Professional Documents
Culture Documents
Med Iot Ref5
Med Iot Ref5
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
Abstract—Optimal computing resource allocation for edge- [10], [11]) and applications (e.g., energy trading, data trading,
cloud-assisted internet of things (IoT) in blockchain network is smart homes and so on [12], [13], [14]). However, blockchain-
attracting increasing attention. Auction is a classical algorithm based IoT faces inherent physical constraints as IoT devices
which guarantees that the computing resources are allocated to
the buyers of the computing resource. However, the traditional have only limited computation and storage resources on board,
auction algorithm only guarantees the revenue gains for the which restricts the opportunities for more sophisticated appli-
sellers of the computing resource. How to guarantee the seller cations, e.g., pure Peer-to-Peer (P2P) trading.
and the buyer of the computing resource are both willing to trade To enhance the computational resources and scalability of
and moreover bid truthfully is still open problem in computing blockchain-based IoT, edge-cloud computing has been intro-
resource trading for edge-cloud-assisted IoT. In this paper, we
introduce a broker with the sparse information to manage and duced for blockchain-based IoT to solve different types of
adjust the trading market. We then propose an iterative double- tasks (e.g. real-time processing, resource-intensive application-
sided auction scheme for computing resource trading, where the s, blockchain mining and consensus process), where the edge
broker solves an allocation problem to determine how much provides limited computational and storage resources with
computing resource is traded and designs a specific price rule low latency, and the cloud can provide power computing and
to induce the buyers and sellers of the computing resource to
submit bids in a truthful way. Thus, the hidden information storage resources but with high latency [15], [16].
can be extracted gradually to obtain optimal computing resource In edge-cloud-assisted IoT in blockchain network, the com-
allocation and trading prices. Hence, the proposed algorithm can puting resource trading problems are studied based on the
achieve the maximum social welfare meanwhile protecting the traditional auction algorithms [14], [17], where the revenue
privacies of the buyers and the sellers. Our theoretical analysis gains for the seller can only be guaranteed. If the benefits for
and simulations demonstrate that the proposed algorithm is
efficient, i.e. achieving the maximum social welfare. In addition, the buyers cannot be guaranteed, the buyers are not willing to
the proposed algorithm can provide effective trading strategies trade and thus the bids are not truthful, so that the desirable
for the buyers and sellers of the computing resource, leading economic benefits are hard to achieve [18]. Clearly, the buyers
to the proposed algorithm satisfying incentive compatibility, and the sellers are conflicting with each other. It is difficult to
individual rationality, and budget balance. reach an agreement if they decide how much computing re-
Index Terms—Internet of Things, edge-cloud computing, com- source to trade, independently. Therefore, a market controller,
puting resource trading, double auction i.e. a broker, is required to manage the computational resource
trading market for IoT nodes via a smart contract. However,
I. I NTRODUCTION how to efficiently trading the computing resource to guarantee
Internet of Things (IoT) [1], [2] is an interconnection among that the seller and the buyer are both willing to trade and
the objects and equipped with ubiquitous intelligence. The moreover bid truthfully is still open problem.
traditional IoT control system is based on centralized and trust- In this paper, we address the computing resource trading
dependent structure which limits the interoperability and the problem for edge-cloud-assisted IoT in blockchain network.
security of the system. Very recently, Blockchain, a decentral- We build a pure P2P computing resource trading system for
ized public ledger to record transactions, has been developed edge-cloud-assisted IoT in blockchain network to ensure the
[3], [4]. The blockchain-based IoT, which allows IoT to build computing resource balance among IoT devices and, moreover,
up decentralized trust and reliance among multiple parties, to avoid problems such as privacy leakage and single-point
is attracting increasing attentions [5], [6], [7]. The related failure. The main challenges of the computing resource trading
research of blockchain-based IoT works on both architectures problem for edge-cloud-assisted IoT are as follows: 1) How
(e.g., IoT data storage and protection, privacy-preserving ac- can ensure incentive and truthful computing resource trading
cess control in IoT and consensus protocol for IoT [8], [9], to achieve the desirable economic benefits meanwhile protect-
ing the private information (including the current computing
Affiliation of author(s): This work was supported in part by the National
Natural Science Foundation of China under grants 61803096, 61722304, resource state, the capacity, the welfare, etc.) of the computing
61333013, the Pearl River S&T Nova Program of Guangzhou under resource sellers and buyers during the trading. 2) How much
grant 201610010196, the Guangdong Natural Science Funds for Distin- computing resources should each computing resource seller
guished Young Scholar under grant 2014A030306037, the Science and
Technology Plan Project of Guangdong 2014B090907010, 2015B010131014, supply to each computing resource buyer and how much would
2017B010125002, 2015B010106010. (Corresponding author: Zuyuan Yang) be the reward? And, from the perspective of the computing
Zhenni Li, Zuyuan Yang, and Shengli Xie are with School of Au- resource buyer: how much computing resource should each
tomation, the Guangdong Key Laboratory of IoT Information Technology,
Guangdong University of Technology, Guangzhou, 510006, China. E-mail: computing resource buyer request from each computing re-
lizhenni2012@gmail.com; yangzuyuan@aliyun.com and shlxie@gdut.edu.cn. source seller and how much should they pay?
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
To address these challenges, we first design a computing consortium blockchain technology. Compared with the above
resource trading market where a set of computing resource studies, this paper addresses the computing resource trading
buyers compete to trade with a set of computing resource problem for edge-cloud-assisted IoT in blockchain network
sellers, and a broker manages the marketplace without the and study the optimal computing resource trading based on the
actual needs of buyers and sellers. Second, we propose to double auction scheme for encouraging incentive and truthful
employ an iterative double-sided auction scheme [19] to the computing resource trading.
computing resource trading for edge-cloud-assisted IoT in
blockchain network. The broker collects the buyers’ requests
and the sellers’ supplies and then decides how much com- III. S YSTEM M ODEL FOR P2P C OMPUTING R ESOURCE
puting resource of the seller will be provided to each buyer T RADING IN B LOCKCHAIN AND P ROPOSED A LGORITHM
by solving the allocation problem. In addition, the broker
In this section, we first build blockchain network for edge-
designs a specific price rule to induce the buyers and sellers to
cloud-assisted IoT. Then, we build the system model of the
submit bids in a truthful way, so that the hidden information
computing resource trading and propose to use the iterative
is gradually extracted, and at the same time, the maximum
double-sided auction scheme for computing resource trading.
social welfare can be achieved.
To our knowledge, this is the first study to tackle the
computing resource trading problem for edge-cloud-assisted A. Blockchain Network for Edge-cloud-assisted IoT
IoT in blockchain network based on an iterative double-
sided auction scheme. Our contribution can be summarized In an edge-cloud-assisted IoT system, the computing re-
as follows. 1) We establish a pure P2P computing resource source trading happens in IoT nodes including the edge-cloud
trading system in blockchain network to achieve secure and computing service providers (ECSPs) and IoT devices. Here
trusted computing resource trading. 2) We introduce the broker ECSPs mainly play the role of selling computating resources
to manage the trading market and then propose an iterative to IoT devices and its neighboring edge server nodes. IoT
double-sided auction-based algorithm for the computing re- devices play different roles including computing resource sell-
source trading. The proposed algorithm, with protecting the ers, computing resource buyers and idle nodes. The computing
private information of computing-resource trading participants, resource sellers own surplus computing resources to sell and
satisfies the desirable economic properties including efficiency obtain resource coins. The computing resource buyers have a
(i.e., maximizing the social welfare), incentive compatibility computing resource demand and need to pay resource coins
(i.e., sellers and buyers truthfully reveal their needs according (the digital cryptocurrency is used as resource coins) to sellers.
to their private information), individual rationality (i.e., sellers Idle IoT nodes neither buy computing resources from other IoT
and buyers are willing to trade), and budget balance (i.e., devices, nor sell computing resources to others.
the broker does not lose money). 3) Numerical simulations We employ the blockchain technology to guarantee secure
are conducted to evaluate the performance of the proposed P2P computing resource trading. Blockchain is composed of
algorithm for the computing resource trading problem. a set of blocks. Every block has two parts, namely transac-
The remainder of this paper is structured as follows. The tional data and a unique hash value. The transactional data—
related work is summarized in Section II. Our system model including pseudonyms of ECSPs and IoT devices used to
for the computing resource trading and the proposed algorithm protect privacy, data type, raw data, and the timestamp of
based on an iterative double-sided auction scheme are intro- transaction validation—are encrypted and signed with digital
duced in Section III. The performance evaluation is presented signatures for security. Then, the transactional data are packed
in Section IV, and our conclusions are summarized in Section into blocks. The hash value is used as a link pointing from the
V. current block to the previous block. Thus, a series of blocks
connected in a linear chronological order form blockchain.
The security of blockchain directly relies on the consensus
II. R ELATED W ORK
mechanism which is carried out by the authorized ECSPs and
The related research of blockchain-based IoT works will IoT devices with the valid proof-of-work. The fastest ECSP
be summarized in this section. Xiong et al. [17] introduced or IoT device becomes the leader that announces its proof-
the edge computing for IoT blockchain for offloading mining of-work, block data, and the timestamp to other ECSPs and
tasks. Liu et al. [20] presented a mobile edge-computing- IoT devices as auditors for audit and verification. The auditors
enabled wireless framework with the blockchain technology, then audit the block data and announce the audit results with
where computation-intensive tasks could be offloaded to edge- signatures. When receiving the audit results, every auditor
computing nodes. Xu et al. [21] addressed a blockchain- compares the result with those of others, and then sends
enabled decentralized resource management method which feedback information to the leader. The leader collects and
could reduce the cost of the energy consumption by re- analyzes the feedback information. If all the auditors reach
questing migration and scheduling among data centers. The a consensus, the block is verified. The leader then sends the
study [22] investigated the multilayer computation offload- block data with the signature to the ECSPs and IoT devices
ing framework which integrates a distributed incentive and and will receive resource coins. The consensus mechanism
reputation mechanism. Kang et al. [23] studied the mobile can guarantee the dependability and security of blockchain
edge computing integrated with vehicular networks based on systems.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
elements). 2) there is a group of NI computing resource buyers SW M P : max Jij (aij , dji )
A,D
and NJ computing resource sellers. The ith buyer is indexed i=1 j=1
as Bi and a set of buyers is indexed as a vector b = {Bi |i ∈ ∑
NI ∑
NJ
{1, 2, ..., NI }}. The jth seller is indexed as Sj and a set of = max Ui (ai ) − Cj (dj ). (3)
A,D
sellers is indexed as a vector s = {Sj |j ∈ {1, 2, ..., NJ }}. i=1 j=1
Each buyer can request different demands from different sell- Some constraints are imposed on the SWMP problem:
ers and each seller can serve more than one buyer. The buyer
Bi is assumed to demand the computing resource amount ∑
NJ
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
α, β, γ, λ, µ, the Lagrangian of the SW M P can be written as demand and supply by optimizing the BAP as follows:
∑
NI ∑
NJ
1
∑
NI ∑
NJ
BAP : max{ xij ln aij − yji d2ji } (13)
f1 (A, D, α, β, γ, λ, µ) = Ui (ai ) − Cj (dj ) A,D 2
i=1 j=1
i=1 j=1
∑
NJ
∑
NI ∑
NJ ∑
NI ∑
NJ
s.t. amin ≤ aij ≤ amax , ∀i ∈ {1, 2, ..., NI }, (14)
− αi (amin
i − aij ) − βi ( aij − amax
i ) i i
j=1
i=1 j=1 i=1 j=1
∑
NI
∑
NJ ∑
NI ∑
NJ ∑
NI
dji ≤ dmax , ∀j ∈ {1, 2, ..., NJ }, (15)
− γj ( dji − dmax
j )− λij (aji − dji ) j
i=1
j=1 i=1 j=1 i=1
aij ≤ dji , ∀i ∈ {1, 2, ..., NI },
∑
NJ ∑
NI
+ µij aij , (8) ∀j ∈ {1, 2, ..., NJ }, (16)
j=1 i=1 aij ≥ 0, ∀i ∈ {1, 2, ..., NI },
∀j ∈ {1, 2, ..., NJ }. (17)
where α ≥ 0, β ≥ 0, γ ≥ 0, λ ≥ 0, µ ≥ 0 for the equality and
inequality constraints. According to the Karush-Kuhn-Tucker Although the BAP is different from the SW M P , it has the
(KKT) conditions [12], the optimal solutions of D and A same constraints. Based on the submitted bid prices, the broker
satisfy, can allocate computing resources for each buyer and seller,
leading to achieving effective market equilibrium. The BAP
∇aij f1 = 0, (9) is also strictly concave. Similarly, the Lagrange function of
the BAP can be written as
f2 (A, D, α, β, γ, λ, µ)
∇dji f1 = 0. (10)
∑
NI ∑
NJ
1 ∑
NJ ∑NI
= xij ln aij − yji d2ji + µij aij .
Thus, obtain, i=1 j=1
2 j=1 i=1
∑
NI ∑
NJ ∑
NI ∑NJ
∑
NJ ∑NI ∑
NJ ∑
NI
− γj ( dji − dj ) −
max
λij (aij − dji ). (18)
−∇dji Cj (dj ) − γj + λij = 0. (12) j=1 i=1 j=1 i=1
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
which implies that the broker solving the SW M P is Similarly, according to Eqs. (22), (26), and (28), we obtain
equivalent to solving the BAP if the buyer Bi and the seller ∂Rj (yj ) ∂Cj (di )
Sj submit the bid prices based on Eq. (23) and Eq. (24). − = 0. (33)
∂yji ∂yji
The double-sided auction scheme needs multiple iterations.
At each iteration, buyers need to solve their own buyers’ util- and
ities maximization problem (BM P ) to update bids according Cj (dj ) 1 ∂
to the new demand allocation by the broker, and sellers need to = λji − γj ⇒ yji = Cj (dj ). (34)
∂dji dji ∂dij
solve their own sellers’ utilities maximization problem (SM P )
The solution (34) is the same as (24), which means that the
to update their bids according to the new supply allocation by
price rule (28) of the seller Sj satisfies (24).
the broker. Hence, the broker has to design price rules for
Hence, the broker solving the BAP is equivalent to solve
buyers and sellers, so that each participant will be induced to
the SW M P , leading to social welfare maximization by the it-
submit the bid prices based on Eq. (23) and Eq. (24).
erative double-sided auction for computing resource trading.
Next, we try to derive the payment and reward functions
Proposed Algorithm: In each iteration of Algorithm 1, with
that induce buyers and sellers to bid according to (23) and
the initial bids X and Y submitted by buyers and sellers, the
(24). Define Pi (xi ) as the payment of the buyer Bi given to
broker solves the BAP to compute the allocated demand and
the broker for the service. The defined Rj (yj ) denotes the
the allocated supply (lines 3-4 in Algorithm 1). Meanwhile, the
reward of the seller Sj given by the broker. Pi (xi ) depends
broker computes the price rules (27) and (28) (line 5). Based
on the allocated mount ai of the buyer Bi , whereas Rj (yj )
on the new allocations announced by the broker, buyers and
depends on the allocated amount dj of the seller Si .
sellers compute the optimal bid prices by solving BM P and
Thus, the buyer Bi needs to solve its own BM P to
SM P (lines 6-8), respectively. These optimal bid prices will
determine its optimal bid price:
be submitted to the broker for the next iteration. The algorithm
BM P : max [Ui (ai ) − Pi (xi )], (25) will stop when the convergence conditions are satisfied. Thus,
xi the new optimal allocated amounts and the new optimal
and the seller Sj needs to solve its own SM P to determine bid prices can be obtained through a number of iterations.
its optimal bid price: Algorithm 1 alternatively optimizes BAP, BMP and SMP
problems which are strictly concave objective functions under
SM P : max [Rj (yj ) − Cj (dj )]. (26) the convex constraints (4)-(7). The convergence of Algorithm
yj
1 can be shown in the simulation results of Section IV.
The price rules of the buyer Bi and the seller Lj are given as Algorithm 1 has a relatively small communication overhead
because there is a polynomial number of messages that need
∑
NJ
to be circulated in the market. In each round of Algorithm 1,
Pi (xi ) = xij , (27)
j=1
there are 2NI NJ bids that need to be communicated from
the buyers for all their base stations. Similarly, the broker
∑
NI
1 announces the NI NJ + NJ variables to the NI NJ bidders.
Rj (yj ) = (λji − γj )2 . (28)
i=1
yji Thereby, the complexity analysis is O((NI NJ )2 ) per round.
In addition, Algorithm 1 satisfies the following properties.
Theorem 1: The price rules (27) and (28) make the optimal bid • It is efficient. The buyers and sellers submit the bids
prices for buyers and sellers satisfy (23) and (24), respectively. according to (23) and (24), leading to the optimal solutions
Proof : The optimal bid price of the buyer Bi satisfies the of BAP are identical to the optimal solutions of SW M P .
function (25). Hence, we have Hence, the social welfare can be maximized and the efficiency
∂Ui (ai ) ∂Pi (xi ) of market can be guaranteed.
− = 0. (29) • It is incentive compatible. Although the buyers and sellers
∂xij ∂xij
do not communicate the private information, they are induced
Based on (21), we obtain to submit bid prices truthfully from (23) and (24). Thus, the
hidden (private) information can be revealed gradually.
∂Ui (ai ) ∂Ui (ai ) ∂aij ∂Ui (ai ) aij
= = . (30) • It is individually rational. According to (29) and (33),
∂xij ∂aij ∂xij ∂aij xij we have Ui (ai ) − Pi (xi ) ≥ 0 and Rj (yj ) − Cj (dj ) ≥ 0.
According to the bid price (27), we have The buyers and sellers obtain nonnegative utilities through
participating in trading. Thus, they are willing to trade.
∂Pi (xi ) • It is budget balanced. The rewards to the sellers should
= 1. (31)
∂xij not exceed the payments from the buyers. This means that the
Hence, broker will not suffer any loss with the iterative double-sided
auction algorithm.
∂Ui (ai )
xij = aij . (32)
∂aij IV. S IMULATIONS
The solution (32) is the same as (23), which means that the In this section, we examine the performance of the proposed
price rule (27) satisfies (23). algorithm based on the iterative double-sided auction scheme
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
TABLE I
Algorithm 1 Proposed Algorithm PARAMETER SETTINGS
1: Initialize bid matrices X and Y, f lag ← 1, T ← 0;
2: while f lag = 1 do Parameters Values Parameters Values
3: Buyers and sellers submit bid prices X and Y to the amin
i [5,10] amax
i [10,20]
broker; CRS [5,10] dmax [10,20]
j
4: The broker solves BAP to obtain the optimal allocated n1 [0.005,0.025] n2 (0,1]
amounts A and D;
5: The broker computes Pi (xi ) and Rj (yj ) according to
Eqs. (27) and (28); 80
Social welfare
X by solving BM P ; 50
(T ) (T −1) (T )
ξ1 and (yij − yij )/yij < ξ2 ; 10
11: f lag = 0; 0
5 10 15 20
12: end while Iteration
13: Output: A, D, X, Y.
Fig. 3. Social welfare in the cases of 5 buyers/5 sellers, 10 buyers/10 sellers,
and 15 buyers/15 sellers.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
90 140
Case of 5 buyers 5 sellers
80 Payments of buyers
Case of 10 buyers 10 sellers 120 Rewards of sellers
Case of 15 buyers 15 sellers
70
50 80
40
60
30
40
20
10 20
0
5 6 7 8 9 10 0
5X5 10X10 15X15
Average value of CRS
Fig. 4. Social welfare versus the value of CRS in the cases of 5 buyers/5 Fig. 6. Payments of all buyers and rewards of all sellers in the cases of 5
sellers, 10 buyers/10 sellers, and 15 buyers/15 sellers. buyers/5 sellers, 10 buyers/10 sellers, and 15 buyers/15 sellers.
10-7 2.5
0 Bid to S 1
Bid to S 2
Bid to S 3
-0.2 2
Bid to S 5
-0.4 Bid to S 6
1.5 Bid to S 7
Case of 5 buyers 5 sellers
Bid to S 8
-0.6 Case of 10 buyers 10 sellers
Bid to S 9
Case of 15 buyers 15 sellers
1 Bid to S
10
-0.8
0.5
-1
-1.2 0
5 10 15 20 25 30 35 1 2 3 4 5 6 7 8 9 10
Iteration Index of buyers
Fig. 5. Gap between the allocated demands and the allocated supplies in the Fig. 7. Bids from 10 buyers to 10 sellers.
cases of 5 buyers/5 sellers, 10 buyers/10 sellers, and 15 buyers/15 sellers.
sellers, including the social welfare (SW), the payments and show the bids from the 10 sellers to the 10 buyers. We note
the rewards of all buyers and the rewards of all sellers, the that if a certain seller gives a high bid to a certain buyer, the
buyers’ utilities maximization (BM) and the seller’s utilities latter will try to force down the price and give a low bid to
maximization (SM). According to Eq. (3), Eq. (25) and Eq. that seller. It can be seen that the bid from the seller S6 to the
(26), we had BM+SM=SW+Reward−Payment, which also buyer B1 is the maximal bid among all bids from other sellers
can be verified from the results of Table II. to the buyer B1 in Fig. 8. Therefore, the buyer B1 submits
the minimum bid to the seller S6 (see Fig. 7). In turn, if a
TABLE II
C OMPARISONS
certain seller submits a low bid to a certain buyer, the latter
will try to raise the price and win the trade from this seller.
SW Payment Reward BM SM For example, the bid from the seller S6 to the buyer B9 is the
5×5 12.7321 27.67 20.5895 2.0280 3.6714 minimum among all bids to other buyers. Hence, the buyer
10 × 10 39.8264 57.99 46.5344 10.6078 17.7601 B9 submits the maximum bid to the seller S6 among all bids
15 × 15 73.8881 131.40 122.67 17.7765 46.3875
from other buyers to the seller S6 , so that the buyer B9 wins
the trade with the seller S6 . These results demonstrate that our
approach matches the market discipline.
According to the above Figs. 3–6 and Table II, it can be seen In addition, we studied the relationship between the distance
that the proposed algorithm based on the iterative double-sided factor and the allocated demands of buyers. Fig. 9 shows
auction scheme can reveal the private information gradually the allocated demands of buyers, and Table III presents the
and obtain optimal solutions, resulting in achieving social distance factor zij for the case of 10 buyers/10 sellers. We see
welfare maximization. Hence, the proposed algorithm satisfies that the distance factor is larger, and the transmission loss is
the property of incentive compatibility. larger, so the computing resource trading should be decreased
The individual bids of buyers and sellers for the case of 10 and the bids will be decreased. Table III indicates that the
buyers/10 sellers are shown in Fig. 7 and Fig. 8. The vertical distance factor for B1 to S6 is longer than to other sellers,
scale represents the bids and the horizontal scale represents i.e., z16 = 0.09. The buyer B1 wants to buy a smaller amount
the buyer’s index. The color bars in Fig. 7 show the bids from of the computing resource from S6 than from other sellers, i.e.,
the 10 buyers to the 10 sellers, while the color bars in Fig. 8 a16 = 0.1023 (see Fig. 9), so the corresponding transmission
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
Bid from S
2.5 Bid from S 2
1 V. C ONCLUSIONS
Bid from S 3
In this paper, we have developed an optimal computing
Bids from sellers to buyers
Bid from S 4
2 Bid from S 5 resource allocations based on the iterative double-sided auction
Bid from S 6
Bid from S 7
scheme for edge-cloud-assisted IoT in blockchain network,
1.5 Bid from S 8 where the broker solves the computing resource allocation
Bid from S 9
Bid from S 10
problem and designs the price rules to extract the hidden
1
information of the computing resource sellers and buyers,
leading to the computing resource sellers and buyers willing
0.5
to trade and moreover submitting the bids in truthful way.
Thus, the proposed algorithm can achieve the social welfare
0
1 2 3 4 5 6 7 8 9 10 maximization meanwhile protecting the private information
Index of buyers
of the sellers and buyers. From both theoretical analysis
Fig. 8. Bids from 10 sellers to 10 buyers.
and experimental results, we have shown that the proposed
algorithm based on an iterative double-sided auction scheme
is efficient, has individual rationality, incentive compatibility,
6
ai1 and is budget balanced. For the future work, we will consider
ai2
the optimal computing resource allocations for edge-cloud-
5 ai3
ai4 assisted IoT in blockchain network based on machine learning,
Allocated demand aij
4
ai5
ai6
e.g. sparse neural network, deep learning.
ai7
ai8
3
ai9 R EFERENCES
ai10
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2019.2897364, IEEE
Transactions on Industrial Informatics
[17] Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, “Edge comput- Shengli Xie was born in Hubei, China, in 1958. He
ing resource management and pricing for mobile blockchain,” arX- received the M.S. degree in mathematics from Cen-
iv:1710.01567, 2018. tral China Normal University, Wuhan, China, and
[18] P. Wang D. Niyato N. C. Luong, Z. Xiong, “Optimal auction for edge the Ph.D. degree in control theory and applications
computing resource management in mobile blockchain networks: A deep from the South China University of Technology,
learning approach,” arXiv:1711.02844, 2017. Guangzhou, China, in 1992 and 1997, respectively.
[19] G. Iosifidis, L. Gao, J. Huang, and L. Tassiulas, “A double-auction mech- He is currently the Director of the Laboratory for
anism for mobile data-offloading markets,” IEEE/ACM Transactions on Intelligent Information Processing and a Full Pro-
Networking, vol. 23, no. 5, pp. 1634–1647, Oct 2015. fessor with the School of Automation, Guangdong
[20] M. Liu, R. Yu, Y. Teng, V. C. M. Leung, and M. Song, “Computation University of Technology, Guangzhou. He has au-
offloading and content caching in wireless blockchain networks with thored or co-authored two monographs, a dozen of
mobile edge computing,” IEEE Transactions on Vehicular Technology, patents, and more than 80 papers in journals and conference proceedings. His
pp. 1–1, 2018. current research interests include automatic controls, signal processing, blind
[21] C. Xu, K. Wang, and M. Guo, “Intelligent resource management in signal processing, and image processing.
blockchain-based cloud datacenters,” IEEE Cloud Computing, vol. 4,
no. 6, pp. 50–59, 2017.
[22] D. Chatzopoulos, M. Ahmadi, S. Kosta, and P. Hui, “Flopcoin: A
cryptocurrency for computation offloading,” IEEE Transactions on
Mobile Computing, vol. 17, no. 5, pp. 1062–1075, May 2018.
[23] J. Kang, R. Yu, X. Huang, M. Wu, S. Maharjan, S. Xie, and Y. Zhang,
“Blockchain for secure and efficient data sharing in vehicular edge
computing and networks,” IEEE Internet of Things Journal, pp. 1–1,
2018.
[24] B. P. Majumder, M. N. Faqiry, M. N. Faqiry, S. Das, and A. Pahwa,
“An efficient iterative double auction for energy trading in microgrids,”
IEEE Symp. Comput. Intell. Appl. Smart Grid, pp. 1–7, 2014.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.