Skip to main content

Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11342))

  • 1450 Accesses

Abstract

Non-obedient nodes exist in some prevailing computing environments. They tend to pursue individual interests, provide resources strategically, and misreport private information. Strategy-proofness and group strategy-proofness mechanisms in social choice are stimulate nodes to report their true private information so as to enable cooperation and participation. But they are rarely applied in computer science. Our work has introduced concepts from social choice into computer science to solve the incentive issue of node’s truth report about its private information, and get some meaningful results. First, we establish an environment of non-obedient resources, design a utility function without payment by considering nodes’ internal resource costs and feelings, and define node preference scheme which is single-peaked. Second, we design a mechanism for provisioning non-obedient resources based on the median voter scheme with (n − 1) phantom voters. This mechanism is strategy-proof and group strategy-proof when a node reports reduced value of its private information, while when it reports increased value, strategy-proofness and group strategy-proofness cannot be guaranteed but more resources are provided. Finally, experiments show the strategy-proofness and group strategy-proofness characteristics of this mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mihailescu, M., Teo, Y.M.: Strategy-proof dynamic resource pricing of multiple resource types on federated clouds. In: Hsu, C.-H., Yang, Laurence T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010. LNCS, vol. 6081, pp. 337–350. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13119-6_30

    Chapter  Google Scholar 

  2. Liu, X., Li, W., Zhang, X.: Strategy-proof mechanism for provisioning and allocation virtual machines in heterogeneous clouds. IEEE Trans. Parallel Distrib. Syst. 29(7), 1650–1663 (2017)

    Article  Google Scholar 

  3. Nejad, M.M., Mashayekhy, L., Grosu, D.: Truthful greedy mechanisms for dynamic virtual machine provisioning and allocation in clouds. IEEE Trans. Parallel Distrib. Syst. 26(2), 594–603 (2015)

    Article  Google Scholar 

  4. Shi, W., Zhang, L., Wu, C., Li, Z., Lau, F.C.M.: An online auction framework for dynamic resource provisioning in cloud computing. IEEE/ACM Trans. Netw. 24(4), 2060–2073 (2016)

    Article  Google Scholar 

  5. Hajiesmaili, M.H., Deng, L., Chen, M., Li, Z.: Incentivizing device-to-device load balancing for cellular networks: an online auction design. IEEE J. Sel. Areas Commun. 35(2), 265–279 (2017)

    Article  Google Scholar 

  6. Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost efficient routing protocol for mobile ad-hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM (2003)

    Google Scholar 

  7. Gopinathan, A., Li, Z.P., Li, B.C.: Group strategyproof multicast in wireless networks. IEEE Trans. Parallel Distrib. Syst. 22(5), 708–715 (2011)

    Article  Google Scholar 

  8. Wei, Q., Zhou, W., Ren, X.J.: A strategy-proof trust based decision mechanism for pervasive computing environments. Comput. Sci. 35(5), 871–882 (2012)

    Google Scholar 

  9. Wang, T., Song, L., Han, Z., Saad, W.: Distributed cooperative sensing in cognitive radio networks: an overlapping coalition formation approach. IEEE Trans. Commun. 62(9), 3144–3160 (2014)

    Article  Google Scholar 

  10. Liu, J., Wang, Q.: A false data detecting scheme based on coalition game for vehicular ad-hoc network. J. Xi’an Jiaotong Univ. 49(2), 69–73 (2015)

    Google Scholar 

  11. Nisan, N., Ronen, A.: Algorithmic mechanism design. Games Econ. Behav. 35(1), 166–196 (2001)

    Article  Google Scholar 

  12. Xiao, Y., Han, Z., Chen, K.-C.: Bayesian hierarchical mechanism design for cognitive radio networks. IEEE J. Sel. Areas Commun. 33(5), 986–1001 (2015)

    Article  Google Scholar 

  13. Nejad, M. M., Mashayekhy, L., Grosu, D.: A family of truthful greedy mechanisms for dynamic virtual machine provisioning and allocation in clouds. In: Proceedings of the 6th IEEE International Conference on Cloud Computing, pp. 188–195. IEEE Computer Society, Santa Clara (2013)

    Google Scholar 

  14. Moulin, H., Shenker, S.: Strategyproof sharing of submodular costs: budget balance versus efficiency. Econ. Theor. 18(3), 511–533 (2001)

    Article  MathSciNet  Google Scholar 

  15. Pal, M., Tardos, E.: Group strategyproof mechanisms via primal-dual algorithms. In: Proceedings 44th Annual IEEE Symposium on Foundations of Computer Science, pp. 584–593. IEEE, Cambridge (2003)

    Google Scholar 

  16. Li, Z.P., Chu, X.W.: On achieving group-strategyproof multicast. IEEE Trans. Parallel Distrib. Syst. 23(5), 913–923 (2012)

    Article  Google Scholar 

  17. Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  18. Moulin, H.: On strategy-proofness and single peakedness. Public Choice 35(4), 437–455 (1980)

    Article  Google Scholar 

  19. Gershkov, A., Moldovanu, B., Shi, X.W.: Optimal mechanism design without money. Technical Report, University of Toronto, 4 (2013)

    Google Scholar 

  20. Arribillagay, R.P., Massz, J.: Comparing generalized median voter schemes according to their manipulability. Technical Report, Universitat Autnoma de Barcelona and Barcelona GSE, 2 (2014)

    Google Scholar 

  21. Cheng, Y.K., Yu, W., Zhang, G.C.: Strategy-proof approximation mechanisms for an obnoxious facility game on networks. Theor. Comput. Sci. 497, 154–163 (2013)

    Article  MathSciNet  Google Scholar 

  22. Barber, S., Berga, D., Moreno, B.: Individual versus group strategyproofness when do they coincide. J. Econ. Theory 145(5), 1648–1674 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the national natural science foundation of China (No. 41363003, No. 61502407), Study Abroad for Young Scholar Program sponsored by Guangdong University of Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Song, W., Li, M., You, S. (2018). Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics