By Topic

A trust-incentive-based combinatorial double auction algorithm

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

8 Author(s)
Kun Wang ; MIIT, China Acad. of Telecommun. Res., China ; Li Li ; Hausheer, D. ; Zhiyong Liu
more authors

Resource allocations determine an important management task for operational Grids and networks, especially under the constraint of commercially offered resources. Therefore, the need for an optimal allocation of this task arises, and this paper proposes a trust-incentive-based combinatorial double auction algorithm for these resource allocations in Grids. The key and new contribution is the design of a trust-incentive mechanism, which is integrated into an existing combinatorial double auction algorithm (a) to improve the performance of Grid resource allocation and (b) ensure that trust values of participating bidders (typically Grid users, termed peers) are considered. In the newly developed trust-incentive-based algorithm, each peers' trust value is adopted to adjust their bids in the process of the combinatorial double auction. After each transaction, peers participating in the transaction rate each other to setup and update the bilateral trust relationship. Those simulation results obtained demonstrate that the algorithm proposed can improve the efficiency of resource sharing greatly by providing applicable incentives to trustworthy peers to contribute more resources. Moreover, this algorithm can identify and eliminate malicious peers in the system to enhance the Grid security level in that respect.

Published in:

Network Operations and Management Symposium (NOMS), 2010 IEEE

Date of Conference:

19-23 April 2010