Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2018

10.04.2017

A resource allocation model based on double-sided combinational auctions for transparent computing

verfasst von: Jiaze Wang, Anfeng Liu, Tong Yan, Zhiwen Zeng

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Transparent Computing (TC) is becoming a promising paradigm in network computing era. Although many researchers believe that TC model has a high requirement for the communication bandwidth, there is no research on the communication bandwidth boundary or resource allocation, which impedes the development of TC. This paper focuses on studying an efficient transparent computing resource allocation model in an economic view. First, under the quality of experiments (QoE) ensured, the utility function of clients and transparent computing providers (TCPs) is constructed. After that, the demand boundary of communication bandwidth is analyzed under the ideal transparent computing model. Based on the above analyses, a resource allocation scheme based on double-sided combinational auctions (DCA) is proposed so that the resource can be shared by both the service side and the client side with the welfare of the whole society being maximized. Afterward, the results scheduled in different experimental scenarios are given, which verifies the effectiveness of the proposed strategy. Overall, this work provides an effective resource allocation model for optimizing the performance of TC.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kim SH, Kang DK, Kim WJ, Chen M., & Youn CH (2016) A science gateway cloud with cost adaptive VM management scheme for computational scientific applications. IEEE Syst J doi:10.1109/JSYST.2015.2501750 Kim SH, Kang DK, Kim WJ, Chen M., & Youn CH (2016) A science gateway cloud with cost adaptive VM management scheme for computational scientific applications. IEEE Syst J doi:10.​1109/​JSYST.​2015.​2501750
2.
Zurück zum Zitat Liu J, Zhou Y, Zhang D (2016) TranSim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183MathSciNetCrossRefMATH Liu J, Zhou Y, Zhang D (2016) TranSim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183MathSciNetCrossRefMATH
3.
Zurück zum Zitat Guo K, Xiao Y, Duan G (2016) A cost-efficient architecture for the campus information system based on transparent computing platform. Int J Ad Hoc Ubiquit Comput 21(2):95–103CrossRef Guo K, Xiao Y, Duan G (2016) A cost-efficient architecture for the campus information system based on transparent computing platform. Int J Ad Hoc Ubiquit Comput 21(2):95–103CrossRef
5.
Zurück zum Zitat Zhang Y, Zhou Y (2013) Transparent computing: spatio-temporal extension on von neumann architecture for cloud services. Tsinghua Sci Technol 18(1):10–21CrossRef Zhang Y, Zhou Y (2013) Transparent computing: spatio-temporal extension on von neumann architecture for cloud services. Tsinghua Sci Technol 18(1):10–21CrossRef
6.
Zurück zum Zitat Xue C, Lin C (2016) Performance modelling for transparent computing using stochastic petri nets. Int J Ad Hoc Ubiquit Comput 21(2):81–94CrossRef Xue C, Lin C (2016) Performance modelling for transparent computing using stochastic petri nets. Int J Ad Hoc Ubiquit Comput 21(2):81–94CrossRef
7.
Zurück zum Zitat Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secure Comput 13(3):312–325CrossRef Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secure Comput 13(3):312–325CrossRef
8.
Zurück zum Zitat Su Z, Xu Q, Fei M, Dong M (2016) Game theoretic resource allocation in media cloud with mobile social users. IEEE Trans Multimed 18(8):1650–1660CrossRef Su Z, Xu Q, Fei M, Dong M (2016) Game theoretic resource allocation in media cloud with mobile social users. IEEE Trans Multimed 18(8):1650–1660CrossRef
9.
Zurück zum Zitat Liu A, Jin X, Cui G, Chen Z (2013) Deployment guidelines for achieving maximal Lifetime and avoiding energy holes in sensor network. Inf Sci 230:197–226CrossRef Liu A, Jin X, Cui G, Chen Z (2013) Deployment guidelines for achieving maximal Lifetime and avoiding energy holes in sensor network. Inf Sci 230:197–226CrossRef
10.
Zurück zum Zitat Su Z, Xu Q, Qi Q (2016) Big data in mobile social networks: a QoE-oriented framework. IEEE Netw 30(1):52–57CrossRef Su Z, Xu Q, Qi Q (2016) Big data in mobile social networks: a QoE-oriented framework. IEEE Netw 30(1):52–57CrossRef
11.
Zurück zum Zitat Zeng J, Yang LT, Ma J (2016) A system-level modeling and design for cyber-physical-social systems. ACM Trans Embed Comput Syst (TECS) 15(2):35 Zeng J, Yang LT, Ma J (2016) A system-level modeling and design for cyber-physical-social systems. ACM Trans Embed Comput Syst (TECS) 15(2):35
12.
Zurück zum Zitat Zhang Y, He S, Chen J et al (2013) Distributed sampling rate control for rechargeable sensor nodes with limited battery capacity. IEEE Trans Wirel Commun 12(6):3096–3106CrossRef Zhang Y, He S, Chen J et al (2013) Distributed sampling rate control for rechargeable sensor nodes with limited battery capacity. IEEE Trans Wirel Commun 12(6):3096–3106CrossRef
13.
Zurück zum Zitat Ren J, Zhang Y, Zhang K, Liu A, Chen J, Shen XS (2016) Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans Ind Inform 12(2):788–800CrossRef Ren J, Zhang Y, Zhang K, Liu A, Chen J, Shen XS (2016) Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans Ind Inform 12(2):788–800CrossRef
14.
Zurück zum Zitat Chen Z, Liu A, Li Z, Choi YJ, Li J (2017) Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Netw Appl 10(3):559–578CrossRef Chen Z, Liu A, Li Z, Choi YJ, Li J (2017) Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Netw Appl 10(3):559–578CrossRef
15.
Zurück zum Zitat Deng X, He L, Li X, Liu Q, Cai L, Chen Z (2016) A reliable QoS aware routing scheme for neighbor area nework in smart grid. Peer-to-Peer Netw Appl 9(4):616–627CrossRef Deng X, He L, Li X, Liu Q, Cai L, Chen Z (2016) A reliable QoS aware routing scheme for neighbor area nework in smart grid. Peer-to-Peer Netw Appl 9(4):616–627CrossRef
16.
Zurück zum Zitat Mianxiong D, Kimata T, Sugiura K et al (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606–2612 Mianxiong D, Kimata T, Sugiura K et al (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606–2612
17.
Zurück zum Zitat Platania M, Obenshain D, Tantillo T, Amir Y, Suri N (2016) On choosing server-or client-side solutions for BFT. ACM Comput Surv (CSUR) 48(4):61CrossRef Platania M, Obenshain D, Tantillo T, Amir Y, Suri N (2016) On choosing server-or client-side solutions for BFT. ACM Comput Surv (CSUR) 48(4):61CrossRef
18.
Zurück zum Zitat Li H, Liu D, Dai Y, Luan TH (2015) Engineering searchable encryption of mobile cloud networks: when qoe meets qop. IEEE Wirel Commun 22(4):74–80CrossRef Li H, Liu D, Dai Y, Luan TH (2015) Engineering searchable encryption of mobile cloud networks: when qoe meets qop. IEEE Wirel Commun 22(4):74–80CrossRef
19.
Zurück zum Zitat Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT[C] //. IEEE 29th Int Conf Adv Inf Netw Appl:687–694 Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT[C] //. IEEE 29th Int Conf Adv Inf Netw Appl:687–694
20.
Zurück zum Zitat Yaoxue Zhang, Ju Ren, Jiagang Liu, et al (2017) A Survey on Emerging Computing Paradigms for Big Data. Chinese Journal of Electronics 26(1):1–12 Yaoxue Zhang, Ju Ren, Jiagang Liu, et al (2017) A Survey on Emerging Computing Paradigms for Big Data. Chinese Journal of Electronics 26(1):1–12
21.
Zurück zum Zitat Ren J, Zhang Y, Zhang K, et al (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions[J]. IEEE Communications Magazine 53(3):98–105. Ren J, Zhang Y, Zhang K, et al (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions[J]. IEEE Communications Magazine 53(3):98–105.
22.
Zurück zum Zitat Choi CR, Jeong HY, Park JH, Jang HJ, Jeong YS (2016) Relative weight comparison between virtual key factors of cloud computing with analytic network process. J Supercomput 72(5):1694–1714CrossRef Choi CR, Jeong HY, Park JH, Jang HJ, Jeong YS (2016) Relative weight comparison between virtual key factors of cloud computing with analytic network process. J Supercomput 72(5):1694–1714CrossRef
25.
Zurück zum Zitat Hoang DT, Niyato D, Wang P (2012) Optimal admission control policy for mobile cloud computing hotspot with cloudlet ∥WCNC 2012. IEEE Press, Atlanta, pp 3145–3149 Hoang DT, Niyato D, Wang P (2012) Optimal admission control policy for mobile cloud computing hotspot with cloudlet ∥WCNC 2012. IEEE Press, Atlanta, pp 3145–3149
26.
Zurück zum Zitat Liu X, Dong M, Ota K, Hung P, Liu A (2016) Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans Serv Comput 9(2):186–198CrossRef Liu X, Dong M, Ota K, Hung P, Liu A (2016) Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans Serv Comput 9(2):186–198CrossRef
27.
Zurück zum Zitat He S, Chen J, Li X, Shen XS, Sun Y (2014) Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans Mob Comput 13(6):1268–1282CrossRef He S, Chen J, Li X, Shen XS, Sun Y (2014) Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans Mob Comput 13(6):1268–1282CrossRef
28.
Zurück zum Zitat He S, Chen J, Jiang F, Yau DK, Xing G, Sun Y (2013) Energy provisioning in wireless rechargeable sensor networks. IEEE Trans Mob Comput 12(10):1931–1942CrossRef He S, Chen J, Jiang F, Yau DK, Xing G, Sun Y (2013) Energy provisioning in wireless rechargeable sensor networks. IEEE Trans Mob Comput 12(10):1931–1942CrossRef
29.
Zurück zum Zitat Gui J, & Zhou K (2016) Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. Journal of Network and Systems Management 1-24 Gui J, & Zhou K (2016) Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. Journal of Network and Systems Management 1-24
30.
Zurück zum Zitat Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensic Secur 11:2013–2027CrossRef Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensic Secur 11:2013–2027CrossRef
31.
Zurück zum Zitat Xu Q, Su Z, Guo S (2016) A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans Veh Technol 65(8):6692–6702CrossRef Xu Q, Su Z, Guo S (2016) A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans Veh Technol 65(8):6692–6702CrossRef
32.
Zurück zum Zitat Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053–2064CrossRef Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053–2064CrossRef
34.
Zurück zum Zitat Chen M, Ma Y, Song J, Lai C, Hu B (2016) Smart clothing: connecting human with clouds and big data for sustainable health monitoring. ACM/Springer Mob Netw Appl 21(5):825–845CrossRef Chen M, Ma Y, Song J, Lai C, Hu B (2016) Smart clothing: connecting human with clouds and big data for sustainable health monitoring. ACM/Springer Mob Netw Appl 21(5):825–845CrossRef
35.
Zurück zum Zitat Deng X, Li G, Dong M, Ota K (2017) Finding overlapping communities based on Markov chain and link clustering. Peer-to-Peer Netw Appl 10(2):411–420CrossRef Deng X, Li G, Dong M, Ota K (2017) Finding overlapping communities based on Markov chain and link clustering. Peer-to-Peer Netw Appl 10(2):411–420CrossRef
36.
Zurück zum Zitat Stojmenovic I, Wen S, Huang X, Luan H (2015) An overview of fog computing and its security issues. Concurr Comput: Pract Experience 28(10):2991–3005CrossRef Stojmenovic I, Wen S, Huang X, Luan H (2015) An overview of fog computing and its security issues. Concurr Comput: Pract Experience 28(10):2991–3005CrossRef
37.
Zurück zum Zitat Al Faruque MA, Vatanparvar K (2016) Energy management-as-a-service over fog computing platform. IEEE Internet Things J 3(2):161–169CrossRef Al Faruque MA, Vatanparvar K (2016) Energy management-as-a-service over fog computing platform. IEEE Internet Things J 3(2):161–169CrossRef
38.
Zurück zum Zitat Samimi P, Teimouri Y, Mukhtar M (2016) A combinatorial double auction resource allocation model in cloud computing. Inf Sci 357:201–216CrossRef Samimi P, Teimouri Y, Mukhtar M (2016) A combinatorial double auction resource allocation model in cloud computing. Inf Sci 357:201–216CrossRef
39.
Zurück zum Zitat Baranwal G, Vidyarthi DP (2015) A fair multi-attribute combinatorial double auction model for resource allocation in cloud computing. J Syst Softw 108:60–76CrossRef Baranwal G, Vidyarthi DP (2015) A fair multi-attribute combinatorial double auction model for resource allocation in cloud computing. J Syst Softw 108:60–76CrossRef
40.
Zurück zum Zitat Dong M, Liu X, Qian Z et al (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50–57CrossRef Dong M, Liu X, Qian Z et al (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50–57CrossRef
41.
Zurück zum Zitat Samaan N (2014) A novel economic sharing model in a federation of selfish cloud providers. IEEE Trans Parallel Distrib Syst 25(1):12–21CrossRef Samaan N (2014) A novel economic sharing model in a federation of selfish cloud providers. IEEE Trans Parallel Distrib Syst 25(1):12–21CrossRef
Metadaten
Titel
A resource allocation model based on double-sided combinational auctions for transparent computing
verfasst von
Jiaze Wang
Anfeng Liu
Tong Yan
Zhiwen Zeng
Publikationsdatum
10.04.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0556-6

Weitere Artikel der Ausgabe 4/2018

Peer-to-Peer Networking and Applications 4/2018 Zur Ausgabe

Premium Partner