计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 150-154.doi: 10.11896/j.issn.1002-137X.2014.05.032

• 信息安全 • 上一篇    下一篇

基于混合组合双向拍卖的网格资源分配方案

肖迎春,王汉武,李梦雄   

  1. 湖南大学信息科学与工程学院 长沙410082;湖南大学信息科学与工程学院 长沙410082;湖南大学信息科学与工程学院 长沙410082
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(6102461)资助

Grid Resource Allocation Based on Mixed Combinatorial Double Auction

XIAO Ying-chun,WANG Han-wu and LI Meng-xiong   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对组合双向拍卖中节点或实体在单次拍卖中分别扮演资源提供者和资源需求者时所具有的不同特点,提出了混合组合双向拍卖模式,即在拍卖中节点本身不单是资源提供者同样也是资源需求者。在此前提下,结合信任度在资源分配安全性以及服务质量方面的作用,将信任度引入到定价调整中,从而优化资源的分配。仿真实验结果表明,所提出的资源分配方法在提高拍卖效率和单位效用正向激励以及防止恶意节点方面均优于已有方案。

关键词: 网格,资源分配,混合组合,组合双向拍卖,信任度

Abstract: Nodes acting as the resource providers or customers will play different roles in a single auction of the combinatorial double auction sessions or entities.Regarding this,we proposed a mixed combination double auction scheme which enables a node to be not only a resource provider but a customer.Under such a context we further adopted the so called credit mechanism into our resource allocation scheme,due to its positive effect on resource allocation security and quality of service.Specifically,we used trust as a parameter to determine and adjust the price of the resource,and further derived the optimal resource allocation scheme.The simulation results show that proposed algorithm can outperform previous methods in preventing malicious nodes,as well as improving the transaction rate and transaction’s positive incentive auction efficiency.

Key words: Grid,Resource allocation,Mixed combination,Combinatorial double auction,Trust

[1] Wang X Y,Wang X W,Huang M.A Double Auction Method for Resource Management and Bidding Strategy on Grid Resources[C]∥2010IEEE Fourth International Conference on Genetic and Evolutionary Computing.2010:422-425 (下转第172页)(上接第154页)
[2] Zhao L Y,Liu F.Service-oriented Pricing and Resource Allocation in Grid Computing Environment[C]∥2011International Conference on Electronic & Mechanical Engineering and Information Technology.2011:3927-3930
[3] Schneider S,Shabalin P,Bichler M.On the robustness of non-linear personalized price combinatorial auctions[J].European Journal of Operational Research,2010(206):248-259
[4] Christopher T,Parkes C.Cryptographic combinatorial securities exchanges[C]∥The 13th International Conference on Financial Crypto-graphy and Data Security,Feb 2326,2009.Accra Beach,Barbados:Springer Verlag,2009:285-304
[5] Xia M,Stallaert J,Whinston A B.Solving the combinatorialdouble problem[J].European Journal of Operational Research,2005,164(1):239-251
[6] Ma J,Orgun M A.Trust management and trust theory revision [J].IEEE Trans on System,Man and Cybernetics Parta:System and Human,2006,36(3):451-460
[7] Vijayakumar V,Wahidhabanu R S D.Trust and reputation aware security for resource selection in grid computing [C]∥2008International Conference on Security Technology Procee-dings.Sanya,China,Dec.2008:121-124
[8] Yuan L L,He Z J,Zeng G S.A Resource Trade Model Based on Trust Evaluation for Grid Computing[C]∥IFIP International Conference on Network and Panallel Computing-Workshops.2007:506-511
[9] Li L,Liu Y A,Ma X L.Grid resource allocation based on thecombinatorial double auction[J].Acta Electronica Sinica,2009,37(1):165-169
[10] Yang M,Liu Y A,Ma X L.Research on Grid Resource Allocation Based on Equivalent Price[C]∥ISECS International Colloquium on computing,Communication,Control,and Management.2009:148-152
[11] Wang K,Li L,Hausheer D.A Trust-Incentive-based Combinatorial Double Auction Algorithm[C]∥IEEE/IFIP Network Operations and Management Symposium NOMS 2010:Mini-confe-rence.2010:209-215
[12] Gan Z B,Xiao X L,Li K.A Multi-dimension Trust Risk Evaluation for E-commerce systems[C]∥IEEE,Eighth Web Information Systems and Applications Conference.2011:143-149
[13] Xu X Q,Yang L.A Multi-dimensional and Multi-directionalTrust Model for Federated Identity Management[C]∥International Conference on Instrumentation,Measurement,Computer,Communication and Control.2011:512-515
[14] Li X Y,Zhou F,Yang X D.A multi-dimensional trust evaluation model for large-scale P2P computing[J].J.Parallel Distrib.Comput,2011(71):837-847

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!