Cryptology ePrint Archive: Report 2015/370

Financial Cryptography: Discriminatory Pricing Mechanism

Sumit Chakraborty

Abstract: This work presents an adaptive profitable discriminatory pricing mechanism for cloud computing based on secure function decomposition, cryptographic commitments and zero knowledge proof. Cloud computing is an emerging trend of enterprise resource planning where a selling agent or service provider (S) wants to allocate a set of computational resources and related IT services optimally and fairly among many buying agents or service consumers (B) within its capacity constraint. Each service consumer discloses its demand plan for an IT portfolio within its budget constraint and rank of preference. An IT portfolio may include SaaS, PaaS, IaaS, CaaS, DaaS and dSaaS. The basic objective of the service provider is to optimize its expected revenue within target profit margin. It is basically a problem of secure function evaluation where the concept of decomposition of a function is considered. It is a constrained non-linear optimization problem; the search is governed by a set of intelligent moves. The communication complexity of the pricing mechanism depends on the time constraint of the negotiating agents, their information state and the number of negotiation issues; it also depends on number of negotiation rounds and the complexity of IT portfolio. The computational cost depends on the complexity of function decomposition. The security and privacy of strategic data of the trading agents provides business intelligence to the pricing mechanism. The ultimate objective of the mechanism is to predict a profitable discriminatory pricing plan for each consumer.

Category / Keywords: Financial cryptography, pricing mechanism, secure function decomposition, cryptographic commitment, Zero knowledge proof, computational intelligence

Date: received 22 Apr 2015, last revised 22 Apr 2015

Contact author: schakraborty2010 at hotmail com

Available format(s): PDF | BibTeX Citation

Note: Keywords added in revised submission

Version: 20150423:131551 (All versions of this report)

Short URL: ia.cr/2015/370

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]