions in any other blockchain system) • Miner which discovers a block also computes allocation, i.e. match between clients and providers 4 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 5. Challenges 1. P2P network is open, truthful auction needs sealed bids üTwo-phase bid expose protocol 2. High heterogeneity of resources and demand üCustom matching heuristics 3. Finding optimal market behavior is complex üTruthful auction – bid your privately known valuation 5 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 6. Challenge #1: Sealed Bids on a Blockchain • Since offers and requests are propagated as transactions across P2P blockchain network, we need to encrypt them and establish two major phases: • Bids are sealed • Bids are open and allocation (matching) can be computed • Main idea is to tie bids to cryptographically secured block • Set of bids may not be altered after block is generated • It is possible for other miners to verify the correctness of allocation algorithm execution • Bids are decrypted only after they are tied to valid block 6
  • 7. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Miner A Rest of the miners Phase I: bidding
  • 8. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Phase I: bidding
  • 9. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 10. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 10 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 11. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 11 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 12. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 12 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 13. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block 13 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 14. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 14 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 15. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 15 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 16. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 16 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 17. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 17 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 18. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 18 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Submit container or VM to provider Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 19. Challenge #2: Matching Requests and Offers • The common problems of open crowdsourced environment: • heterogeneity of resources • diversity of demand • Edge imposes own requirements, e.g., latency, and location becomes important: • Someone may want just a Raspberry Pi but in specific location • DeCloud: • Let participants describe exactly what they want and give them the best possible match out of available resources • Since exact match is not always possible, let participants express importance of the resources by weights • Everything is a resource: location, reputation, etc. 19
  • 20. Finding the Best Match • Offers and requests are represented as normalized vectors • For example, assume client wants 4 CPU cores • Distance does not work well: • if there are two offers with 2 and 8 cores, then 2 is closest to 4 • Vector dot product does not address the flexibility well: • If there are offers with 3 and 8 cores, vector product will match the request with offer having 8 cores • For a flexible client 3 cores is likely to be a better match. 20
  • 22. Challenge #3: Truthful Auction • Dominant strategy incentive compatible (DSIC) auction • Dominant strategy – a strategy that provides best payoff no matter what other players do • Incentive compatibility – acting according to true preferences, in our context bidding privately known valuation • Most known example – Vickrey or second price auction • Sealed bids submitted to auctioneer for some single indivisible good • The highest bid wins • The winner pays what second highest bidder has offered for the good 22
  • 23. Some Auction Terms and Metrics • Payoff or utility – this is what rational participants want to maximize: • Difference between amount paid and privately known (true) valuation • Revenue: • What seller(s) receives, Vickrey auction clearly does not optimize for this • Welfare: • Giving the goods to those who value them most, i.e. maximizing the sum of valuations, Vickrey auction achieves best possible welfare 23
  • 24. • In double auction both sellers and buyers submit their bids, forming the market • Optimizing for revenue puts sellers in the privileged position • Thus, welfare is more suitable as a performance metric for DeCloud • In double auction, welfare is sum of valuations of allocated (winning) participants minus all costs of allocated sellers: Double Auction in DeCloud 24 Fraction of resources allocated to r Cost of offer o Valuation of request r For all requests and offers in block beta Allocation vector {0,1}
  • 25. DSIC Double Auction • McAfee has shown1), that for double auction with just one seller and buyer DSIC auction is not possible • McAfee has offered a double auction mechanism where DSIC property is achieved for more than one pair of participants • McAfee’s solution became known as trade reduction mechanism, because the valid seller-buyer pair that determines the trading price must be excluded. 251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
  • 26. McAfee’s Mechanism 100% of optimal welfare achieved Trade reduction performed 26
  • 27. DeCloud Double Action Challenges • Complex environment • In cloud auctions, bidders might misreport not only their valuations, but also hardware requirements or delay bid submission to get better payoff • Goods are not of single type • Moreover, in DeCloud there are no discrete types of goods • Buyers and sellers do not necessarily form pairs • One seller may serve multiple buyers • How to minimize negative effect of trade reduction? 27
  • 28. DeCloud Mechanism Design • We group offers and requests together into clusters using our gravity-like matching heuristics • In each cluster there are requests and offers which are the best match for each other • To minimize negative effect of trade reduction we group price-compatible clusters in mini-auctions • In mini-auction, only one cluster determines the price and potentially suffers from trade reduction 28
  • 29. Measuring the Performance • Google Cluster Data to emulate requests of clients • Amazon EC2 M5 instance types as providers • For costs and valuations we used randomized Amazon EC2 costs • Truthfulness (DSIC property) affects welfare negatively: • We exclude requests or offers in the case they define price • We use pseudo randomness in the case there are not enough requests to allocate all the valid (by price) offers (or visa versa). • How much we loose if we would just assume truthful bids and not take any measures to make truthful bidding the dominant strategy? 29
  • 30. Results: Welfare As size of the market grows, the fraction of reduced trades becomes marginal DeCloud approaches its non-DSIC benchmark given enough participants 30
  • 31. Results: Client Satisfaction Client satisfaction heatmap Client satisfaction with fixed flexibility 31Client satisfaction indicates the fraction of the accepted clients
  • 32. Summary and Potential • Our contribution: DeCloud, truthful double auction with no auctioneer • Tackling demand for edge resources with open crowdsourced (and not only) environment • Distributed auctions do not have to be limited to edge/cloud computing • There is a potential for removing the middleman and minimizing the costs also in the other areas, involving crowdsourcing or not 32