Trustworthy auctions for grid-style economies

Commercialisation or globalisation of large scale grids requires the provision of mechanisms to share the wide pool of grid brokered resources such as computers, software, licences and peripherals amongst many users and organisations. Quickly and efficiently servicing resource requests is critical to the efficiency of such grid based utility computing and communication providers. The CORA architecture is a market based resource reservation system that utilises a trustworthy Vickrey auction to make combinatorial allocations of resources. The primary advantage of such a scheme is that a trusted auctioneer is no longer necessary, and any system entity can safely host a trustworthy auction. This approach results in more flexibility in the design of large economic systems, with the potential for wide distribution of load amongst many auctioneers. In addition, only the winners of the auction and the prices they pay are revealed while all other bid values are kept secret. This paper also provides performance results for our implementation, that identify the constraints within which a practical trustworthy auction scheme can be implemented in a grid-style economy.

[1]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[2]  Kris Bubendorfer,et al.  Improving resource utilisation in market oriented grid management and scheduling , 2006, ACSW.

[3]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[4]  Jeffrey K. MacKie-Mason,et al.  Generalized Vickrey Auctions , 1994 .

[5]  Lalana Kagal,et al.  An infrastructure for distributed trust management , 2001 .

[6]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[7]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[8]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[9]  Kyle Chard,et al.  Fine Grained Resource Reservation and Management in Grid Economics , 2005, GCA.

[10]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[11]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[12]  Ed Dawson,et al.  Five Sealed-bid Auction Models , 2003, ACSW.

[13]  David Abramson,et al.  Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..

[14]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[15]  Von-Wun Soo,et al.  Market-oriented multiple resource scheduling in grid computing environments , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[16]  Pierluigi Ritrovato,et al.  An emerging architecture enabling grid based application service provision , 2003, Seventh IEEE International Enterprise Distributed Object Computing Conference, 2003. Proceedings..

[17]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[18]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[19]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[20]  Artur Andrzejak,et al.  Service-Centric Globally Distributed Computing , 2003, IEEE Internet Comput..