A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees

Auction is an effective mechanism to distribute spectrum resources. Although many privacy-preserving auction schemes for spectrum allocation have been proposed, none of them is able to perform practical spectrum auctions while ensuring enough security for bidders’ private information, such as geo-locations, bid values, and data access patterns. To address this problem, we propose SLISA, a lightweight auction framework which enables an efficient spectrum allocation without revealing anything but the auction outcome, i.e., the winning bidders and their clearing prices. We present contributions on two fronts. First, as a foundation of our design, we adopt a Shuffle-then-Compute strategy to build a series of secure sub-protocols based on lightweight cryptographic primitives (e.g., additive secret sharing and basic garbled circuits). Second, we improve an advanced spectrum auction mechanism to make it data-oblivious, such that data access patterns can be hidden. Meanwhile, the modified protocols adapt to our elaborate building blocks without affecting its validity and security. We formally prove the security of all protocols under a semi-honest adversary model, and demonstrate performance improvements compared with state-of-the-art works through extensive experiments.

[1]  Bo Li,et al.  TAHES: Truthful double Auction for Heterogeneous Spectrums , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  Guihai Chen,et al.  A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks , 2015, IEEE Transactions on Mobile Computing.

[3]  Mikhail J. Atallah,et al.  Private collaborative forecasting and benchmarking , 2004, WPES '04.

[4]  Yanjiao Chen,et al.  ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum , 2019, IEEE Transactions on Mobile Computing.

[5]  Yanjiao Chen,et al.  Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum , 2019, IEEE/ACM Transactions on Networking.

[6]  Olga Ohrimenko,et al.  Sorting and Searching Behind the Curtain , 2015, Financial Cryptography.

[7]  Nicole Immorlica,et al.  Fast Core Pricing for Rich Advertising Auctions , 2016, EC.

[8]  Fei Wang,et al.  PS-TRUST: Provably secure solution for truthful double spectrum auctions , 2013, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Miao Pan,et al.  Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem , 2011, IEEE Journal on Selected Areas in Communications.

[10]  Liusheng Huang,et al.  ITSEC: An information-theoretically secure framework for truthful spectrum auctions , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[11]  Liusheng Huang,et al.  On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).

[12]  Jiantao Zhou,et al.  Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising , 2019, IEEE Transactions on Dependable and Secure Computing.

[13]  Haibin Zhu,et al.  Location-Aware Deep Collaborative Filtering for Service Recommendation , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[14]  Xia Zhou,et al.  eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.

[15]  Jie Cui,et al.  Secure, efficient and practical double spectrum auction , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).

[16]  Juan Li,et al.  Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMs , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[17]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[18]  Enxin Yao,et al.  An efficient truthful double spectrum auction design for dynamic spectrum access , 2011, 2011 6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).

[19]  Qiang He,et al.  Efficient Query of Quality Correlation for Service Composition , 2018, IEEE Transactions on Services Computing.

[20]  Jin Zhang,et al.  A Reverse Auction Framework for Hybrid Access in Femtocell Network , 2017, Journal of Computer Science and Technology.

[21]  Ke Cheng,et al.  Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[22]  Koichi Yamazaki,et al.  A note on greedy algorithms for the maximum weighted independent set problem , 2003, Discret. Appl. Math..

[23]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Xia Zhou,et al.  TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.

[25]  Jianfeng Ma,et al.  Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks , 2018, IEEE Transactions on Vehicular Technology.

[26]  Yanjiao Chen,et al.  $PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation , 2019, IEEE Transactions on Information Forensics and Security.

[27]  Yuval Ishai,et al.  Extending Oblivious Transfers Efficiently , 2003, CRYPTO.

[28]  Zibin Zheng,et al.  Covering-Based Web Service Quality Prediction via Neighborhood-Aware Matrix Factorization , 2019, IEEE Transactions on Services Computing.