Double auction is one of the most promising solutions to allocate virtual machine (VM) resources in two-sided cloud markets, which can increase the utilization rate of VM resources. However, most cloud auction mechanisms simply assume that the auctioneer is fully trusted while ignoring bidprivacy preservation and trade fairness in the process of auction. Previous studies have indicated that some cryptographic tools can be used to resolve the above issues, but the poor performance makes those techniques difficult to practice. In this paper, we propose a Secure and Fair Double AuCtion framework (named SF-DAC) for cloud virtual machines, which performs cloud auction efficiently while guaranteeing both bid privacy and trade fairness. We design secure 3-party computation protocols that support secure comparison and secure sorting, which enable us to construct a secure double auction scheme that outperforms all prior comparable solutions. Furthermore, we propose a fair trading mechanism based on smart contracts to prevent the bidders from halting the auction without financial penalties. The extensive experiments demonstrate that SF-DAC achieves an order of magnitude reduction in computation and communication costs than prior arts.INDEX TERMS Privacy preservation, secure double cloud auction, secure three-party protocol, trade fairness.
Mobile crowdsensing systems use the extraction of valuable information from the data aggregation results of large-scale IoT devices to provide users with personalized services. Mobile crowdsensing combined with edge computing can improve service response speed, security, and reliability. However, previous research on data aggregation paid little attention to data verifiability and time sensitivity. In addition, existing edge-assisted data aggregation schemes do not support access control of large-scale devices. In this study, we propose a time-sensitive and verifiable data aggregation scheme (TSVA-CP-ABE) supporting access control for edge-assisted mobile crowdsensing. Specifically, in our scheme, we use attribute-based encryption for access control, where edge nodes can help IoT devices to calculate keys. Moreover, IoT devices can verify outsourced computing, and edge nodes can verify and filter aggregated data. Finally, the security of the proposed scheme is theoretically proved. The experimental results illustrate that our scheme outperforms traditional ones in both effectiveness and scalability under time-sensitive constraints.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.