Skip to main content

Resource sharing of mobile edge computing networks based on auction game and blockchain

Abstract

The edge clouds in mobile edge computing networks are isolate which may belong to different companies or organizations, and hence the communication, computation, and storage resources are not efficiently utilized. To solve this problem, we propose the resource-sharing model of edge clouds which is based on blockchain technology and auction game. In this model, the blockchain platform is regarded as the bridge of the resource sharing, composed of edge clouds, clouds, third-party spectrum and computation management, identity authentication institutions, etc. It is used to record the users’ transaction information and broadcast the intelligent terminals’ resource requirements to all edge clouds in the blockchain platform through smart contracts. Then, an optimization problem of the joint allocation of communication and computation resources is formulated to maximize the utility of intelligent terminals. And an efficient improved sealed second-price auction game is proposed to allocate communication and computation resources and determine the optimal price of resources under the intelligent terminals’ QoS constraints. Simulation results show that the model can effectively improve the system resources utilization and the successful transaction rate.

1 Introduction

Recently with the rapid development of the Internet of Things (IoT), various types of new intelligent terminals continuously emerge and generate huge amounts of data. For example, ubiquitous surveillance cameras generate a huge amount of data every day. Usually, these continuously emerging data with personal privacy will not only increase the risk of privacy leakage but also cause more data to be transferred to the cloud, which occupies more bandwidth and brings higher latency, energy consumption, etc. Besides, some new high real-time applications and privacy protection requirements such as automatic driving and industrial automation require local data processing. Therefore, mobile edge computing (MEC) system that can not only reduce the delay and network burden, but also protect the privacy of users comes into being [1].

Many researchers have been engaged in the research of MEC resources allocation. In [2], a joint multi-user resources allocation of spectrum and computation was proposed, which conclude a resource allocation method for a given unloading strategy and an optimization unloading strategy based on orthogonal frequency division multiplexing Access (OFDMA). [3] proposed an incentive-compatible auction mechanism (ICAM) for the resources transactions between the mobile devices as service users(buyers) and edge clouds as service providers (sellers). However, this model can only allow one to one matching between intelligent terminals and edge clouds. In [4], an improved double auction scheme was investigated based on the break-even and one edge cloud can allocate resources to many intelligent terminals in one auction under the constraints of the edge clouds computation resources.

However, the service capability of a single edge cloud is very limited and each edge cloud belongs to different operators, enterprises, or third parties. Meanwhile, it provides services to different industries and applications. In order to establish a data sharing mechanism of such heterogeneous distributed edge clouds system, three basic issues must be solved. The first is to establish a resource sharing bridge between the autonomous domains. The second is to effectively aggregate and manage the heterogeneous network resources. The last is to ensure the resources sharing execution safe and reliable. Therefore, it is difficult to achieve effective resource sharing in the distributed heterogeneous systems by traditional centralized security management technology.

Blockchain is widely regarded as a promising technology to be used for trusted exchanges in the digital world [5]. The immutable ledger, decentralized architecture and identity authentication system of blockchain together ensure the data authenticity and provide a technical support for the resources sharing among the heterogeneous distributed edge clouds. Furthermore, the natural trading attributes of blockchain can provide an incentive mechanism to charge intelligent terminals and rewards edge clouds.

According to the natural transaction attributes and decentralized trusted transaction mechanism of blockchain, [69] have researched the data sharing problem of distributed systems in different fields. [6] used the block-chain-based competitive first-come-first-service queue to implement spectrum sharing in mobile cognitive wireless networks. Specoins, which is a kind of virtual currency is introduced as a reward while user accessing the spectrum. [7] proposed a system to solve the problem of medical data sharing among medical big data custodians in a non-trusted environment. Kim et al. [8] focused on energy trading using blockchain (mainly household electricity). The households could exchange electric energy using special energy COINS on consortium blockchain platform and buy or sell energy COINS in public blockchain platform. A mechanism was studied to solve the charging and discharging problem of electric vehicles based on blockchain technology in [9], where charging vehicles pay discharging vehicles by energy coins. It also performed energy bidding and trading through an iterative dual auction mechanism.

Recently, more and more researchers pay attention to the investigations of MEC based on blockchain. Christidis K explored the feasibility of the combination of blockchain technology and the IoT to create a service market between devices, so as to promote the sharing of services and resources [10]. A blockchain based MEC management was presented in [11] to guarantee service continuity in a secure, timely and efficiently manner. The computation resources allocation problem for mobile devices during the mining process underlying MEC environment based on blockchain was investigated in [1214]. A D2D-assisted MEC computation offloading based on the blockchain was proposed [15]. And in [16], a blockchain-based MEC platform was proposed to ensure edge nodes to work in a trustworthy environment. [17] develop a secure and intelligent task offloading framework to reduce task offloading delay, queuing delay, and handover cost with incomplete information while simultaneously ensuring privacy, fairness, and security remains an open issue. It should be noted, there are few researches on the joint resources allocation of communication and computing based on blockchain in the MEC resources sharing system.

To fill this gap, a joint resources allocation of communication and computing in secure MEC resources sharing system is studied based on blockchain and auction game, in this paper. The main contributions of this paper are mainly given as follows:

  • A bridge of the resources sharing is established using blockchain which is composed of edge clouds, clouds, third-party spectrum and computation management, identity authentication institutions, etc. In the blockchain platform, the intelligent terminals can apply for resources from each cloud and edge cloud using smart contract.

  • In order to improve the resources utilization, an efficient and improved auction game is proposed with dynamic pricing and dynamic computation resources under the constraints of intelligent terminals. In the auction game, the intelligent terminals are divided into different priority according to the location of the access network to the edge clouds and the resources will be allocated to terminals with higher priority first.

2 Methods

As depicted in Fig. 1, the system has three layers, such as clouds, edge clouds and terminal access. Clouds are the core and the central resources provider in the network, which is composed of a group of large servers. Edge clouds mainly include MEC Server, resources proxy server (RPS), etc. MEC server is a small cloud computation resources pool deployed by telecom operators at the edge of the network near or inside the base station (BS) to supplement the central server. Therefore, the tasks of intelligent terminals can be carried out in local sever. RPS is a new equipment addition to the system, which can be placed near or inside the MEC server. Assume that one MEC server corresponds to one RPS. The terminal access layer is composed of BSs and intelligent terminals, such as smart home equipment, smart cars, smart phones, sensors, etc.

Fig. 1
figure 1

System mode

The bridge of resource sharing among the edge clouds is built by blockchain, which includes RPS, third-party spectrum and computation management, identity authentication institutions, etc. The most important part of the blockchain platform is RPS, which is the key device to share resources among the heterogeneous distributed edge clouds. It has two main functions. Primarily, it stores the external resources information of edge clouds and BSs. Then, the terminals can request resources from the RPS to achieve resources sharing. Secondly, it runs the smart contract, which provides an interface for applications to access the blockchain and writes global ledger. In the system, intelligent terminals can broadcast resources application message through RPS in blockchain platform using smart contract. Edge clouds or clouds in the blockchain network will receive the smart contract of resources application. Then, the edge clouds or clouds provide services to the intelligent terminals according to their requirements. Thus, the resources sharing among heterogeneous distributed edge clouds is completed.

Then, in order to improve the resources utilization rate, an efficient and improved auction game is proposed based on auction by maximizing user’s benefit under the intelligent terminals’ Quality of Service (QoS) constraints. After that, the implementation of data sharing among edge clouds using blockchain is narrated.

3 Problem formulation based on auction

In this paper, a multiuser MEC system based on blockchain is adopted as shown in Fig. 1. In this scenario,the intelligent terminal iI={1,2,3,...I} which has limited power and computation resources will offload their tasks to the edge cloud kK={1,2,3,...K} through the BS jJ={1,2,3,...J} for saving energy or reducing execution time. Therefore, the intelligent terminal i requests subcarrier nN={1,2,3,...N} from BS j and requests MEC (communication and storage) resources from edge cloud k. Theoretically, there exist two competing trading processes for resource allocation such as competing for bandwidth resources from BSs and competing for MEC resources from edge clouds. As a consequence, the auction game is adopted to jointly allocate the bandwidth and MEC resources in the systems based on blockchain.

For an intelligent terminal i, an offloading task with the number of CPU cycles Di and the transmission data size Si is sent to the adjacent BSs. Then, the BSs allocate bandwidth to the intelligent terminal i and send the request to the blockchain for MEC resources. In terms of system utility, the transmission efficiency (saving energy and reducing execution time) and auction benefits are investigated in the paper.

3.1 Transmission efficiency

In the paper, the OFDMA is adopted as the multiple access schemes to avoid the same frequency interference. Correspondingly, the instantaneous rate of the intelligent terminal i in a subcarrier with a bandwidth of W Hz can be expressed as follows:

$$ r_{{ijn}}=c_{{ijn}}W\log_{2}\left(1+\frac{p_{{ijn}}H_{{ijn}}}{W\sigma^{2}}\right). $$
(1)

The total transmission rate provided by BS j for intelligent terminal i can be formulated as:

$$ r_{{ij}}\left(c_{{ijn}},p_{{ijn}}\right)=\sum_{n=1}^{N}{r_{{ijn}}}. $$
(2)

Where define an indicator cijn{0,1},cijn=1 if subcarrier n of BS j is allocated to intelligent terminal i, otherwise, cijn=0. pijn represents the transmission power of intelligent terminal i to BS j in subcarrier n, the maximum value of intelligent terminal i is Pi due to the hardware limitations. The channel gain in subcarrier n from intelligent terminal i to BS j is Hijn. And, σ2 is the power of additive White Gaussian Noise [18].

3.1.1 Local computation

fi denotes the local computation capability of the intelligent terminal i in terms of instructions per second. Then, the task completion time locally can be obtained as:

$$ t_{i}=\frac{D_{i}}{f_{i}}. $$
(3)

According to [19], the energy consumption of local task execution is given as:

$$ E_{i}=u_{i}D_{i}. $$
(4)

Where \(u_{i}=10^{-11}f_{i}^{2}\) is the consumed energy by the intelligent terminal i in one computing cycle.

3.1.2 Remote computation

The task offloading time delay is composed of two parts (backhaul link delay and downlink communication delay are ignored): the uplink communication delay \(t_{{ij}}^{ul}=\frac {S_{i}}{r_{{ij}}}\) and data processing delay \(t_{{ik}}^{exe}=\frac {D_{i}}{f_{{ik}}}\) [20]. Where fik is the amount of requested computation resources for the intelligent terminal i from the edge cloud k. Then, the remote computation time delay is defined as:

$$ t_{i}^{M}=t_{{ij}}^{ul}+t_{{ik}}^{exe} $$
(5)

For the intelligent terminal i, the remote energy consumption \(E_{i}^{M}\) is mainly about the upload energy consumption for task execution is saved through offloading. Specifically, the energy consumption can be written as:

$$ E_{i}^{M}=\sum_{n=1}^{N}\frac{c_{{ijn}}p_{{ijn}}S_{i}}{r_{{ij}}} $$
(6)

3.1.3 Transmission efficiency

It should be noted that the intelligent terminals offload tasks to edge clouds for saving energy or reducing execution time. Specifically, the utility of energy and execution time by offloading task to the edge clouds can be described as:

$$ u_{i}^{IT}=\alpha\left(t_{i}-t_{i}^{M}\right)+\beta\left(E_{i}-E_{i}^{M}\right). $$
(7)

Where α+β=1,0≤α≤1 and 0≤β≤1 represent normalization coefficients of time delay and energy consumption. Additionally, if the intelligent terminals put the emphasis on the delay cost, α will be increased. In contrast, if energy consumption is more important, increase β correspondingly.

3.2 Auction benefits

As pointed above, there are two auction processes such as bandwidth, MEC resource allocation. In this paper, the second-price sealed auction is selected to allocate the resources.

3.2.1 Budget balance

The traditional auction scheme meets budget balance when the auctioneer does not lose money in the trade. But in this paper, the buyers and sellers trade through the blockchain and there is no auctioneer exist. Therefore, the auctioneer does not lose money in the trade.

3.2.2 Individual rationality

No winning buyer is charged more than its bid and no winning seller is rewarded less than its ask. In other words, a mechanism is individually rational if, for both participating buyer and seller, the proceeds from the bid is no less than non-participation (at least equal). For buyers, due to the selection of second-price sealed auction, the payment price is lower than the bid, and each buyer who participates in the auction always gains more than zero. For the winning seller, the payment price is more than the cost of the resources, such as \(v_{{ik}}^{S}\geq cs_{k}^{S}, v_{{ik}}^{F}\geq cs_{k}^{F}, v_{{ij}}^{BS}\geq cs_{j}^{BS}\). Where \(v_{{ik}}^{S}, v_{{ik}}^{F}\) and \(v_{{ij}}^{BS}\) are the transaction price of storage, computation, and bandwidth respectively, and the cost of the storage, computation, and bandwidth are \(cs_{k}^{S}, cs_{k}^{F}\) and \(cs_{j}^{BS}\).Hence, the utility of the seller is always greater than zero too. On the other hand, if the seller loses the transaction then the utility is zero. It is obvious that the benefits for both buyers and sellers are not less than zero. Therefore, the action is individually rational.

3.2.3 Incentive compatible

A mechanism is incentive-compatible if both buyer and seller report their actual requests without lying. In the second-price sealed auction, the successful bidder will pay a price independent of his bid. Without collusion, the best strategy for each bidder is to give price according to intelligent terminals’ own valuation of the resources. For the bidder, if the bid price is less than the real valuation price, the chance of winning the auction will reduce. On the contrary, if the bid price is higher than the real valuation price, the bidder may get a non-profitable deal although the chance of winning the auction will increase. As a result, the best strategy for each bidder is to make the bid price equal to the real valuation price.

3.2.4 Auction benefits

The auction benefits are composed of bandwidth and MEC resources allocation. In the bandwidth auction game, intelligent terminals i request bandwidth resources from BS j and have a bid price matrix \(B^{BS}=\left \{b_{{ij}}^{BS},i\in I,j\in J\right \}\). Where \(b_{{ij}}^{BS}\) is to indicate the maximum price how much intelligent terminal i is willing to pay for BS j for per unit of time and per unit of bandwidth. Assume that after auction determination, buyer i wins the bandwidth resource from seller j. Due to the regulation of the second-price sealed auction, the transaction price \(v_{{ij}}^{BS}\) is lower than the bid price \(b_{{ij}}^{BS}\). Therefore, the auction benefits of the bandwidth can be calculated as \(u_{i}^{BS}= m_{{ij}}w_{{ij}}t_{{ij}}^{ul}\left (b_{{ij}}^{BS}-v_{{ij}}^{BS}\right)\). Where mij{0,1}, and mij=1 if BS j successfully allocates resources to the intelligent terminal i, otherwise, mij=0. wij represents the amount of bandwidth resources requested by the intelligent terminal i.

As such, in the MEC auction game, the intelligent terminals i request MEC resources from the edge cloud k and have bid price matrixes \(B^{F}=\left \{b_{{ik}}^{F},i\in I,k\in K\right \}, B^{S}=\left \{b_{{ik}}^{S},i\in I,k\in K\right \}\), Where \(b_{{ik}}^{F}\) and \(b_{{ik}}^{S}\) are the maximum price how much intelligent terminal i is willing to pay for edge cloud k for per unit of time and per unit of resources. In the same way with bandwidth auction, the benefits for MEC resources can be written as \(u_{i}^{MEC}=m_{{ik}}\left (f_{{ik}}t_{{ik}}^{exe}\left (b_{{ik}}^{F}-v_{{ik}}^{F}\right)+S_{i}t_{{ik}}^{exe}\left (b_{{ik}}^{S}-v_{{ik}}^{S}\right)\right)\).

Where mik{0,1}, and mik=1, if edge cloud k allocates resources to the intelligent terminal i, otherwise, mik=0. The bid price and transaction price per unit of time and per unit of resources are \(b_{{ik}}^{F}\) and \(v_{{ik}}^{F}\) respectively. Simultaneously, \(b_{{ik}}^{S}\) and \(v_{{ik}}^{S}\) are the bid price and transaction price per unit of time and per unit of resource. To summarize, the auction benefits can be defined as

$$ u_{i}^{AU}=\gamma u_{i}^{BS}+\delta u_{i}^{MEC}. $$
(8)

Where the normalization coefficient of auction revenue of BSs and MECs are defined as 0≤γ≤1 and 0≤δ≤1. Additionally, γ+δ=1.

3.3 Problem formulation

As evident from the above, the system utility of edge cloud resources sharing problem consists of transmission efficiency and auction benefits. Then, the optimization problem of system utility is formulated as follows:

$$\begin{array}{*{20}l} &\max\limits_{c_{{ijn}},p_{{ijn}},m_{{ij}},v_{{ij}}^{BS},m_{{ik}},v_{{ik}}^{F},v_{{ik}}^{S}}\sum_{i=1}^{I}{\left(u_{i}^{IT}+u_{i}^{AU}\right)}\\ &\begin{array}{llll} s.t\qquad A:&\sum_{i=1}^{I}{w_{{ij}}}&\leq W_{j}^{BS} &\qquad\forall i\in I,\forall j\in J \notag \\ B:&v_{{ij}}^{BS}&\geq cs_{j}^{BS} &\qquad\forall i\in I,\forall j\in J \\ C:&\sum_{i=1}^{I}{c_{{ijn}}}&\leq 1,c_{{ijn}}\in\{0,1\} &\qquad\forall i\in I,\forall j\in J, \forall n\in N \\ D:&\sum_{n=1}^{N}{c_{{ijn}}p_{{ijn}}}&\leq P_{i},p_{{ijn}}\geq 0 &\qquad\forall i\in I,\forall j\in J,\forall n\in N \\ E:&\frac{D_{i}}{f_{{ik}}}+\frac{S_{i}}{r_{{ij}}}&\leq dl_{i} &\qquad\forall i\in I,\forall j\in J,\forall k\in K \\ F:&\sum_{i=1}^{I}{f_{{ik}}}&\leq F_{k}^{M} &\qquad\forall i\in I,\forall k\in K \\ G:&S_{i}&\leq S_{k}^{M} &\qquad\forall i\in I,\forall k\in K \\ H:&v_{{ik}}^{F} &\leq cs_{k}^{F} &\qquad\forall i\in I,\forall k\in K \\ I:&v_{{ik}}^{S} &\leq cs_{k}^{S} &\qquad\forall i\in I,\forall k\in K. \end{array} \end{array} $$
(9)

Where constraint A indicates that the total amount of allocated bandwidth must be not more than the maximum bandwidth \(W_{j}^{BS}\). Constraints B,H and I show that the transaction price \(v_{{ij}}^{BS}, v_{{ik}}^{F}\) and \(v_{{ik}}^{S}\) should be more than the cost of the resources \(cs_{j}^{BS}, cs_{k}^{F}\) and \(cs_{k}^{S}\) in the auction of bandwidth, computation and storage. According to constraint C, one channel is only allowed to be assigned to one intelligent terminal. Constraint D ensures that uplink transmission power must be positive and must not exceed the maximum transmission power Pi. Constraint E indicates that the system delay should be less than the maximum delay dli acceptable by the intelligent terminal i. Constraints F and G guarantee that the total computation and storage resources assigned by the edge cloud must be less than the maximum edge cloud resources \(F_{k}^{M}\) and \(S_{k}^{M}\). Obviously, this optimization problem is a mixed-integer nonlinear assignment problem, which is a NP-hard problem.

4 Joint resource allocation of communication and computing based on auction

Obviously, in order to maximize the utility of resource allocation, we only need to make the bandwidth auction benefits maximum, the transmission benefits maximum and the MEC auction benefits maximum. Therefore,the optimization problem is divided into three dependent sub-problems.

PBS: The first problem is auction-based resources allocation of bandwidth, which can determine the allocation strategy of bandwidth and the transaction price of bandwidth. The benefit function can be described as \( U_{{BS}}= \sum _{i=1}^{I} {u_{i}^{BS}} \).

PIT: Based on the result of the allocation strategy of bandwidth, the joint allocation of subcarrier and power is decided by \( U_{{IT}}= \sum _{i=1}^{I} {u_{i}^{IT}} \), in which the request computation \(f_{{ik}}^{\ast }\), sub-carrier, and power strategy will be confirmed.

PMEC: The problem of auction-based resources allocation of MEC, which can determine the allocation strategy and the transaction price of MEC resources, can be described as \( U_{{MEC}}= \sum _{i=1}^{I} {u_{i}^{MEC}} \), due to the result of the request computation \(f_{{ik}}^{\ast }\) concluded in problem UIT.

4.1 Bandwidth allocation

Intelligent terminals apply for bandwidth from all accessible BSs, and the BSs allocate bandwidth according to the received applications. The optimization problem can be expressed as:

P BS :

$$\begin{array}{*{20}l} &\max\limits_{m_{{ij}},v_{{ij}}^{BS}}U_{{BS}}\\ &\begin{array}{lr} s.t\qquad A, B.\notag \end{array} \end{array} $$
(10)

From an implementation point of view, the ultimate goal of a business is to get the maximum benefit. Therefore, choosing the user with the highest price is the most satisfying choice for merchants. From the auction point of view, the buyers will give the maximum price that they are willing to pay for the resources to win the auction. As a consequence, a greedy algorithm is appropriate to be adopted in the auction, which allocates the highest price user first, then the second-highest price user, and so on.

As shown in Algorithm 1, for all intelligent terminals iI, the winning user set is \(I^{ac}\subseteq I, B_{i}^{BS}\) is the set of bidding prices of bandwidth, the winning transaction price set of bandwidth is \(P_{i}^{ac}, W_{i}\) is the set of the number of bandwidth resources requested, \(W_{i}^{ac}\) is the allocated bandwidth. \(\delta : \left \{i:i\in I^{ac}\right \} \rightarrow \left \{i:p_{i}^{ac}\in P_{i}^{ac}\right \}\) is the mapping between Iac and \(P_{i}^{ac}\). For all BS j, \(W_{j}^{BS}\) is the maximum bandwidth, and the cost of unit bandwidth is \(cs_{j}^{BS}\). First, sort all the bidding prices of the bandwidth \(B_{i}^{BS}\) in descending order. If the second highest bidding price is greater than the cost price of the BS request, and the rest of the resources are enough, then, the terminal who give the highest bidder obtain the resources, and the bidding price is the second highest price. On the contrary, there is nobody to obtain the resources and the next round of bidding will carry out until the resources is zero or all the terminals obtain the request resources.

5 Subcarrier and power allocation

The optimization problem of the joint allocation of subcarrier and power can be mathematically formulated as

P IT :

$$\begin{array}{*{20}l} &\max\limits_{f_{{ik}},c_{{ijn}},p_{{ijn}}}U_{{IT}}\\ &\begin{array}{lr} s.t\qquad C, D, E. \notag \end{array} \end{array} $$
(11)

It is obvious that for a given cijn and pijn, PIT is a concave function of fik, correspond to the constraints E the optimal solution of fik can be obtained as

$$ f_{{ik}}^{\ast}=\frac{D_{i} r_{{ij}}}{dl_{i} t_{{ik}}^{exe}r_{{ij}}-S_{i}}. $$
(12)

After the calculation of resources allocation, the problem of PIT can be transformed into:

P IT1 :

$$\begin{array}{*{20}l} &\min\limits_{c_{{ijn}},p_{{ijn}}}\quad U\left(c_{{ijn}},p_{{ijn}}\right)=\sum_{i=1}^{I}{U_{i}\left(c_{{ijn}},p_{{ijn}}\right)} &\\ &\quad =\sum_{i=1}^{I}{\left(\frac{\alpha S_{i}}{r_{{ij}}\left(c_{{ijn}},p_{{ijn}}\right)}+\sum_{n=1}^{N} \frac{\beta c_{{ijn}}p_{{ijn}} S_{i}}{r_{{ij}}\left(c_{{ijn}},p_{{ijn}}\right)}+\theta\right)}&\notag\\ &\quad =\sum_{i=1}^{I}\frac{\alpha S_{i} + \sum_{n=1}^{N}\beta c_{{ijn}}p_{{ijn}} S_{i}}{r_{{ij}}\left(c_{{ijn}},p_{{ijn}}\right)}+\theta&\notag\\ &\begin{array}{rrll} s.t\qquad C, D. \notag \end{array} \end{array} $$
(13)

Where \(\theta =\frac {\alpha D_{i}}{f_{{ik}}}-\frac {\alpha D_{i}}{f_{i}}-\beta u_{i} D_{i}\) is constant. \(\alpha S_{i} + \sum _{n=1}^{N}\beta c_{{ijn}}p_{{ijn}} S_{i}\) is a convex function of cijn and rij(cijn,pijn) is a concave function of cijn. Thus, PIT1 is a convex function of cijn. Nevertheless, the problem PIT1 is mixed-integer nonlinear programming and NP hard. To solve this problem, decompose it into two dependent sub-problems, subcarrier and power allocation problem.

Subcarrier allocation

For given pijn, relax the integer constraint of cijn{0,1} into 0<cijn<1 [21]. With relaxing cijn the problem can be rewritten into

P IT2 :

$$\begin{array}{*{20}l} &\min\limits_{c_{{ijn}}}\quad U\left(c_{{ijn}}\right)=\sum_{i=1}^{I}\gamma_{i} &\\ &\begin{array}{rrll} s.t &\qquad U_{i}\left(c_{{ijn}}\right)\leq \gamma_{i} &\qquad\forall i\in I,\forall j\in J, \forall n\in N \notag\\ &\qquad \sum_{i=1}^{I} c_{{ijn}}\leq 1, 0< c_{{ijn}}<1 &\qquad\forall i\in I,\forall j\in J, \forall n\in N. \notag \end{array} \end{array} $$
(14)

Define \(h\left (c_{{ijn}}\right)=\alpha S_{i} + \sum _{n=1}^{N}\beta c_{{ijn}}p_{{ijn}} S_{i}\). Then Ui(cijn)≤γi is equivalent to hi(cijn)−γirij≤0, with [22], the Lagrangian of PIT2 is

$$\begin{array}{*{20}l} &L\left(c_{{ijn}},\gamma_{i},\mu_{i},\lambda_{n},\xi_{{in}}\right)\notag = \sum_{i=1}^{I}\gamma_{i}+\sum_{i=1}^{I} \mu_{i}\left(h_{i}\left(c_{{ijn}}\right)-\gamma_{i} r_{{ij}}\left(c_{{ijn}}\right)\right)+\notag\\ &\sum_{n=1}^{N} \lambda_{n}\left(\sum_{i=1}^{I} c_{{ijn}}-1\right)-\sum_{i=1}^{I}\sum_{n=1}^{N} \xi_{{in}}c_{{ijn}}. \end{array} $$
(15)

Then, according to the Karush-Kuhn-Tucker (KKT) conditions, there have

$$ \frac{\partial L}{\partial c_{{ijn}}}=\mu_{i}\beta p_{{ijn}}S_{i}-\mu_{i}\gamma_{i} r_{{ijn}}+\lambda_{n}-\xi_{{in}}=0. $$
(16)
$$ \frac{\partial L}{\partial \gamma_{i}}=1-\mu_{i} r_{{ij}}=0. $$
(17)
$$ \mu_{i}\frac{\partial L}{\partial \mu_{i}}=\mu_{i}\left(h_{i}\left(c_{{ijn}}\right)-\gamma_{i} r_{{ij}}\right)=0,\mu_{i}\geq 0. $$
(18)
$$ \lambda_{n}\frac{\partial L}{\partial \lambda_{n}}=\lambda_{n}\left(\sum_{i=1}^{I} c_{{ijn}}-1\right)=0,\lambda_{n}\geq 0. $$
(19)
$$ \xi_{{in}}\frac{\partial L}{\partial \xi_{{in}}}=\xi_{{in}}\left(-c_{{ijn}}\right)=0,\xi_{{in}}\geq 0. $$
(20)
$$ \mu_{i},\gamma_{i},\xi_{{in}},\lambda_{n}\ne\{0,0,0,0\}. $$
(21)

According to condition (17), μi can be calculated as

$$ \mu_{i}=\frac{1}{r_{{ij}}}. $$
(22)

From condition (18) and (22), γi is

$$ \gamma_{i}=\frac{h_{i}\left(c_{{ijn}}\right)}{r_{{ij}}}. $$
(23)

Substituting (22)(23) into (16), there has

$$ \frac{\alpha S_{i} r_{{ijn}}}{r_{{ij}}}-\lambda_{n}+\xi_{{in}}=0. $$
(24)

According to KKT condition, if ξin=0, then cijn>0. If ξin>0, then cijn=0. The KKT condition λn can be concluded as

$$ \lambda_{n}=\frac{\alpha S_{i} r_{{ijn}}}{r_{{ij}}^{2}}. $$
(25)

In order to solve the problem, the Lagrange multipliers λn should be maximum, therefore

$$ i = \arg \limits \limits_{i} \max \frac{\alpha S_{i} r_{{ijn}}}{r_{{ij}}^{2}} = \arg \limits \limits_{i} \max r_{{ijn}}. $$
(26)

The detailed procedure is given in Algorithm 2. For all intelligent terminals iI, the successful allocated intelligent terminal set is IacI, The set Mi={m1,m2,...,mI} is the number of the requested subcarrier of the intelligent terminal i and \(M_{i}^{ac}\subseteq M_{i}\) is the allocated subcarrier. The total number of channels is N. The total number of successful allocated channel set of the intelligent terminal i is \(N_{i}^{ac}\subseteq N\). Cijn is the channel capacity set of intelligent terminal i and BS j and is a two-dimensional array with rows represent intelligent terminals and columns represent channels, which is defined as

$$C_{{ijn}}=\left\{c_{i_{1}jn_{1}},c_{i_{1}jn_{2}},...,c_{i_{1}jn_{N}};c_{i_{2}jn_{1}},c_{i_{2}jn_{2}},...,c_{i_{2}jn_{N}};...;c_{i_{I}jn_{1}},c_{i_{I}jn_{2}},...,c_{i_{I}jn_{N}}\right\} $$

The mapping of Cijn,Iac and \(N_{i}^{ac}\) is defined as \(\sigma :\left \{i,n:c_{{ijn}}\in C_{{ijn}}\right \}\rightarrow \left \{i:i\in I^{ac}\right \}\rightarrow \left \{n:n\in N_{i}^{ac}\right \}\). First, select the maximum subcarrier capacity in Cijn. If the terminal i with the largest subcarrier capacity has not been allocated enough channels, allocate the channel to teminal i, otherwise all the subcarrier capacity in Cijn associated with terminal i will be removed from Cijn until all the terminals have been allocated enough channels or all the subcarriers have been allocated.

Power allocation

After subcarrier allocation, the constraints of each intelligent terminal is independent. Therefore, the optimization problem can be decomposed into I sub-problems. Each sub-problem optimizes one intelligent terminal power allocation to minimize intelligent terminals, own delay. In this paper, for each intelligent terminal, power allocation is solved via water-filling. Then the power allocation optimization problem of the intelligent terminal i can be mathematically formulated as

$$\begin{array}{*{20}l} &\max\limits_{p_{{ijn}}}\quad r_{{ij}}=\sum\limits_{n\in N_{{ij}}}W\log_{2}{\left(1+\frac{p_{{ijn}}|h_{{ijn}}|^{2}}{\sigma^{2}}\right)} &\\ &\begin{array}{rrll} s.t &\qquad \sum\limits_{n\in N_{{ij}}}p_{{ijn}}\leq P_{i} \notag\\ &\qquad p_{{ijn}}\geq 0, n\in N_{{ij}}. \notag \end{array} \end{array} $$
(27)

Obviously, the problem is convex optimization and the Lagrange multiplier method can be employed to solve the problem, such as

$$ L\left(p_{{ijn}},\lambda\right)=\sum\limits_{n\in N_{{ij}}}W\log_{2}{\left(1+\frac{p_{{ijn}}|h_{{ijn}}|^{2}}{\sigma^{2}}\right)}-\lambda \left(\sum\limits_{n\in N_{{ij}}}p_{{ijn}}-P_{i}\right). $$
(28)

According to the KKT conditions, the optimal solution \(p_{{ijn}}^{\ast }\) can be calculated as

$$ p_{{ijn}}^{\ast}=\left(\frac{1}{\lambda}-\frac{\sigma^{2}}{|h_{{ijn}}|^{2}}\right)^{+}. $$
(29)

()+means a positive value.

5.1 Resources Allocation of Computation and Storage

The intelligent terminal i requests MEC resources from the adjacent RPS via the BS. The RPS receives and broadcasts the application in the blockchain platform using the smart contract. Each RPS who receives the smart contract will deal with the corresponding application according to the optimization problem as follow

P MEC

$$\begin{array}{*{20}l} &\max \limits_{m_{{ik}},v_{{ik}}^{F},v_{{ik}}^{S}} U_{{MEC}}\\ &\begin{array}{rrll} s.t &\qquad F,G,H,I. \notag \end{array} \end{array} $$
(30)

Intelligent terminals will require MEC resources from all the edge clouds or clouds in the blockchain platform. However, the access network latency, overhead, etc. will be different due to the different locations of the access network and the edge clouds. Therefore, this paper proposes an improved greedy algorithm, which divides intelligent terminals into three priorities according to the location of the access network to the edge clouds. Set the intelligent terminals in the LAN as level 1, in the MAN as level 2, and level 3 in the WAN (the same intelligent terminal has a different priority in different edge clouds). The resources will be allocated to intelligent terminals with higher priority firstly.

As shown in Algorithm 3, an improved sealed second-price auction is selected. The intelligent terminal who has the highest bid price will be the successful bidder. The highest price with both the computation and storage bid price less than the successful bidder’s price will be defined as the transaction price. For all intelligent terminals iI, the winning intelligent terminal set is IkI, set \(B_{i}^{F}\) and \(B_{i}^{S}\) are bidding prices of computation and storage resources, fi and si are the amount of applied resources of computation and storage, the wining transaction price set of computation and storage resources are \(P_{i}^{F}\) and \(P_{i}^{S}\) respectively. For each edge cloud, \(F_{k}^{M}\) and \(S_{k}^{M}\) are the maximum provide resources of computation and storage. \(F_{k}^{ac}\) and \(S_{k}^{ac}\) are the allocated resources of computation and storage, \(cs_{k}^{F}\) and \(cs_{k}^{S}\) are the cost of computation and storage resources. The priority of the intelligent terminal i is defined as πik=1,2,3 πikΠik. First, calculate the average price of computing resources and storage resources Bi. Then, sort all the average bidding prices with different priority \(\pi _{i}^{k}=m\) in descending order. Then, judge the average bidding price successively except the highest one, if the computing resources bidding price and the storage resources bidding price are both greater than the cost price of MEC request, the price of the computing resources and storage resources will be the transaction price. Meanwhile, if the rest of the resources are enough, then, the terminal who give the highest bidder obtain the resources. On the contrary, there is nobody to obtain the resources and the next round of bidding will carry out until the resources is zero or all the terminals obtain the resources.

6 Transaction process based on blockchain

It is can be seen from section III that the resource allocation has been completed. In general, the edge clouds will inform the intelligent terminals’ success in the action to start transaction processing which will run in the consortium blockchain network. The blockchain platform architecture of MEC resources sharing is shown as Fig. 2.

Fig. 2
figure 2

Blockchain platform architecture

The blockchain is composed of RPS, third-party spectrum and computation management, identity authentication institutions, etc. It is running by smart contracts and adopt the Solo ordering service to attain a consensus. And there are four layers in the system such as the application layer, interface layer, blockchain layer, and PHY layer. Where the application layer is the applications that the blockchain platform applied to the intelligent terminals, and the intelligent terminals call the code of the interface layer to access the blockchain database. The blockchain layer takes the charge of member management, transaction management, and contract management. Specifically, the member management mainly focuses on the identity authentication and permission management of resources proposer to ensure the security and credibility of access users, including the registration, authentication, authorization, cryptography and mathematical signature, etc. Transaction management mainly guarantees the secure and orderly transactions between the two parties of resources allocation and records the transaction data to the global ledger, including the content of block management and consensus mechanism. Furthermore, contract management mainly refers to adding the involved resources request, resource allocation, delivery monitoring, etc. into the network in the form of code and running automatically. Ultimately, the PHY layer consists of edge clouds RPS and clouds RPS.

As evident from above, the transaction information will be written to the global ledger in the blockchain platform. According to the trading characteristics, there are two methods to deal with the transactions: offline and online trading model. For some real-time and high-frequency trading, the offline trading model is selected, otherwise, online. In the following content, the online and offline trading models are described in detail. Finally, a delivery monitoring module is designed to detect the nodes which are unable to provide service due to attack or other reason.

6.1 Online trading model

The online transaction model process is shown in Fig. 3. The seller uses a different account for each transaction to protect the privacy and sends the intelligent terminals’ account to the buyer. Then, the buyer creates a transaction via RPS, and eventually sends the transaction to the blockchain platform. The blockchain platform will verify the transaction and write the legal transaction into the global ledger. Once the corresponding transaction is recorded in the global ledger the payment is completed. The buyer will receive information about the complement of writing the global ledger from the blockchain. Then, the buyer sends the transaction ID to the seller. If the transaction with the accurate account and amount is notarized by the seller, the seller will begin to provide services [23].

Fig. 3
figure 3

System transaction process

In the proposed payment mechanism, the payment execution is actually the process of writing transactions into the global ledger as shown in Fig. 4 based on Hyperledger Fabric 1.0. The buyer creates and sends transactions to the SDK (Software Development Kit). Then, the transactions will be sent to the endorser to execute and the output will be recorded in the response. Once, the SDK has collected enough correct responses of the proposal, the transactions will be submitted to the order peer. The order peer uses a pluggable consensus protocol to produce a totally ordered sequence of endorsed transactions in blocks and broadcasts the blocks to the committer peer. The committer peer will write the block to the global ledger and inform all other peers to synchronize the new block.

Fig. 4
figure 4

Process of writing transaction into the global ledger

6.2 Offline trading model

In this paper, the offline payment mechanism is designed using the lightning network. The idea of the lightning network is the establishment of the trading management system using smart contracts, but it does not belong to the blockchain system [24]. Both counterparts in the executive system will store and manage the deposit until they want to close the account. The offline payment process is shown in Fig. 5.

Fig. 5
figure 5

The offline payment process

The buyer and seller create a ledger entry (bidirectional payment channels) in the blockchain, which requires both participants to sign off on any spending of funds. Both participants pre-deposit a certain amount of money in the ledger entry. If a transaction comes up, the buyer creates a transaction to reallocate the money in the ledger entry and sends the transaction to the seller with the signature itself without broadcasting them to the blockchain. In the same way, the seller who receives the transaction sends the corresponding reallocated transaction to the buyer with the signature of the seller and does not broadcast the transaction to the blockchain too. Then, the seller will provide services to the buyer. They can update their reallocated transactions in the ledger entry when another payment occurs. This entry can be closed out by broadcasting the most recent version transaction to the blockchain at any time by either party without any trust.

6.3 Delivery monitoring module

The authentication mechanism of blockchain ensures that the intelligent terminals joining the blockchain platform are reliable. However, when some nodes are attacked and cannot provide services normally, a detection mechanism is needed to find the wicked nodes and inform other nodes in the blockchain. Then, the node should be removed from the blockchain system. If the node wants to rejoin the system, it needs to apply for authentication again. The process of the resource delivery detection mechanism is shown in Fig. 6.

Fig. 6
figure 6

The mechanism of resources delivery detection

If both actors (intelligent terminals and edge clouds) have completed their task, they will send a proof of activity to the delivery monitoring blockchain. For example, the delivery monitoring blockchain will receive three proofs in one transaction. First, the intelligent terminals will publish a proof of payment completion, when the payment is accomplished. In a similar way, proof of the service completion will be published, when intelligent terminals receive the processing results of the applied task. Meanwhile, the edge clouds will publish a proof of data processing completion to the delivery monitoring blockchain also. Once all the proofs are collected, the transaction will be closed. If the contract detects that any party has not fulfilled its duty, the node will be removed.

7 Result and discussion

In this section, numerical results are presented to validate the properties of the proposed algorithm which is analyzed in sections III and IV compared with the dynamic pricing based double auction(DPDA) algorithm [4]. Randomly generate 3 BSs with 512 subcarrier which is sufficient for the user to access the network, 100 intelligent terminals, 10 edge clouds in application area with dimensions of 500500m2, employ Hyperledger fabric 1.0 blockchain platform, and adopt the Solo ordering service to attain a consensus with 2MB block size to implement the payment mechanism. There are ten peers, one order peer, and a CA (Certificate Authority) in the environment as shown in Fig. 7. The peer represents the cloud and the order peer uses a Solo consensus protocol to produce a totally ordered sequence of endorsed transactions in blocks and broadcasts the blocks to the other peer. The Simulation environment parameter is shown in Table 1.

Fig. 7
figure 7

The building environment of blockchain

Table 1 Simulation environment papameters

In addition, the performance of the proposed algorithm is evaluated in terms of the successfully allocated number of intelligent terminals and the resource utilization rate in one auction compared with DPDA which is dynamic pricing based on the double auction. Figure 8 compares the number of successfully allocated intelligent terminals in one auction with 10 edge clouds and 100 intelligent terminals. The number of intelligent terminals allocated successfully in one auction using the proposed algorithm is much higher than that using the DPDA algorithm. Because the resources of intelligent terminals applied aren’t enough locally. In the proposed algorithm, intelligent terminals can apply for resources from all other edge clouds instead of applying for resources from a few of edge clouds. Hence, the successful number of allocated intelligent terminals using the proposed algorithm is significantly higher than using DPDA.

Fig. 8
figure 8

The number of intelligent terminals successfully allocated in one auction

Figure 9 compares the resources utilization rate using the proposed algorithm and DPDA with 100 intelligent terminals and 10 edge clouds. Figure 9 illustrates that the resource utilization rate using the proposed algorithm is much higher than using DPDA under the condition of lacking resources locally. Both Figs. 8 and 9 illustrate that the resources are fully shared and the utilization rate of the resources is effectively improved in the resources shortage scenario.

Fig. 9
figure 9

The resources utilization rate in one auction

To verify the individually rational of the proposed algorithm in Definition 3.1, Fig. 10a compares the bid and transaction prices of winning buyers, and Fig. 10b shows the transaction prices and costs of winning sellers under the constraint of 10 edge clouds and 10 intelligent terminals. Clearly, each winning buyer receives a transaction price less than its bid and each winning seller receives a transaction price higher than its cost. Therefore, the proposed algorithm is individually rational.

Fig. 10
figure 10

Individually rationale of the proposed algorithm

8 Conclusion

In this paper, we propose a sharing model of computation and storage resources among edge clouds based on blockchain and auction game. Instead of having to apply for resources from the cloud when local edge clouds cannot meet the demand of intelligent terminals, the intelligent terminals will apply for resources from all the edge clouds participate in the blockchain platform. Therefore, the resources among the edge clouds are efficient sharing, and the resource utilization rate can be significantly increased. In the follow-up work, depth research on resource sharing of the edge cloud will be researched combining with the benefit of intelligent terminals and edge clouds using the transaction information stored in the blockchain.

Availability of data and materials

All data generated or analyzed during this study are included in this published article.

Declarations

Abbreviations

IoT:

Internet of Things

MEC:

Mobile Edge Computing

OFDMA:

Orthogonal Frequency Division Multiplexing Access

ICAM:

Incentive-Compatible Auction Mechanism

RPS:

Resources Proxy Server

BS:

Base Station

SDK:

Software Development Kit

CA:

Certificate Authority

References

  1. S. Wu, W. Xia, W. Cui, Q. Chao, Z. Lan, F. Yan, L. Shen, in International Conference on Wireless Communications and Signal Processing (WCSP). An efficient offloading algorithm based on support vector machine for mobile edge computing in vehicular networks (Hangzhou, China, 2018).

  2. X. Zhang, Y. Mao, J. Zhang, K. B. Letaief, in IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Multi-objective resource allocation for mobile edge computing systems, (2017).

  3. A. -L. Jin, W. Song, W. Zhuang, Auction-based resources allocation for sharing edge clouds in mobile cloud computing. IEEE Trans. Emerg. Topics Comput.6(1), 45–57 (2015). https://doi.org/10.1109/TII.2018.2855746.

    Article  Google Scholar 

  4. W. Sun, J. Liu, Y. Yue, H. Zhang, Double auction-based resources allocation for mobile edge computing in industrial internet of things. IEEE Trans. Ind. Inform.14(10), 4692–4701 (2018). https://doi.org/10.1109/TII.2018.2855746.

    Article  Google Scholar 

  5. T. Li, Y. Liu, Y. Tian, S. Shen, W. Mao, in 2012 IEEE International Conference on Green Computing and Communications (GreenCom). A storage solution for massive iot data based on nosql (Besancon, France, 2012).

  6. K. Kotobi, S. G Bilen, A decentralized database in moving cognitive radio networks enhances security and user access. IEEE Veh. Technol. Mag.13(1), 32–39 (2018). https://doi.org/10.1109/MVT.2017.2740458.

    Article  Google Scholar 

  7. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, M. Guizani, Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access. 5:, 14757–14767 (2017). https://doi.org/10.1109/MVT.2017.2740458.

    Article  Google Scholar 

  8. G. Kim, J. Park, J. Ryou, in IEEE International Conference on Big Data and Smart Computing. A study on utilization of blockchain for electricity trading in microgrid (Shanghai, China).

  9. J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, E. Hossain, Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Trans. Ind. Inform.13(6), 3154–3164 (2017). https://doi.org/10.1109/MVT.2017.2740458.

    Article  Google Scholar 

  10. K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the internet of things. IEEE Access. 4:, 2292–2303 (2016). https://doi.org/0.1109/ACCESS.2016.2566339.

    Article  Google Scholar 

  11. C. P. Van Thanh Le, N. E. Ioini, in 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). Blockchain based service continuity in mobile edge computing(Granada, Spain, 2019).

  12. N. Zhao, H. Wu, Y. Chen, Coalition game-based computation resource allocation for wireless blockchain networks. IEEE Internet Things J.6:, 8507–8518 (2019).

    Article  Google Scholar 

  13. M. Mehrabi, D. You, V. Latzko, H. Salah, M. Reisslein, F. H. P. Fitzek, Device-enhanced MEC: Multi-access edge computing (MEC) aided by end device computation and caching: A survey. IEEE Access. 7:, 166079–166108 (2019). https://doi.org/10.1109/ACCESS.2019.2953172.

    Article  Google Scholar 

  14. Y. Li, J. Wu, L. Chen, in 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). POEM+: Pricing longer for mobile blockchain computation offloading with edge computing (Zhangjiajie, China, 2019).

  15. S. Seng, X. Li, C. Luo, H. Ji, H. Zhang, in 2019 IEEE International Conference on Communications (ICC). A D2D-assisted MEC computation offloading in the blockchain-based framework for UDNs (Shanghai, China, 2019).

  16. Y. Zhu, in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). A survey on mobile edge platform with blockchain (Chengdu, China, 2019).

  17. H. Liao, Y. Mu, Z. Zhou, M. Sun, Z. Wang, C. Pan, Blockchain and learning-based secure and intelligent task offloading for vehicular fog computing. IEEE Trans. Intell. Transp. Syst.3:, 1–13 (2020).

    Article  Google Scholar 

  18. X. Lyu, H. Tian, C. Sengul, P. Zhang, Multiuser joint task offloading and resource optimization in proximate clouds. IEEE Trans. Veh. Technol.66(4), 1–1 (2017).

    Article  Google Scholar 

  19. X. Chen, Decentralized computation offloading game for mobile cloud computing. IEEE Trans. Parallel Distrib. Syst.26(4), 974–983 (2014).

    Article  Google Scholar 

  20. Y. Zhang, C. Lee, D. Niyato, P. Wang, Auction approaches for resource allocation in wireless systems: A survey. IEEE Commun. Surv. Tutor.15(3), 1020–1041 (2013).

    Article  Google Scholar 

  21. C. Li, F. Sun, J. M Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst.61(7), 531–535 (2014).

    Google Scholar 

  22. Y. -C. Jong, An efficient global optimization algorithm for nonlinear sum-of-ratios problem. Online. Available: http://www.optimization-online.org/DBFILE/2012/08/3586.pdf. Accessed 2012.

  23. X. Huang, C. Xu, P. Wang, et al., LNSC: A Security Model for Electric Vehicle and Charging Pile Management based on Blockchain Ecosystem. IEEE Access, 1–1 (2018). https://doi.org/10.1109/ACCESS.2018.2812176.

  24. F. Gao, L. Zhu, M. Shen, K. Sharif, Z. Wan, K. Ren, A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network. 32(6), 184–192 (2018). https://doi.org/10.1109/mnet.2018.1700269.

    Article  Google Scholar 

Download references

Acknowledgements

Not applicable.

Funding

This work was supported by Natural Science Foundation of China (61871237,920671010), Nature Science Foundation of Jiangsu Graduate Engineering Innovation under Grant KYCX20 0716 and Nanjing Xiao zhuang University under Grant 2019NXY43 University Natural Science Foundation of Jiangsu Province under Grant 20KJD510009.

Author information

Authors and Affiliations

Authors

Contributions

Authors’ contributions

Methodology: Xiuxian zhang Validation: Xiuxian zhang and Xiaorong Zhu Formal analysis: Xiaorong Zhu and Xiuxian Zhang Investigation: M.A.M.Chikuvanyanga and Meij Writing–original draft preparation: Xiuxian zhang and M.A.M.Chikuvanyanga The authors read and approved the final manuscript.

Authors’ information

Zhang Xiuxian. received the M.S. degree from the Chongqing University of Posts and Telecommunications, Chongqing, China, in 2008. She is currently working in Nanjing Xiao Zhuang University and pursuing the Ph.D. degree in Communication and Information System with the Nanjing University of Posts and Telecommunications. Her research interests include wireless networks, wireless access technology, as well as Internet of Things.

Zhu Xiaorong. received her Ph.D. degree in wireless communications in 2008 from Southeast University, Nanjing, China. She was a post-doctor in The Chinese University of Hong Kong in 2008 and 2009. Now she is a professor of Nanjing University of Posts and Telecommunications. Her research interests include wireless networks, wireless access technology, as well as Internet of Things.

Chikuvanyanga Munyaradzi Alexander Majanga. received the B.S. degree in Computer Science from the Shenyang Aerospace University, Shenyang, China, in 2016. He is currently pursuing the M.S. degree in Information and Communication Engineering with the Nanjing University of Posts and Telecommunications (NJUPT), Nanjing, China. His research interests include network troubleshooting, network diagnosis and artificial intelligence. He received the First-Class Scholarship from NJUPT.

Chen Meijuan. is currently an associate professor of Nanjing University of Posts and Telecommunications, Nanjing, China. She received the Ph.D.degree in Communication and Information systems from Nanjing University of Posts and Telecommunications of China in 2016. Her research interests are in the general area of wireless networking and mobile communication, in particular focusing on SDN/NFV network resource optimization based on machine learning and date sharing mechanism based on Blockchain.

Corresponding author

Correspondence to Xiaorong Zhu.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Zhu, X., Chikuvanyanga, M. et al. Resource sharing of mobile edge computing networks based on auction game and blockchain. EURASIP J. Adv. Signal Process. 2021, 26 (2021). https://doi.org/10.1186/s13634-021-00735-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-021-00735-5

Keywords