Incentive Mechanisms for Resource Scaling-out Game of Stream Big Data Analytics

For stream big data analytics, a participated task always needs to scale out resources when its input data increases steeply. Typically, the resource scaling-out can be achieved by increasing the parallelism degree of the platform based on the experience. However, the resource scaling-out of each task produces additional cost not only from itself but also from other competitive tasks, which brings about great challenges to ensure the efficient utilization of resources. To solve it systematically, we consider the resource scaling-out as a non-cooperative game and formulate a total cost model including a risk function and a task execution time function. The total cost of resource scaling-out reflects the influence of topology structure for the benefit of a participated task. Then we introduce the concept of price of anarchy (POA) to this game and get its upper bounds under specific conditions to describe the efficiency loss of Nash equilibrium. Hence, two economic classic tax-based incentive policies: Pivotal Mechanism and Externality Mechanism are applied, to stimulate the participation of tasks. We make simulations in different scenarios including node degree and different characteristics of tasks. The simulations results show the influence of the topological structure and interdependent relationships of tasks for resource scaling-out game in the proposed scenarios and that the incentive mechanisms can effectively improve the performance of resource scaling-out.

[1]  R. Srikant,et al.  Scheduling Storms and Streams in the Cloud , 2015, SIGMETRICS.

[2]  Kenli Li,et al.  A Framework of Price Bidding Configurations for Resource Usage in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.

[3]  Gábor Terstyánszky,et al.  Extending Science Gateway Frameworks to Support Big Data Applications in the Cloud , 2016, Journal of Grid Computing.

[4]  L. Hurwicz Outcome Functions Yielding Walrasian and Lindahl Allocations at Nash Equilibrium Points , 1979 .

[5]  Sajal K. Das,et al.  Incentive Mechanisms for Participatory Sensing , 2015, ACM Trans. Sens. Networks.

[6]  Jun Guo,et al.  The Role of Data Analysis in the Development of Intelligent Energy Networks , 2017, IEEE Network.

[7]  Robert J. Meijer,et al.  Dynamically Scaling Apache Storm for the Analysis of Streaming Data , 2015, 2015 IEEE First International Conference on Big Data Computing Service and Applications.

[8]  Roy D. Sleator,et al.  'Big data', Hadoop and cloud computing in genomics , 2013, J. Biomed. Informatics.

[9]  Albert Y. Zomaya,et al.  CA-DAG: Modeling Communication-Aware Applications for Scheduling in Cloud Computing , 2015, Journal of Grid Computing.

[10]  Sherali Zeadally,et al.  Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud , 2015, IEEE Network.

[11]  Qian Wu,et al.  Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Victor Medel Gracia,et al.  Resource Efficiency to Partition Big Streamed Graphs , 2015, ISPDC.

[13]  Michael Tighe,et al.  Topology and Application Aware Dynamic VM Management in the Cloud , 2017, Journal of Grid Computing.

[14]  Antonio Iera,et al.  MIFaaS: A Mobile-IoT-Federation-as-a-Service Model for dynamic cooperation of IoT Cloud Providers , 2017, Future Gener. Comput. Syst..

[15]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[16]  Xiaoying Gan,et al.  A Contract-Based Incentive Mechanism for Delayed Traffic Offloading in Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[17]  Mingxuan Sun,et al.  Constrained VCG Auction for Spatial Spectrum Reuse with Flexible Channel Evaluations , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[18]  Matti Latva-aho,et al.  Incentivizing Selected Devices to Perform Cooperative Content Delivery: A Carrier Aggregation-Based Approach , 2016, IEEE Transactions on Wireless Communications.

[19]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[20]  José Antonio Lozano,et al.  A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments , 2014, Journal of Grid Computing.

[21]  George Kesidis,et al.  On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants , 2015, 2015 IEEE 23rd International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[22]  Chaitanya Swamy,et al.  The effectiveness of Stackelberg strategies and tolls for network congestion games , 2007, SODA '07.

[23]  Parinaz Naghizadeh Ardabili,et al.  Exit equilibrium: Towards understanding voluntary participation in security games , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[24]  Vijay Subramanian,et al.  Incentivizing Sharing in Realtime D2D Streaming Networks: A Mean Field Game Perspective , 2016, IEEE/ACM Transactions on Networking.

[25]  Dusit Niyato,et al.  A Framework for Cooperative Resource Management in Mobile Cloud Computing , 2013, IEEE Journal on Selected Areas in Communications.

[26]  Wei Song,et al.  Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing , 2016, IEEE Transactions on Services Computing.

[27]  MengChu Zhou,et al.  VCG Auction-Based Dynamic Pricing for Multigranularity Service Composition , 2018, IEEE Transactions on Automation Science and Engineering.

[28]  M. Shamim Hossain,et al.  Efficient Resource Scheduling for Big Data Processing in Cloud Platform , 2014, IDCS.

[29]  Jean C. Walrand,et al.  How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.

[30]  Tim Roughgarden,et al.  Weighted Congestion Games: The Price of Anarchy, Universal Worst-Case Examples, and Tightness , 2014, TEAC.

[31]  Michael P. Wellman,et al.  Strategic formation of credit networks , 2012, WWW.

[32]  Yuan Zhang,et al.  On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Stefano Leucci,et al.  Locality-Based Network Creation Games , 2016, ACM Trans. Parallel Comput..

[34]  Richard Wolski,et al.  Eliciting honest value information in a batch-queue environment , 2007, 2007 8th IEEE/ACM International Conference on Grid Computing.

[35]  Nicholas Bambos,et al.  Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.