Abstract
Designing effective shill bidding detection and prevention mechanisms in a cloud auction house is one of the main challenges of the cloud market. In this paper, one mechanism for shill bidding detection and one for its prevention are focused on. Two objectives are considered in designing these mechanisms: (1) increase the accuracy of shill bidding detection mechanism, and (2) decrease fraud activities of shill bidders while increasing the profit of honest bidders. The accuracy of a shill bidding detection mechanism can be improved by combining results of run-time monitoring of bidding behavior in running an auction and results of bidding behavior obtained from past auctions. Thus, a new hybrid shill detection mechanism is proposed. Also, our idea in designing of shill bidding prevention mechanism is shaped based on the fact that shill bidders continue their fraudulent behaviors only when they are in trading spaces that are created by sellers who have colluded with them. To do this, a genetic algorithm (GA)-based approach is developed to create appropriate trading spaces for honest bidders aiming at minimizing suspicious activities as well as maximizing trading opportunities. Consequently, honest bidders are hosted by more profitable and healthier trading spaces in which the probability of meeting shill bidders and fraud sellers is decreased dramatically. The proposed ideas are supported by a multi-agent auction system. Simulation results prove the success of the designed auction system.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
The genetic algorithm is used to create appropriate sub-trading spaces in an auction room before the start of each monitoring stage. Since the auction room is divided into three monitoring stages, the genetic algorithm is applied three times.
Termination of the auction room is caused by: (1) selling all auctioned resources, or (2) expiration of auction time.
Abbreviations
- GA:
-
Genetic algorithm
- VM:
-
Virtual machine
- MAS:
-
Multi-agent system
- CDARA:
-
Combinatorial double auction resource allocation
- CMM:
-
Cloud market maker
- AHM:
-
Auction house manager
- ARM:
-
Auction room manager
- CF_DB:
-
Customers’ feedback database
- HC_DB:
-
History of customers’ trading activities database;
- ROTA_DB:
-
Results of online trading activities database;
- FA:
-
Fraudulent activity
- TO:
-
Trading opportunity
- CIP:
-
Customer initial price
- QoS:
-
Quality of service
- WR:
-
Winning ratio
- ETBFB:
-
Elapsed time before first bid
- RTALB:
-
Remaining time after last bid
- BF:
-
Bid frequency
- ABI::
-
Average bid increment
- EFAHW:
-
Effectiveness of fraud activities on honest winners
- UA:
-
Utility-driven approach
- LSS:
-
Live shill score
- FDUA:
-
Fraud detection and utility-driven approach
- PSHP:
-
Percentage of shill participants
- CPR:
-
Customer to provider ratio
- NMP:
-
Number of market participants
References
Adabi S, Mosadeghi M, Yazdani S (2018) A real-world inspired multi-strategy based negotiating system for cloud service market. J Cloud Comput 7(1):17. https://doi.org/10.1186/s13677-018-0116-5
Adabi S, Alayin F, Sharifi A (2019a) A new flexible pricing mechanism considering price-quality relation for cloud resource allocation. Evol Syst. https://doi.org/10.1007/s12530-019-09315-3
Adabi S, Hossein-Haje Z, Adabi S (2019b) A new cost-effective mechanism for VM-to-user mapping in cloud data centers. Clust Comput. https://doi.org/10.1007/s10586-019-03017-w
Aldossary M, Djemame K, Alzamil I, Kostopoulos A, Dimakis A, Agiatzidou E (2019) Energy-aware cost prediction and pricing of virtual machines in cloud computing environments. Futur Gener Comput Syst 93:442–459
Alzahrani A, Sadaoui S (2020) Clustering and labeling auction fraud data. Data management, analytics and innovation. Springer, Berlin, pp 269–283
Anowar F, Sadaoui S (2020) Detection of auction fraud in commercial sites. JTAER. https://doi.org/10.4067/s0718-18762020000100107
Calheiros RN, Ranjan R, Beloglazov A, De Rose CA, Buyya R (2011) Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software 41(1):23–50. https://doi.org/10.1002/spe.995
Chichin S, Vo QB, Kowalczyk R (2015) Towards efficient greedy allocation schemes for double-sided cloud markets. IEEE Int Conf Serv Comput. https://doi.org/10.1109/SCC.2015.35
Dadfarnia M, Adibnia F, Abadi M, Dorri A (2020) Incremental collusive fraud detection in large-scale online auction networks. J Supercomput. https://doi.org/10.1007/s11227-020-03170-9
Dasgupta K, Mandal B, Dutta P, Mandal JK, Dam S (2013) A genetic algorithm (ga) based load balancing strategy for cloud computing. Proced Technol 10:340–347. https://doi.org/10.1016/j.protcy.2013.12.369
Fisher N, Trevathan J, Gray H (2019) Detecting shill bidding using ebay’s 30-day bid summary. Int J Cyber-Secur Digit Forensics 8(2):120–134
Ford BJ, Xu H, Valova I (2012) A real-time self-adaptive classifier for identifying suspicious bidders in online auctions. Comput J 56(5):646–663. https://doi.org/10.1093/comjnl/bxs025
Ganguly S, Sadaoui S (2018) Online detection of shill bidding fraud based on machine learning techniques. Springer, Berlin, pp 303–314
Gawali MB, Shinde SK (2018) Task scheduling and resource allocation in cloud computing using a heuristic approach. J Cloud Comput 7(1):4
Javed B, Bloodsworth P, Rasool RU, Munir K, Rana O (2016) Cloud market maker: an automated dynamic pricing marketplace for cloud users. Futur Gener Comput Syst 54:52–67. https://doi.org/10.1016/j.future.2015.06.004
Kaur D, Garg D (2015) Variable bid fee: an online auction shill bidding prevention methodology. IEEE Int Adv Comput Conf (IACC). https://doi.org/10.1109/IADCC.2015.7154735
Kumar D, Baranwal G, Raza Z, Vidyarthi DP (2017) A systematic study of double auction mechanisms in cloud computing. J Syst Softw 125:234–255. https://doi.org/10.1016/j.jss.2016.12.009
Lei B, Zhang H, Chen H, Liu L, Wang D (2012) A k-means clustering based algorithm for shill bidding recognition in online auction. Chin Control Decis Conf (CCDC). https://doi.org/10.1109/CCDC.2012.6244147
Majadi N, Trevathan J, Bergmann N (2016) Analysis on bidding behaviours for detecting shill bidders in online auctions. IEEE Int Conf Comput Inf Technol (CIT). https://doi.org/10.1109/CIT.2016.48
Majadi N, Trevathan J, Gray H (2018) A run-time algorithm for detecting shill bidding in online auctions. J Theor Appl Electron Commer Res 13(3):17–49. https://doi.org/10.4067/S0718-18762018000300103
Majadi N, Trevathan J, Bergmann N (2019) Collusive shill bidding detection in online auctions using markov random field. Electron Commer Res Appl 34:100831. https://doi.org/10.1016/j.elerap.2019.100831
Mamun K (2015) Combating shill bidding in real time: prevention, detection and response. Comput Inf Sci 8(2):24. https://doi.org/10.5539/cis.v8n2p24
Michalewicz Z, Janikow CZ (1991) Genetic algorithms for numerical optimization. Stat Comput 1(2):75–91. https://doi.org/10.1007/BF01889983
Nikravesh AY, Ajila SA, Lung C-H (2018) Using genetic algorithms to find optimal solution in a search space for a cloud predictive cost-driven decision maker. J Cloud Comput 7(1):1–21. https://doi.org/10.1186/s13677-018-0122-7
Patel R, Xu H, Goel A (2007) Real-time trust management in agent based online auction systems. SEKE. Citeseer, London, pp 244–250
Pourakbar M, Farahani RZ, Asgari N (2007) A joint economic lot-size model for an integrated supply network using genetic algorithm. Appl Math Comput 189(1):583–596. https://doi.org/10.1016/j.amc.2006.11.116
Rad Jahanbani P, Adabi S, Rezaee A (2021) A new multi-agent group-buying auction for automated vm-to-customer mapping. J Organ Comput Electron Commer 31(1):35–58. https://doi.org/10.1080/10919392.2020.1838847
Rarità L, Stamova I, Tomasiello S (2021) Numerical schemes and genetic algorithms for the optimal control of a continuous model of supply chains. Appl Math Comput 388:125464. https://doi.org/10.1016/j.amc.2020.125464
Rylander BI (2001) Computational complexity and the genetic algorithm. University of Idaho, Moscow
Sadaoui S, Wang X (2017) A dynamic stage-based fraud monitoring framework of multiple live auctions. Appl Intell 46(1):197–213. https://doi.org/10.1007/s10489-016-0818-7
Sadaoui S, Wang X, Qi D (2015) A real-time monitoring framework for online auctions frauds. International conference on industrial. Engineering and other applications of applied intelligent systems. Springer, Berlin, pp 97–108. https://doi.org/10.1007/978-3-319-19066-2_10
Salehan A, Deldari H, Abrishami S (2017) An online valuation-based sealed winner-bid auction game for resource allocation and pricing in clouds. J Supercomput 73(11):4868–4905. https://doi.org/10.1007/s11227-017-2059-x
Samimi P, Teimouri Y, Mukhtar M (2016) A combinatorial double auction resource allocation model in cloud computing. Inf Sci 357:201–216. https://doi.org/10.1016/j.ins.2014.02.008
Tafsiri SA, Yousefi S (2018) Combinatorial double auction-based resource allocation mechanism in cloud computing market. J Syst Softw 137:322–334. https://doi.org/10.1016/j.jss.2017.11.044
Trevathan J, Read W (2007) Investigating shill bidding behaviour involving colluding bidders. J Comput 2:63–75
Tsang S, Koh YS, Dobbie G, Alam S (2014) Detecting online auction shilling frauds using supervised learning. Expert Syst Appl 41(6):3027–3040. https://doi.org/10.1016/j.eswa.2013.10.033
Xia Y, Hong H, Lin G, Sun Z (2017) A secure and efficient cloud resource allocation scheme with trust evaluation mechanism based on combinatorial double auction. KSII Trans Internet Inf Syst. https://doi.org/10.3837/tiis.2017.09.002
Zheng J, Bhuiyan MZA, Liang S, Xing X, Wang G (2014) Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Futur Gener Comput Syst 39:88–99. https://doi.org/10.1016/j.future.2013.12.014
Zhou B, Srirama SN, Buyya R (2019) An auction-based incentive mechanism for heterogeneous mobile clouds. J Syst Softw 152:151–164. https://doi.org/10.1016/j.jss.2019.03.003
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A
Rights and permissions
About this article
Cite this article
Adabi, S., Farhadinasab, H. & Jahanbani, P.R. A genetic algorithm-based approach to create a safe and profitable marketplace for cloud customers. J Ambient Intell Human Comput 13, 2381–2413 (2022). https://doi.org/10.1007/s12652-021-03682-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03682-z