A Secure and Fair Double Auction Framework for Cloud Virtual Machines

Double auction is one of the most promising solutions to allocate virtual machine (VM) resources in two-sided cloud markets, which can increase the utilization rate of VM resources. However, most cloud auction mechanisms simply assume that the auctioneer is fully trusted while ignoring bid-privacy preservation and trade fairness in the process of auction. Previous studies have indicated that some cryptographic tools can be used to resolve the above issues, but the poor performance makes those techniques difficult to practice. In this paper, we propose a Secure and Fair Double AuCtion framework (named SF-DAC) for cloud virtual machines, which performs cloud auction efficiently while guaranteeing both bid privacy and trade fairness. We design secure 3-party computation protocols that support secure comparison and secure sorting, which enable us to construct a secure double auction scheme that outperforms all prior comparable solutions. Furthermore, we propose a fair trading mechanism based on smart contracts to prevent the bidders from halting the auction without financial penalties. The extensive experiments demonstrate that SF-DAC achieves an order of magnitude reduction in computation and communication costs than prior arts.

[1]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[2]  Houbing Song,et al.  Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing , 2018, IEEE Transactions on Services Computing.

[3]  Mikhail J. Atallah,et al.  Private collaborative forecasting and benchmarking , 2004, WPES '04.

[4]  Yanjiao Chen,et al.  $PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation , 2019, IEEE Transactions on Information Forensics and Security.

[5]  Ke Cheng,et al.  Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[6]  Changyu Dong,et al.  Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.

[7]  Lu Wang,et al.  An Online Mechanism for Purchasing IaaS Instances and Scheduling Pleasingly Parallel Jobs in Cloud Computing Environments , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[8]  Alex J. Malozemoff,et al.  Efficient Three-Party Computation from Cut-and-Choose , 2014, CRYPTO.

[9]  Zhili Chen,et al.  Fair auctioning and trading framework for cloud virtual machines based on blockchain , 2021, Comput. Commun..

[10]  Aseem Rastogi,et al.  CrypTFlow2: Practical 2-Party Secure Inference , 2020, IACR Cryptol. ePrint Arch..

[11]  Jinqiao Shi,et al.  An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference , 2020, ESORICS.

[12]  Owen L. Astrachan,et al.  Bubble sort: an archaeological algorithmic analysis , 2003, SIGCSE.

[13]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[14]  Yulong Shen,et al.  A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[15]  Yanjiao Chen,et al.  Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum , 2019, IEEE/ACM Transactions on Networking.

[16]  Minglu Li,et al.  A Double Auction Mechanism to Bridge Users’ Task Requirements and Providers’ Resources in Two-Sided Cloud Markets , 2018, IEEE Transactions on Parallel and Distributed Systems.

[17]  Mingxiao Du,et al.  Blockchain-Based Fair and Secure Electronic Double Auction Protocol , 2020, IEEE Intelligent Systems.

[18]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[19]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[20]  He Huang,et al.  Auction-Based VM Allocation for Deadline-Sensitive Tasks in Distributed Edge Cloud , 2019, IEEE Transactions on Services Computing.

[21]  Deo Prakash Vidyarthi,et al.  A fair multi-attribute combinatorial double auction model for resource allocation in cloud computing , 2015, J. Syst. Softw..

[22]  Zongpeng Li,et al.  An online auction framework for dynamic resource provisioning in cloud computing , 2014, SIGMETRICS '14.

[23]  Farinaz Koushanfar,et al.  Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..

[24]  Juan Li,et al.  Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMs , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[25]  Michael Ostrovsky,et al.  Reserve Prices in Internet Advertising Auctions: A Field Experiment , 2009, Journal of Political Economy.

[26]  Olga Ohrimenko,et al.  Sorting and Searching Behind the Curtain , 2015, Financial Cryptography.

[27]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[28]  Srinivas Devadas,et al.  Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..

[29]  Muriati Mukhtar,et al.  A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..

[30]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[31]  Yin Xu,et al.  Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks , 2019, ArXiv.

[32]  Yanjiao Chen,et al.  SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation , 2022, IEEE Transactions on Dependable and Secure Computing.

[33]  Curtis R. Cook,et al.  Best sorting algorithm for nearly sorted lists , 1980, CACM.

[34]  S. Rajsbaum Foundations of Cryptography , 2014 .

[35]  Liusheng Huang,et al.  ITSEC: An information-theoretically secure framework for truthful spectrum auctions , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[36]  Songyuan Li,et al.  A Price-Incentive Resource Auction Mechanism Balancing the Interests Between Users and Cloud Service Provider , 2021, IEEE Transactions on Network and Service Management.

[37]  Stanislaw Jarecki,et al.  Three-Party ORAM for Secure Computation , 2015, ASIACRYPT.

[38]  Archana Singhal,et al.  A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing , 2021, Future Gener. Comput. Syst..

[39]  Michael Zohner,et al.  ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.

[40]  Sameer Wagh,et al.  SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..

[41]  Chhabi Rani Panigrahi,et al.  Offer Based Auction Mechanism for Virtual Machine Allocation in Cloud Environment , 2020 .

[42]  Zongpeng Li,et al.  Virtual Machine Trading in a Federation of Clouds: Individual Profit and Social Welfare Maximization , 2013, IEEE/ACM Transactions on Networking.

[43]  Nishant Kumar,et al.  CrypTFlow: Secure TensorFlow Inference , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[44]  Liusheng Huang,et al.  On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).

[45]  Dídac Busquets,et al.  FAIRNESS IN RECURRENT AUCTIONS WITH COMPETING MARKETS AND SUPPLY FLUCTUATIONS , 2012, Comput. Intell..