Cryptology ePrint Archive: Report 2015/370
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
Abstract: This work presents an adaptive profitable discriminatory pricing mechanism for cloud computing based on secure function decomposition, cryptographic commitments and zero knowledge proof. Cloud computing is an emerging trend of enterprise resource planning where a selling agent or service provider (S) wants to allocate a set of computational resources and related IT services optimally and fairly among many buying agents or service consumers (B) within its capacity constraint. Each service consumer discloses its demand plan for an IT portfolio within its budget constraint and rank of preference. An IT portfolio may include SaaS, PaaS, IaaS, CaaS, DaaS and dSaaS. The basic objective of the service provider is to optimize its expected revenue within target profit margin. It is basically a problem of secure function evaluation where the concept of decomposition of a function is considered. It is a constrained non-linear optimization problem; the search is governed by a set of intelligent moves. The communication complexity of the pricing mechanism depends on the time constraint of the negotiating agents, their information state and the number of negotiation issues; it also depends on number of negotiation rounds and the complexity of IT portfolio. The computational cost depends on the complexity of function decomposition. The security and privacy of strategic data of the trading agents provides business intelligence to the pricing mechanism. The ultimate objective of the mechanism is to predict a profitable discriminatory pricing plan for each consumer.
Category / Keywords: Financial cryptography, pricing mechanism, secure function decomposition, cryptographic commitment, Zero knowledge proof, computational intelligence
Date: received 22 Apr 2015, last revised 22 Apr 2015
Contact author: schakraborty2010 at hotmail com
Available format(s): PDF | BibTeX Citation
Note: Keywords added in revised submission
Version: 20150423:131551 (All versions of this report)
Short URL: ia.cr/2015/370
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]