Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications

In recent years, auction theory has been extensively studied and many state-of-art solutions have been proposed aiming at allocating scarce resources (e.g. spectrum resources in wireless communications). Unfortunately, most of these studies assume that the auctioneer is always trustworthy in the sealed-bid auctions, which is not always true in a more realistic scenario. On the other hand, performance guarantee, such as social efficiency maximization, is also crucial for auction mechanism design. Therefore, the goal of this work is to design a series of strategyproof and privacy preserving auction mechanisms that maximize the social efficiency. To make the designed auction model more general, we allow the bidders to express their preferences about multiple items, which is often regarded as the multi-unit auction. As computing an optimal allocation in multi-unit auction is NP-hard, we design a set of near optimal allocation mechanisms with privacy preserving separately for: (1) The auction aims at identical multi-items trading; and (2) The auction aims at distinct multi-items trading, which is also known as combinatorial auction. To the best of our knowledge, we are the first to design strategyproof multi-unit auction mechanisms with privacy preserving, which maximize the social efficiency at the same time. The evaluation results corroborate our theoretical analysis, and show that our proposed methods achieve low computation and communication complexity.

[1]  Zongpeng Li,et al.  Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Ari Juels,et al.  A Two-Server, Sealed-Bid Auction Protocol , 2002, Financial Cryptography.

[3]  XiaoHua Xu,et al.  TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[4]  Felix Brandt,et al.  Secure and Private Auctions without Auctioneers , 2002 .

[5]  Katherine Lai The Knapsack Problem and Fully Polynomial Time Approximation Schemes (FPTAS) , 2006 .

[6]  Alan Scheller-Wolf,et al.  Design of a Multi–Unit Double Auction E–Market , 2002, Comput. Intell..

[7]  Xia Zhou,et al.  eBay in the Sky: strategy-proof wireless spectrum auctions , 2008, MobiCom '08.

[8]  Ronald M. Harstad,et al.  Computationally Manageable Combinational Auctions , 1998 .

[9]  Michael P. Wellman,et al.  Flexible double auctions for electronic commerce: theory and implementation , 1998, Decis. Support Syst..

[10]  E. Maasland,et al.  Auction Theory , 2021, Springer Texts in Business and Economics.

[11]  Mingyan Liu,et al.  Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study , 2009, IEEE Transactions on Mobile Computing.

[12]  Daniel Grosu,et al.  Combinatorial Auction-Based Allocation of Virtual Machine Instances in Clouds , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[13]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[14]  Jacques Stern,et al.  Non-interactive Private Auctions , 2002, Financial Cryptography.

[15]  Michel Gendreau,et al.  Combinatorial auctions , 2007, Ann. Oper. Res..

[16]  Moshe Babaioff,et al.  Incentive-compatible, budget-balanced, yet highly efficient auctions for supply chain formation , 2003, EC '03.

[17]  Felix Brandt,et al.  Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.

[18]  Zuo-Jun Max Shen,et al.  Truthful Double Auction Mechanisms , 2008, Oper. Res..

[19]  Miao Pan,et al.  Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.

[20]  Xiang-Yang Li,et al.  Online market driven spectrum scheduling and auction , 2009, CoRoNet '09.

[21]  Mo Dong,et al.  Combinatorial auction with time-frequency flexibility in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[22]  K. K. Ramakrishnan,et al.  iDEAL: Incentivized Dynamic Cellular Offloading via Auctions , 2013, IEEE/ACM Transactions on Networking.

[23]  Noam Nisan,et al.  Truthful approximation mechanisms for restricted combinatorial auctions , 2008, Games Econ. Behav..

[24]  Miao Pan,et al.  Dealing with the Untrustworthy Auctioneer in Combinatorial Spectrum Auctions , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[25]  Masayuki Abe,et al.  M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.

[26]  Xiang-Yang Li,et al.  Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks , 2013, MobiHoc.

[27]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[28]  Felix Brandt,et al.  How to obtain full privacy in auctions , 2006, International Journal of Information Security.

[29]  Yoav Shoham,et al.  Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.

[30]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[31]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.

[32]  Felix Brandt,et al.  Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.

[33]  Noam Nisan,et al.  Approximation algorithms for combinatorial auctions with complement-free bidders , 2005, STOC '05.

[34]  Hung-Yu Wei,et al.  Dynamic Auction Mechanism for Cloud Resource Allocation , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[35]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[36]  Yu-Fang Chung,et al.  Bidder-anonymous English auction scheme with privacy and public verifiability , 2008, J. Syst. Softw..

[37]  Xiang-Yang Li,et al.  Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation , 2017 .

[38]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[39]  Xiang-Yang Li,et al.  SALSA: Strategyproof Online Spectrum Admissions for Wireless Networks , 2010, IEEE Transactions on Computers.

[40]  He Huang,et al.  Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[41]  Xinbing Wang,et al.  Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).