Resource Management Using Untrusted Auctioneers in a Grid Economy

The CORA (Coallocative, Oversubscribing Resource Allocation) architecture is an auction based resource reservation system that makes combinatorial allocations of resources to clients. The focus of this paper is on the use of cryptographic tools in CORA to remove the need for trust in the resource auctioneer. One of the nice properties of this approach is that the auctioneers can be drawn from an arbitrary pool of untrusted peers, without the need to establish pre-existing trust or restrict the role of auctioneer to a trusted system service. This approach results in more flexibility in the design of large economic systems, with the potential for wide distribution of load amongst many auctioneers. In addition, only the winners of the auction and the prices they pay are revealed while all other bid values are kept secret. It is our belief that future growth or commercialisation of large scale Grid systems requires the provision of such mechanisms to share the wide pool of Grid brokered resources such as computers, software, licences and peripherals amongst many users and organisations. This paper encapsulates an overview of our design, our experiences of implementing two different secure auction protocols and the performances that we have achieved.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[3]  Kyle Chard,et al.  Fine Grained Resource Reservation and Management in Grid Economics , 2005, GCA.

[4]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.

[5]  Von-Wun Soo,et al.  Market-oriented multiple resource scheduling in grid computing environments , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[6]  David C. Parkes,et al.  An Iterative Generalized Vickrey Auction: Strategy-Proofness without Complete Revelation , 2001 .

[7]  Artur Andrzejak,et al.  Service-Centric Globally Distributed Computing , 2003, IEEE Internet Comput..

[8]  Ian Welch,et al.  Trustworthy auctions for grid-style economies , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).

[9]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[10]  Hal R. Varian,et al.  Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.

[11]  Yoav Shoham,et al.  Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.

[12]  Ed Dawson,et al.  Five Sealed-bid Auction Models , 2003, ACSW.

[13]  David Abramson,et al.  Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..

[14]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.

[15]  Noam Nisan,et al.  Computationally feasible VCG mechanisms , 2000, EC '00.

[16]  T. Sandholm Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .

[17]  Pierluigi Ritrovato,et al.  An emerging architecture enabling grid based application service provision , 2003, Seventh IEEE International Enterprise Distributed Object Computing Conference, 2003. Proceedings..

[18]  Lalana Kagal,et al.  An infrastructure for distributed trust management , 2001 .

[19]  Farid Ould-Saada,et al.  Building a Production Grid in Scandinavia , 2003, IEEE Internet Comput..

[20]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[21]  Kris Bubendorfer,et al.  Improving resource utilisation in market oriented grid management and scheduling , 2006, ACSW.

[22]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[23]  Jeffrey K. MacKie-Mason,et al.  Generalized Vickrey Auctions , 1994 .

[24]  Ronald M. Harstad,et al.  Computationally Manageable Combinational Auctions , 1998 .

[25]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[26]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[27]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[28]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[29]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.