SlideShare a Scribd company logo
1 of 33
DeCloud: Truthful Decentralized
Double Auction for Edge Clouds
A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and
J. Kangasharju
Motivation
• Growing demand for edge resources, making edge pervasive
• Seeking an alternative to big cloud providers, tackling monopoly and
ossification
• Current crowdsourced systems (e.g., iExec, Golem) lack market model
• Devise a market model that would eliminate the need for complex
strategizing
2
Our Proposal – DeCloud
• Provides the market model where rational participants achieve best payoff by
following dominant strategy
• Incorporates custom heuristics for matching highly heterogenous resources with
diverse demands
• Runs on top of distributed ledger
• Requires no central authority
• Enables to use consumer, crowdsourced or any other devices for edge purposes,
i.e. anyone can become an edge service provider (ESP) and get compensation
• Crowdsourced devices are generally underutilized and located exactly where they are most
needed for edge computing – at the edge of the network
3
Overview of DeCloud
• Clients and providers submit
their bids: requests and offers
• P2P network of miners
aggregates bids in block
candidates (similarly to
transactions in any other
blockchain system)
• Miner which discovers a block
also computes allocation, i.e.
match between clients and
providers
4
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenges
1. P2P network is open, truthful
auction needs sealed bids
üTwo-phase bid expose protocol
2. High heterogeneity of resources
and demand
üCustom matching heuristics
3. Finding optimal market behavior
is complex
üTruthful auction – bid your privately
known valuation
5
Fog Cloud
Ad Hoc Edge
Cloud
GPU Cluster
Edge Server
Smart
Home
Movie
Rendering
PC
Smartphone
Clients Distributed Ledger Providers
Block contaning
matching results
Miners
running auction
algorithm
Scientific
Computing
Challenge #1: Sealed Bids on a Blockchain
• Since offers and requests are propagated as transactions across P2P
blockchain network, we need to encrypt them and establish two
major phases:
• Bids are sealed
• Bids are open and allocation (matching) can be computed
• Main idea is to tie bids to cryptographically secured block
• Set of bids may not be altered after block is generated
• It is possible for other miners to verify the correctness of allocation algorithm
execution
• Bids are decrypted only after they are tied to valid block
6
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
10
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
11
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
12
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
13
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify blockVerify block
Phase I:
bidding
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
14
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
15
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with
temporary keys
• When block containing encrypted bids
is mined, it is broadcasted to the
network
• As a reply, participants broadcast their
temporary keys if their bid is in the
block
• Content of the block is then decrypted
and allocation can be computed
16
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Aggregate
encrypted
bids
Verify block
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
17
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Two-phase bid expose
protocol
• Participants encrypt bids with temporary
keys
• When block containing encrypted bids is
mined, it is broadcasted to the network
• As a reply, participants broadcast their
temporary keys if their bid is in the block
• Content of the block is then decrypted
and allocation can be computed
• Full valid block consists of two parts,
preamble (encrypted bids), and
computed allocation (match between
requests and offers)
18
Create signed
bid
Participant
Encrypt signed
request with
temporary key
and send it
Miner A
Mine block
containing
encrypted
bids
Send block
Make
temporary key
public
Compute
Allocation
Send
allocation
suggestion
Confirm
or reject
suggestion
Rest of the
miners
Aggregate
encrypted
bids
Full block
ready,
share
computed
allocation
Aggregate
encrypted
bids
Verify block
Verify
decryption
and
allocation
Decrypt bids
Submit
container or
VM to
provider
Verify block
Phase I:
bidding
Phase II:
allocation
Decrypt bids
Challenge #2: Matching Requests and Offers
• The common problems of open crowdsourced environment:
• heterogeneity of resources
• diversity of demand
• Edge imposes own requirements, e.g., latency, and location becomes
important:
• Someone may want just a Raspberry Pi but in specific location
• DeCloud:
• Let participants describe exactly what they want and give them the best possible
match out of available resources
• Since exact match is not always possible, let participants express importance of the
resources by weights
• Everything is a resource: location, reputation, etc.
19
Finding the Best Match
• Offers and requests are represented as normalized vectors
• For example, assume client wants 4 CPU cores
• Distance does not work well:
• if there are two offers with 2 and 8 cores, then 2 is closest to 4
• Vector dot product does not address the flexibility well:
• If there are offers with 3 and 8 cores, vector product will match the request
with offer having 8 cores
• For a flexible client 3 cores is likely to be a better match.
20
21
Quality of Match
Challenge #3: Truthful Auction
• Dominant strategy incentive compatible (DSIC) auction
• Dominant strategy – a strategy that provides best payoff no matter what
other players do
• Incentive compatibility – acting according to true preferences, in our context
bidding privately known valuation
• Most known example – Vickrey or second price auction
• Sealed bids submitted to auctioneer for some single indivisible good
• The highest bid wins
• The winner pays what second highest bidder has offered for the good
22
Some Auction Terms and Metrics
• Payoff or utility – this is what rational participants want to maximize:
• Difference between amount paid and privately known (true) valuation
• Revenue:
• What seller(s) receives, Vickrey auction clearly does not optimize for this
• Welfare:
• Giving the goods to those who value them most, i.e. maximizing the sum of
valuations, Vickrey auction achieves best possible welfare
23
• In double auction both sellers and buyers submit their bids, forming
the market
• Optimizing for revenue puts sellers in the privileged position
• Thus, welfare is more suitable as a performance metric for DeCloud
• In double auction, welfare is sum of valuations of allocated (winning)
participants minus all costs of allocated sellers:
Double Auction in DeCloud
24
Fraction of resources
allocated to r
Cost of
offer o
Valuation of
request r
For all requests and
offers in block beta
Allocation
vector {0,1}
DSIC Double Auction
• McAfee has shown1), that for double auction with just one seller and
buyer DSIC auction is not possible
• McAfee has offered a double auction mechanism where DSIC
property is achieved for more than one pair of participants
• McAfee’s solution became known as trade reduction mechanism,
because the valid seller-buyer pair that determines the trading price
must be excluded.
251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
McAfee’s Mechanism
100% of optimal welfare achieved Trade reduction performed
26
DeCloud Double Action Challenges
• Complex environment
• In cloud auctions, bidders might misreport not only their valuations, but also
hardware requirements or delay bid submission to get better payoff
• Goods are not of single type
• Moreover, in DeCloud there are no discrete types of goods
• Buyers and sellers do not necessarily form pairs
• One seller may serve multiple buyers
• How to minimize negative effect of trade reduction?
27
DeCloud Mechanism Design
• We group offers and requests together into
clusters using our gravity-like matching
heuristics
• In each cluster there are requests and offers
which are the best match for each other
• To minimize negative effect of trade
reduction we group price-compatible
clusters in mini-auctions
• In mini-auction, only one cluster
determines the price and potentially
suffers from trade reduction
28
Measuring the Performance
• Google Cluster Data to emulate requests of clients
• Amazon EC2 M5 instance types as providers
• For costs and valuations we used randomized Amazon EC2 costs
• Truthfulness (DSIC property) affects welfare negatively:
• We exclude requests or offers in the case they define price
• We use pseudo randomness in the case there are not enough requests to
allocate all the valid (by price) offers (or visa versa).
• How much we loose if we would just assume truthful bids and not
take any measures to make truthful bidding the dominant strategy?
29
Results: Welfare
As size of the market grows, the fraction of
reduced trades becomes marginal
DeCloud approaches its non-DSIC
benchmark given enough participants
30
Results: Client Satisfaction
Client satisfaction heatmap Client satisfaction with fixed flexibility
31Client satisfaction indicates the fraction of the accepted clients
Summary and Potential
• Our contribution: DeCloud, truthful double auction with no
auctioneer
• Tackling demand for edge resources with open crowdsourced (and
not only) environment
• Distributed auctions do not have to be limited to edge/cloud
computing
• There is a potential for removing the middleman and minimizing the
costs also in the other areas, involving crowdsourcing or not
32
Thank you!
aleksandr.zavodovski@helsinki.fi

More Related Content

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds

OpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsOpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsWashington Sanchez
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfJyotirmayaMaharana2
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
My internwork
My internworkMy internwork
My internworkV C
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?Blockchain Council
 
Blockchain seminar
Blockchain seminarBlockchain seminar
Blockchain seminarAmiyabablu
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfundingWanfeng Chen
 
Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptxSwarnaSLcse
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledgersendhilkumarks
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
MyCrypto Release 9/14/18
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18ChronoLogic
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_linikinew1
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technologyAlket Cecaj
 
Agile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgileNetwork
 
Blockchain Webdev.pptx
Blockchain Webdev.pptxBlockchain Webdev.pptx
Blockchain Webdev.pptxhenilvalandpvt
 

Similar to DeCloud: Truthful Decentralized Double Auction for Edge Clouds (20)

OpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goodsOpenBazaar Ricardian Contracts - physical goods
OpenBazaar Ricardian Contracts - physical goods
 
english_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdfenglish_sample_exam_blockchainf_202202.pdf
english_sample_exam_blockchainf_202202.pdf
 
E-auction.pptx
E-auction.pptxE-auction.pptx
E-auction.pptx
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
My internwork
My internworkMy internwork
My internwork
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
 
Blockchain seminar
Blockchain seminarBlockchain seminar
Blockchain seminar
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfunding
 
Blockchain presentation.pptx
Blockchain presentation.pptxBlockchain presentation.pptx
Blockchain presentation.pptx
 
Bitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptxBitcoin MOOC Lecture 2.pptx
Bitcoin MOOC Lecture 2.pptx
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
MyCrypto Release 9/14/18
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18
 
Ico processes n_li
Ico processes n_liIco processes n_li
Ico processes n_li
 
Managing Initial Coin Offerings
Managing Initial Coin OfferingsManaging Initial Coin Offerings
Managing Initial Coin Offerings
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Agile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash Aravind
 
Blockchain Webdev.pptx
Blockchain Webdev.pptxBlockchain Webdev.pptx
Blockchain Webdev.pptx
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 

More from Nitinder Mohan

Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsNitinder Mohan
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisNitinder Mohan
 
Big Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceNitinder Mohan
 
Open Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookNitinder Mohan
 
ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud Nitinder Mohan
 
ICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysNitinder Mohan
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsNitinder Mohan
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildNitinder Mohan
 
MUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksMUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksNitinder Mohan
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge cloudsNitinder Mohan
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeNitinder Mohan
 

More from Nitinder Mohan (12)

Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency Shears
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
Big Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduceBig Data Frameworks: A primer on Apache Spark and MapReduce
Big Data Frameworks: A primer on Apache Spark and MapReduce
 
Open Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger OutlookOpen Infrastructure for Edge: A Distributed Ledger Outlook
Open Infrastructure for Edge: A Distributed Ledger Outlook
 
ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud ExEC: Elastic Extensible Edge Cloud
ExEC: Elastic Extensible Edge Cloud
 
ICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container Overlays
 
Redesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge cloudsRedesigning MPTCP in Edge clouds
Redesigning MPTCP in Edge clouds
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The Wild
 
MUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networksMUTE: Multi-Tier Edge networks
MUTE: Multi-Tier Edge networks
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge clouds
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 

Recently uploaded

Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPirithiRaju
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 

Recently uploaded (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 

DeCloud: Truthful Decentralized Double Auction for Edge Clouds

  • 1. DeCloud: Truthful Decentralized Double Auction for Edge Clouds A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong and J. Kangasharju
  • 2. Motivation • Growing demand for edge resources, making edge pervasive • Seeking an alternative to big cloud providers, tackling monopoly and ossification • Current crowdsourced systems (e.g., iExec, Golem) lack market model • Devise a market model that would eliminate the need for complex strategizing 2
  • 3. Our Proposal – DeCloud • Provides the market model where rational participants achieve best payoff by following dominant strategy • Incorporates custom heuristics for matching highly heterogenous resources with diverse demands • Runs on top of distributed ledger • Requires no central authority • Enables to use consumer, crowdsourced or any other devices for edge purposes, i.e. anyone can become an edge service provider (ESP) and get compensation • Crowdsourced devices are generally underutilized and located exactly where they are most needed for edge computing – at the edge of the network 3
  • 4. Overview of DeCloud • Clients and providers submit their bids: requests and offers • P2P network of miners aggregates bids in block candidates (similarly to transactions in any other blockchain system) • Miner which discovers a block also computes allocation, i.e. match between clients and providers 4 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 5. Challenges 1. P2P network is open, truthful auction needs sealed bids üTwo-phase bid expose protocol 2. High heterogeneity of resources and demand üCustom matching heuristics 3. Finding optimal market behavior is complex üTruthful auction – bid your privately known valuation 5 Fog Cloud Ad Hoc Edge Cloud GPU Cluster Edge Server Smart Home Movie Rendering PC Smartphone Clients Distributed Ledger Providers Block contaning matching results Miners running auction algorithm Scientific Computing
  • 6. Challenge #1: Sealed Bids on a Blockchain • Since offers and requests are propagated as transactions across P2P blockchain network, we need to encrypt them and establish two major phases: • Bids are sealed • Bids are open and allocation (matching) can be computed • Main idea is to tie bids to cryptographically secured block • Set of bids may not be altered after block is generated • It is possible for other miners to verify the correctness of allocation algorithm execution • Bids are decrypted only after they are tied to valid block 6
  • 7. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Miner A Rest of the miners Phase I: bidding
  • 8. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Phase I: bidding
  • 9. Two-phase bid expose protocol • Participants encrypt bids with temporary keys Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 10. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 10 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 11. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 11 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Phase I: bidding
  • 12. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network 12 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 13. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block 13 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify blockVerify block Phase I: bidding
  • 14. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 14 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 15. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 15 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 16. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed 16 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Aggregate encrypted bids Verify block Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 17. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 17 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 18. Two-phase bid expose protocol • Participants encrypt bids with temporary keys • When block containing encrypted bids is mined, it is broadcasted to the network • As a reply, participants broadcast their temporary keys if their bid is in the block • Content of the block is then decrypted and allocation can be computed • Full valid block consists of two parts, preamble (encrypted bids), and computed allocation (match between requests and offers) 18 Create signed bid Participant Encrypt signed request with temporary key and send it Miner A Mine block containing encrypted bids Send block Make temporary key public Compute Allocation Send allocation suggestion Confirm or reject suggestion Rest of the miners Aggregate encrypted bids Full block ready, share computed allocation Aggregate encrypted bids Verify block Verify decryption and allocation Decrypt bids Submit container or VM to provider Verify block Phase I: bidding Phase II: allocation Decrypt bids
  • 19. Challenge #2: Matching Requests and Offers • The common problems of open crowdsourced environment: • heterogeneity of resources • diversity of demand • Edge imposes own requirements, e.g., latency, and location becomes important: • Someone may want just a Raspberry Pi but in specific location • DeCloud: • Let participants describe exactly what they want and give them the best possible match out of available resources • Since exact match is not always possible, let participants express importance of the resources by weights • Everything is a resource: location, reputation, etc. 19
  • 20. Finding the Best Match • Offers and requests are represented as normalized vectors • For example, assume client wants 4 CPU cores • Distance does not work well: • if there are two offers with 2 and 8 cores, then 2 is closest to 4 • Vector dot product does not address the flexibility well: • If there are offers with 3 and 8 cores, vector product will match the request with offer having 8 cores • For a flexible client 3 cores is likely to be a better match. 20
  • 22. Challenge #3: Truthful Auction • Dominant strategy incentive compatible (DSIC) auction • Dominant strategy – a strategy that provides best payoff no matter what other players do • Incentive compatibility – acting according to true preferences, in our context bidding privately known valuation • Most known example – Vickrey or second price auction • Sealed bids submitted to auctioneer for some single indivisible good • The highest bid wins • The winner pays what second highest bidder has offered for the good 22
  • 23. Some Auction Terms and Metrics • Payoff or utility – this is what rational participants want to maximize: • Difference between amount paid and privately known (true) valuation • Revenue: • What seller(s) receives, Vickrey auction clearly does not optimize for this • Welfare: • Giving the goods to those who value them most, i.e. maximizing the sum of valuations, Vickrey auction achieves best possible welfare 23
  • 24. • In double auction both sellers and buyers submit their bids, forming the market • Optimizing for revenue puts sellers in the privileged position • Thus, welfare is more suitable as a performance metric for DeCloud • In double auction, welfare is sum of valuations of allocated (winning) participants minus all costs of allocated sellers: Double Auction in DeCloud 24 Fraction of resources allocated to r Cost of offer o Valuation of request r For all requests and offers in block beta Allocation vector {0,1}
  • 25. DSIC Double Auction • McAfee has shown1), that for double auction with just one seller and buyer DSIC auction is not possible • McAfee has offered a double auction mechanism where DSIC property is achieved for more than one pair of participants • McAfee’s solution became known as trade reduction mechanism, because the valid seller-buyer pair that determines the trading price must be excluded. 251) R.P. McAfee, A dominant strategy double auction. Journal of economic Theory 56.2 (1992)
  • 26. McAfee’s Mechanism 100% of optimal welfare achieved Trade reduction performed 26
  • 27. DeCloud Double Action Challenges • Complex environment • In cloud auctions, bidders might misreport not only their valuations, but also hardware requirements or delay bid submission to get better payoff • Goods are not of single type • Moreover, in DeCloud there are no discrete types of goods • Buyers and sellers do not necessarily form pairs • One seller may serve multiple buyers • How to minimize negative effect of trade reduction? 27
  • 28. DeCloud Mechanism Design • We group offers and requests together into clusters using our gravity-like matching heuristics • In each cluster there are requests and offers which are the best match for each other • To minimize negative effect of trade reduction we group price-compatible clusters in mini-auctions • In mini-auction, only one cluster determines the price and potentially suffers from trade reduction 28
  • 29. Measuring the Performance • Google Cluster Data to emulate requests of clients • Amazon EC2 M5 instance types as providers • For costs and valuations we used randomized Amazon EC2 costs • Truthfulness (DSIC property) affects welfare negatively: • We exclude requests or offers in the case they define price • We use pseudo randomness in the case there are not enough requests to allocate all the valid (by price) offers (or visa versa). • How much we loose if we would just assume truthful bids and not take any measures to make truthful bidding the dominant strategy? 29
  • 30. Results: Welfare As size of the market grows, the fraction of reduced trades becomes marginal DeCloud approaches its non-DSIC benchmark given enough participants 30
  • 31. Results: Client Satisfaction Client satisfaction heatmap Client satisfaction with fixed flexibility 31Client satisfaction indicates the fraction of the accepted clients
  • 32. Summary and Potential • Our contribution: DeCloud, truthful double auction with no auctioneer • Tackling demand for edge resources with open crowdsourced (and not only) environment • Distributed auctions do not have to be limited to edge/cloud computing • There is a potential for removing the middleman and minimizing the costs also in the other areas, involving crowdsourcing or not 32