Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets

Auction is an efficient trading mechanism for cloud markets and adopted by many major cloud providers, such as Amazon EC2. However, most cloud auction designs only target at economic robustness without considering the bidding privacy leakage, which would dramatically hamper the practical applications of truthful cloud auctions. Existing secure cloud auction mechanisms only work on the single-sided cloud markets rather than more practical two-sided markets, and these schemes are too unwieldy to be practical due to significant computation and communication overheads. To fill these gaps, in this paper we propose a privacy-preserving double auction mechanism for two-sided cloud markets, which would not leak any bidding information beyond the auction results to anyone. Technically, we start by presenting a novel secure sorting protocol in the mixed form, which combines additive secret sharing and garbled circuits together. On this basis, our design for secure cloud auction is implemented given consideration to bidding privacy and auction efficiency. Finally, we use extensive experiments to validate its efficacy and performance.

[1]  Tao Zhang,et al.  MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation , 2017, IEEE Communications Magazine.

[2]  Michael Zohner,et al.  ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.

[3]  Minglu Li,et al.  A Double Auction Mechanism to Bridge Users’ Task Requirements and Providers’ Resources in Two-Sided Cloud Markets , 2018, IEEE Transactions on Parallel and Distributed Systems.

[4]  Olga Ohrimenko,et al.  Sorting and Searching Behind the Curtain , 2015, Financial Cryptography.

[5]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[6]  Xiaohong Jiang,et al.  Secure k-NN Query on Encrypted Cloud Data with Multiple Keys , 2017 .

[7]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[8]  Jie Cui,et al.  Secure, efficient and practical double spectrum auction , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).

[9]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[10]  Yantian Hou,et al.  Secure Similar Sequence Query on Outsourced Genomic Data , 2018, AsiaCCS.

[11]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.

[12]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[13]  Liusheng Huang,et al.  On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).

[14]  Kenneth E. Batcher,et al.  Sorting networks and their applications , 1968, AFIPS Spring Joint Computing Conference.

[15]  Yanjiao Chen,et al.  $PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation , 2019, IEEE Transactions on Information Forensics and Security.