2022
DOI: 10.1109/tdsc.2020.3045449
|View full text |Cite
|
Sign up to set email alerts
|

SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 48 publications
0
19
0
Order By: Relevance
“…Truthfulness Double Auction Bid Privacy Fairness High Efficiency [2], [13]- [18] × × × [1], [19]- [22] × × [7], [24], [25] × [10], [11], [27]- [29] × × [26], [30] × Our Work [21] propose a feedback-based combinatorial double cloud auction, which allows the users to access resources from different providers at optimal prices, by prioritizing genuine providers with good feedback over in-genuine providers with bad feedback. Gao et al [22] present a VM resource auction mechanism to allocate VMs in geo-distributed edge cloud nodes to users and design a greedy approximation algorithm to determine the winners of the auction.…”
Section: Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Truthfulness Double Auction Bid Privacy Fairness High Efficiency [2], [13]- [18] × × × [1], [19]- [22] × × [7], [24], [25] × [10], [11], [27]- [29] × × [26], [30] × Our Work [21] propose a feedback-based combinatorial double cloud auction, which allows the users to access resources from different providers at optimal prices, by prioritizing genuine providers with good feedback over in-genuine providers with bad feedback. Gao et al [22] present a VM resource auction mechanism to allocate VMs in geo-distributed edge cloud nodes to users and design a greedy approximation algorithm to determine the winners of the auction.…”
Section: Propertiesmentioning
confidence: 99%
“…Wang et al [29] design a secure cloud auction scheme PROST to provide comprehensive protection for users' location privacy and time dynamics. Based on the trusted processors and the smart contracts, a recent work [30] designs a general secure and fair auction framework named SAFE for wireless markets. To summarize, Table 1 makes a comparison of the property differences between SF-DAC and the above secure and fair auctions.…”
Section: B Secure and Fair Auctionmentioning
confidence: 99%
“…To eliminate the hypothetical trusted auctioneer (in some studies, if the auctioneer is semitrusted, then a semitrusted auction agent would be introduced in the premises that they would not collude with each other), some Software Guard Extension (SGX) approaches were proposed [9]. Recently, Chen et al proposed SAFE, a general secure e-auction framework with privacy preservation [11]. It should be noted that this framework considered all the single-round (single-round auction stands for the bidders that can only submit their bids once) auction formats.…”
Section: Related Workmentioning
confidence: 99%
“…e users register a Zether account and deposit a certain amount. e third part is to execute a specific auction, lock the account to the "Secure Auction Execution (called AUC)" smart contract provided in SAFE [11], and then execute the specific auction process in the fourth part, that is, to transfer the control of the Zether account to AUC. e last part is the settlement of the funds and auction items after the auction ends.…”
Section: Detailed Constructionmentioning
confidence: 99%
See 1 more Smart Citation