key: cord-0948218-lsk0rlpk authors: nan title: COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services date: 2020-09-24 journal: IEEE Trans Netw Sci Eng DOI: 10.1109/tnse.2020.3026637 sha: f2f53e7cbc2fff72a8a514b2674e561b1fc85df9 doc_id: 948218 cord_uid: lsk0rlpk Network and cloud service providers are facing an unprecedented challenge to meet the demand of end-users during the COVID-19 pandemic. Currently, billions of people around the world are ordered to stay at home and use remote connection technologies to prevent the spread of the disease. The COVID-19 crisis brought a new reality to network service providers that will eventually accelerate the deployment of edge computing resources to attract the massive influx of users’ traffic. The user can elect to procure its resource needs from any edge computing provider based on a variety of attributes such as price and quality. The main challenge for the user is how to choose between the price and multiple quality of service deals when such offerings are changing continually. This problem falls under multi-attribute decision-making. This paper investigates and proposes a novel auction mechanism by which network service brokers would be able to automate the selection of edge computing offers to support their end-users. We also propose a multi-attribute decision-making model that allows the broker to maximize its utility when several bids from edge-network providers are present. The evaluation and experimentation show the practicality and robustness of the proposed model. underlying network infrastructure is not designed for this type of real-time stress that the global COVID-19 crisis has caused [2] . One solution is to include edge network computing to speed-up online services by allocating physical resource functionalities in proximity to the user [3] , [4] . Edge computing [5] , [6] allows network service providers to provision resources ondemand, hence avoiding over and under-provisioning, which are standard practices for networks with varying requirements due to traffic variations (e.g., on-peak and off-peak). According to a pre-COVID-19 report by IBM [7] , 75% of enterprise data is going to be processed using edge computing resources by 2025 compared to only 10% today. However, the COVID-19 crisis brought a new reality to network service providers that will eventually accelerate the deployment of edge computing resources and open new avenues of competition to accommodate the massive influx of users' traffic. On the other hand, the user (person, organization, broker, middle-ware, etc.) can elect to procure its resource needs from any edge computing provider based on a variety of attributes such as price and quality. The main challenge for the user is how to choose among the price and quality of different service providers when such offerings are changing continually. This issue is notably not a trivial prospect given the significance and varying multitude of edge computing service providers; it is not practical to optimize for the most suitable vendor manually. In the context of the challenge mentioned above, this paper aims at investigating scalable and automated mechanisms for users to acquire the needed resource services from edge computing providers. It must be noted that, currently, standardization of edge computing services is not fully realized. Still, the providers need to address operational efficiency, security, and redundancy to monetize their offering. This effort is essential in the wake of COVID-19 pandemic because the status quo pricing strategies (e.g., pay as you go service or fixed fees) do not resonate well with users who are hungry for computing resources to meet their daily demand. Users need incentive mechanisms to adapt their consumption patterns according to the price and quality of available resources. In this paper, we propose multi-attribute bidding strategies for users to bind with an edge computing resource for application needs. The proposed bidding model allows users to control their data, lower costs, receive quicker responses, and sustain their operations. The study of multi-attribute bidding for network resource acquisition is an exciting and yet unexplored area in edge computing. The main contributions this paper is making are: Proposing an auction model for the increased network connection demand and edge computing resources by users during the COVID-19 pandemic. The brokerbased auction model allows users to automatically procure resources and incorporate price and QoS attribute rating to determine the best allocation of on-demand networking traffic. The significance of this model lies in the assessment and scoring functions that rank potential vendors to achieve maximum utility. Proposing a two-stage winner determination problem and payment allocation based on a scoring function, which provides an incentive to the providers to bid using their real valuation of price and quality attribute ratings. In the first stage, the mechanism uses the bids to qualify providers based on the broker's reservation quality and determines the cost value of various attributes. In the second stage, the broker shares the maximum score and allows the providers to increase their bids. The significance of the two-stage model is that it deters edge network service providers from deliberately submitting bids with lower quality, but instead encourages them to submit bids that meet the expectation of the broker. Furthermore, we prove that the proposed model is incentive compatible, individually rational, and computationally efficient. Evaluating the proposed model with extensive simulation experiments and realistic data such as those provided by Google and Amazon. We showed that the proposed solution satisfies the properties of the twostage auction model, which makes it applicable for implementation in situations when the abnormal demand for edge computing services is present such as the case with the current COVID-19 pandemic. The rest of the paper is organized as follows: In the next section, the related work presents the latest state-of-the-art research in the field, accompanied by a discussion of shortcoming. Section IV provides a detail description of the model and the theoretical formulation of the problem followed by an analysis of the mechanism design in section V. In section VI, the proposed model is evaluated with a series of experiments and discussions. Finally, in section VII, the paper is concluded with direction to future work. The COVID-19 pandemic shows that current networking infrastructure is not ready to deal with unprecedented prolonged demand for resources. Consequently, the pricing and resource allocation models that are currently used need to be revised as well to provide flexibility beyond conventional schemes. In this section, we review some studies in the open literature related to edge computing resources allocation, bidding models, and mechanism design. The aim is to shed light on current research shortcomings and provide a comparative analysis to distinguish our work. Existing edge computing resource providers set the cost without consultation with the users. The pricing models are mainly based on the take it or leave it scheme, which is not necessarily optimal for both parties. Furthermore, the promised QoS attributes are not contractually obligated. In other words, it is difficult for the user to chase the provider to inquire about the delivered QoS. Therefore, several studies investigated the possibility of designing models that induce the providers to be truthful about their offerings. For example, the work presented in [8] proposes an auction model that allows users to place a bid to acquire the desired qualities. The authors proposed a two-level model where heterogeneous users compete for limited capacity. The main idea is that the model considers combinatorial auction, where users in different locations bid against each other. While helpful, the model does not consider the various qualities and ranking of these bids. The work in [9] provides a comparison of the different types of pricing structures concerning fairness; specifically, the study comments on the dynamic pricing models and their applicability to edge computing resource allocations. Similar to [9] , the works in [10] , [13] and [16] propose pricing mechanisms for edge computing resources [15] in highly dynamic environments. For example, [10] allowed the users to borrow credit using a double-auction model to maximize the economic benefit while [13] investigated the joint problem of network economics and resource allocation of users who are bidding for edge services. In [16] , the authors focused on entertainment applications where users compete for higher quality concerning bandwidth and latency. They propose micro and macro auctions to accommodate various bidding schemes depending on the scale of the applications. Other works such as those in [17] and [18] propose auction models for resource allocation using edge computing services, but do not consider multi-attribute decision-making. The previously discussed models do not consider the various quality attributes of the edge computing provider [14] , but instead focus on the pricing and resource allocation problems. Reverse auction models were also considered in the literature where network service providers compete to attract users to purchase their services in highly dynamic environments. To this end, the work presented in [19] proposed a model by which network operators compete to provision the user requirements while minimizing the cost. The proposed model uses a reverse auction to achieve the desired resource allocation. In [20] , the authors discussed a centralized strategy to induce third parties to lease unused bandwidth and storage in wireless access [11] , [12] points using reverse auction models. The goal is to allow users to autonomously decide which access point they desire to use based on a set of criteria. A different model was proposed in [21] , which uses an evolutionary immune mechanism to allocate resources based on market efficiency, user satisfaction, and QoS. To prevent the bidders from cheating, it implements a punishment scheme [22] to correct malicious behavior. The claimed results show that the system has the potential for better allocation of network resources in a real-world implementation. It also indicates that the model can be extended to various attributes related to user satisfaction, such as privacy. Although it is not explicitly considered but can be easily included in the negotiation process, as shown in [28] and [29] . The closest to our work are the studies in [23] , [24] , and [8] . In [23] and [24] , the authors developed three mechanisms based on the work of [26] . Two mechanisms consider multi-attribute auctions, where one of them studies the dominant strategic incentive-compatible scheme while the other investigates Bayesian incentive compatible. The authors show that the former mechanism provides individual rationality and allocation efficiency but not budget balanced while the latter is efficient, budget balanced but not individually rational. Also, the study proposed an optimal model where a user can decide on the preferred service provider based on price and the offered quality. In comparison to our work, we consider multi-attribute bidding, but we sacrifice budget balanced for the sake of efficiency, truthfulness, and individual rationality. The reason for this is that we did not consider an auctioneer to manage the bidding process, and payment allocation is transferred from the broker to the provider. To achieve truthfulness and to encourage the providers to bid with satisfactory quality, we implemented a two-stage approach in which only providers who meet the reserved quality of the broker are considered for final bidding. In the second stage, we followed the work in [8] and used the bid density as a factor on the scoring function. By doing so, we ensured that the providers are all treated fairly, and whoever makes the best offer wins. Thus, the difference between our work and [8] is that we do not consider satisfaction as a factor in the bidding process; instead, we implement a passing gate for providers to meet the desired quality of the broker. Table I provides a summary of the comparison between our work and existing studies. Next section provides the details of the proposed model, including the parameters and utility functions of the involved parties. Before discussing the proposed model, we introduce necessary information on auctions and bidding mechanisms. Auctions are a direct application of mechanism design, which is a framework concerned with decision-making problems related to resource distribution and payment allocation of scarce resources. The main properties of mechanism design include truthfulness, individual rationality, efficiency, and budget balance. A mechanism is said to be truthful if the players have no incentive to bid values that do not represent their real types and valuation. Individual rationality means that players' outcome is non-negative. Efficient mechanism design is tractable with polynomial time complexity. Fairness ensures that the design allows all the players to have equal opportunities to participate in the auction. As mentioned earlier in section I, we a mechanism design for multi-attribute bidding, which allows the distribution of edge network resources among competing players. Next, we describe the overall model, and in section IV, the details of the mechanism design model are introduced. Fig 1 presents the high-level model of the proposed system and the sequence diagram of interaction among the parties during the bidding process. In this model, a broker working on behalf of users would like to procure resources from edge computing service providers. The broker informs all the providers about the resources necessary through, for example, a dedicated communication channel allocated for information sharing [27] . The providers reply with their bids, which include the price and an arbitrary number of quality attributes about the service. We consider a broker in our model because it is not possible for a user to negotiate directly with a service provider. Also, when a broker is working on behalf of multiple users would be able to negotiate for a better offer that benefits everybody. By doing so, we are following a common market negotiation approach, which is far better for the user than going alone against a service provider. In this model, the broker's contract will be awarded to one winner only, i.e., we are considering an indivisible good. The broker in our model starts the auctioning process and needs to make a decision given the number of submitted bids. The providers who participate in the auction are determined to fulfill the configuration of the edge computing resources and specify that in the offers. Each quality attribute has a fixed coefficient, and the dimensions are identical for all the providers. We assume that the broker has preference over the attributes, and hence, the utility of each quality attribute is independent. For example, the broker may value bandwidth over latency in the network or vice versa, depending on the requirement of the users. The broker selects the provider who maximizes its utility based on some reservation price and quality parameters. We assume that the reservation price, e.g., b r , of the broker, is private information and not shared with the providers at any stage of the auctioning process. The broker uses a scoring function of the quality attributes to evaluate the submitted bids and select the winner in the auctioning process. The scoring function is shared with all providers who use it to construct the bids that maximize their payoff. In this model, we assume that the providers are rational and have common knowledge about the auctioning process. Furthermore, the cost of allocating resources to users is private information. All providers are considered rational and strive to maximize their utility. The notations used throughout the paper are shown in Table II . Formally, we consider that there are P ¼ fP i ji ¼ 1; :::; ng providers of edge computing resources capable of delivering the required QoS attributes Q ¼ fQ k jk ¼ 1; :::; mg. Let L ¼ f ik ji ¼ 1; :::; n; k ¼ 1; :::; mg to be the set of performance ratings of provider i 2 P for quality attribute category k 2 Q. For example if quality attribute k ="bandwidth" then a possible performance rating value for provider i would be ik ¼ 200 kbps. Let W ¼ fw k jk ¼ 1; :::; mg to be the set of weights for each quality attribute k. The weights w k are announced by the broker and denote the relative importance of the quality attributes such that P m k¼1 w k ¼ 1. It is also used to evaluate the providers' bids using a scoring rule. In the proposed model, the broker's utility function is the difference of how much the broker values the quality attributes and the price it is going to pay the provider for delivering the service. The general utility function of the broker is given by: where b is the price at which the broker is paying the provider to allocate edge computing resources according to the agreed upon quality attributes. v k ð ik Þ represents the valuation of the broker for each quality attribute. In (1), the valuation that the broker has on a certain quality attribute is derived from the users' requirements. For example, if the user values "bandwidth" more than any other quality attribute it means that the higher the performance rating of "bandwidth" is desirable as long as the utility is U broker ðb; ik Þ ! 0. The provider utility function is the difference between the price b that the broker pay for the service and the cost c i ¼ P m k¼1 g k : ik of offering the quality attributes. In general, the utility function of the provider is given by: The utility function of the provider assumes a single cost parameter g to produce the quality attributes. The following are the assumptions made in the proposed mechanism. Assumption 1: The providers and the broker are risk neutral individuals, the attributes ik are endogenous with continuous values. Furthermore, the providers and the broker are mutually independent with respect to their preferences over the quality attributes. Assumption 2: The providers' cost functions are strictly convex where the effect of ik is considered to be independent and linear, when the quality increases by a unit value, the cost to the provider increases, i.e., @c i @ ik > 0, @ 2 c i @ 2 ik > 0. Furthermore, the utility function of the broker is concave, increasing in quality while the marginal cost is not incremental, i.e., To guide the providers on their offerings of quality attributes, the broker announces its scoring rule S j as follows: In (3), the term P m k¼1 w k : ik is the score function for attribute ratings. A provider i is a winner if S i ¼ S max j ; 1 i n. The calculation of the score function and attribute rating ik for each provider is given in Section III-B. The objective of the providers is to respond with quality attribute parameter ratings that maximize their utility. Therefore, each provider must solve the following optimization problem to obtain the optimal best response parameter rating for each quality attribute. where S max i is the current highest score. The provider might add a small increment to the maximum score only after being qualified for the next stage in order to increase its chances of winning if decided to place a new bid. If we solve (5) for b and then substitute it in the objective function (4), then the final problem has no constraints as follows: Each provider submits a bid à ik ¼ ik that yield a non-negative output, where à ik is the solution to the following firstorder condition @ P m k¼1 w k : ik @ ik À @ P m k¼1 g k : ik @ ik ¼ 0; Notice that the term P m k¼1 w k : ik is the valuation that the broker has on the quality attributes v k ð ik Þ. As in [8] , the announced values of w k may be equal or different from the actual reservation valuation of the broker. For example, if the announced values w k are lower than the reserved valuations it means that the broker assert a lower utility from certain quality attributes. The determination of optimal w k are not considered in this work, but we refer the reader to [30] for more details. As mentioned earlier, the broker receives the performance rating values from the provider for each quality attribute. The open literature provides a wide variety of methods to compare attributes as described in [31] and [32] . In this paper, we use TOPSIS (Technique of Order Preference Similarity to the Ideal Solution) which was originally proposed by [33] to scale and normalize the various quality attributes. TOPSIS is a simple yet powerful method when there are no limits to the number of choices/alternatives and criteria in the decision making process. The information matrix that reports on the quality performance ratings can be formulated as follows: The parameter ik represents provider i's offer for the quality attributes where i ¼ 1; :::; n, and k ¼ 1; :::; m. It must be noted here that the quality attributes might not be expressed in numerical form, for example, "99 % reliability". It is important to assign a proper numerical value for such attributes. The TOPSIS method works only if the values of quality attributes ratings are expressed in integers. Let ik and ik be the maximum and minimum performance rating values of the quality attributes for provider i. Furthermore, the attributes are normally categorized as beneficial and non-beneficial. The former category refers to the broker's preference for higher values of quality performance ratings while the latter category refers to the broker's preference for lower values of quality performance ratings. The first stage of the TOPSIS method is to normalize the information matrix values to a normalized decision matrix of L Norm ¼ ½ Norm ik as follows: In (9), the value of Norm ik is given by For the beneficial quality attributes, Norm and for the non-beneficial quality attributes Norm The mechanism design model is composed of two stages. In the first stage, the broker receives all the bids from the providers, apply the scoring rule, and then determines the qualifying providers group for the next stage based on the reservation quality. In the second stage, the borker announces the payment function, which determines the amount of payment by the broker to the winning provider. There are a few challenges in the proposed scheme: firstly, how to determine which providers are qualified to advance to the next stage and secondly, how to ensure that the payment allocation is incentive compatible, i.e., the providers report their bid truthfully. To address these challenges, we first consider that each provider has private valuation about his bid represented by Bid i ¼ ðc i ; ik Þ and a reported bid represented as d The goal is to design a mechanism that induces providers to reveal the true value about their bids. In other words, the true valuation is a dominant strategy for a provider regardless how other providers report their bids.The pseudo-code for the auction model is presented in Algorithm (1) whereas for all other stages are provided in Algorithms (2) and (3). At the beginning of the auction process, the broker announces the score function for all providers as described in (3). The providers reply with their bids d Bid i ¼ ðb c i ; b ik Þ. The bids that are less than the broker's reservation quality value are determined ineligible and cannot advance to the next stage. The broker determines the reservation quality as follows [34] : where vð b r r Þ is the broker's reservation quality at price b r . b b c i ik is the reported quality attribute performance rating for provider i at cost value b c i . m is a scaling value between [0, 1] determined by the broker. If m ¼ 1, then the reservation value is exactly the average of the submitted bids, and those bids that are below average are eliminated. If m ¼ 0, then the reservation value is zero and all bids are accepted. Elimination of providers using an average bid value is inspired by the work in [34] and also has been studied by [35] . Later in section V, we discuss how such approach leads to truthful biding when presenting the properties of the proposed auction model. Algorithm (2) describes the procedure of the elimination process. Algorithm (3) describes the second stage of the auctioning process. It goes as follows: First, the broker announces the winning group and the maximum score from the first stage. The selected providers submit new bids which may increment the maximum score by a small amount , such that S max i þ . Then, every provider solves the new optimization problem as in (7) to determine the optimal performance rating value of b ik that maximizes the provider's utility. The broker, on the other hand, determines the bid density of all providers and then rank them using an evaluation function x i ¼ # i ðZ i ; S i Þ, where Z i is the bid density and it is calculated as in [25] . The broker sorts the providers' offers in the increasing order using the evaluation function x i such that x 1 x 2 ::: x n . Following [25] , a product fucntion x i ¼ # i ðZ i ; S i Þ ¼ Z i :S i is utilized for ranking. The allocation rule is then determined as follows: S j P m k¼1 w k : ik À b //Broker determines the scaling factor for average quality value to be m 0 ; m m 0 // Collect bids from providers; for each i 2 n do receive bid; After the broker determines the winner provider, a payment function known as Clark's mechanism [36] is used to calculate the amount the provider should receive to allocate the resources. The payment function is given by: Basically, this payment scheme gives the winning provider i the sum of the cost and the difference between the optimal cost without provider i. For example, if j is the winner and l be the winner in the case j in not included, then the payment according to (16) Let us consider the case when a provider g is not a winner. Let the winner be provider d, then the payment for g is as follows b The above payment method shows that the provider that quotes the lowest cost per quality attribute receives the second lowest payment. The other providers receive no payment. Hence, this is a low-bid Vickrey auction [36] . The proposed auction model is evaluated based on a set of properties that describe the characteristics of computational complexity, individual rationality, and truthfulness. Before we dive in the proofs of the properites we shall introduce the following definitions. Definition 1: Single-minded. A cost function C is said to be single-minded if 9 ik L and a cost c, if Cð Proof: Individual rationality means that a participant attains a positive reward if his/her bid wins, or zero if lost. In our model, we assume that individuals are single-minded bidders and only trade if the reward is greater than their reservation cost c i ð ik Þ. Each wining provider i 2 P gets the Vickery payment which is more than their declared cost. Therefore, according to (2) , the payoff to the provider U provider ! 0. The broker, on the other hand, will also attain a utility U broker ! 0. Since all participants receive positive utility if they win, or zero if they lose, then we conclude that our model is individually rational. In sum, our mechanism shows that whenever the provider improves an element of his bid it remains a winner. Hence, the proposed mechanism is monotone. p to provider i is equal to the critical cost. Proof: According to the proposed mechanism, the payment obtained by provider i if declared a winner is b i6 ¼j b c j :h Ài j À P i6 ¼j b c j :h j . Let us assume that provider i bids a value c i < b p i . In this case, it will win the auction according to Lemma 3. On the other hand, if provider i bids with a cost Input: Set of winning providers from stage 1 T , Maximum Score S max i , Output: Winning provider i, payment allocation b p i //Initialization ; //Broker announces the winning group of providers T and the maximum score S max i ; //Providers increment the current maximum score by ; // Then solve P m k¼1 w k : ik À S max i À À P m k¼1 g k : ik as in (7); // Broker collect new bids; for each i 2 n do receive bids; Winner provider i for x i ¼ min x 1 x 2 ::: x n ; In this case, if a provider j bids with a cost value equal to b p i would be the first in the list because b p j ¼ b p i > b p 0 i and will be declared winner. The above observation shows that obtaining payment exactly equal to the critical cost value for provider i is essential otherwise loses the bid. Therefore, the proposed mechanism implements the critical value. & Theorem 1: The proposed mechanism is incentive compatible. Proof: A mechanism is said to be incentive compatible if and only if it is monotonic and implement the critical payment value. From Lemma 3 and Lemma 4 we can deduce that the proposed mechanism is incentive compatible. In this section, we evaluate the proposed model using multiple edge computing node providers competing to win allocation for users utilizing resource hungry application such as video streaming clients. The broker in the simulated scenario is an agent works on behalf of the clients. The interaction among the parties in this scenario is assumed to be automatic. The setup and the assumptions of the evaluation are discussed next. In real-life, edge computing providers including cloud vendors offer various price distributions for their quality of services. Currently, there is no actual bidding structure for such services and typical auctioning models are not possible. Hence, there is a need for mechanism design. Having mentioned such requirement, it is not possible to measure or enforce incentive compatibility or compare it to baseline model for benchmark. Our aim is to evaluate the proposed auction model with a dynamically generated price and quality attributes rather than a fixed formula as in [37] . Hence, we implemented our simulation using the formulation presented in this paper while taking into account realistic parameters from publically available data following [25] and [37] . To evaluate the system, we have executed a series of experiments that mimic a realistic scenario. Each edge computing node is capable of providing a range of quality attributes at different costs, however, the provider cannot place more than one bid. In other words, the provider although it can offer higher quality for the broker, it might decide to bid with lower quality at a cheaper cost. To simulate this case, we assume that there is a range of quality performance ratings and a random generator, which is applied to construct the bid for each provider. In reality, there is no limit how each provider is going to combine their quality attributes. In order to model the strategic behavior of the bidders, we assume that each provider can specify the quality ratings from various ranges (low, medium, and high) to make an offer. For the sake of simplicity, we assume that the price differs from one range of quality attribute to another, but it is constant for the same range group. The broker's initial assigned score for quality attributes is constant. Furthermore, we assume that the providers are restricted to the quality attribute performance ratings that they are capable of satisfying the broker's demand shall they win the bid. Finally, we assumed that all providers are capable of providing similar types of quality attributes, but they differ in the quality rating performance. Table (III) shows the parameters of the quality attribute ratings and the assigned scores for each attribute. The values of the quality attribute specification for bandwidth and latency follow a normal distribution over the specified range. However, the storage capacity is a predefined amount of 50 GB increments. The cost is considered to be fixed for the duration of time (week, month etc.) of which the service is offered. This assumption is inline with acceptable current market structure of Google, Amazon, etc. All experiments are carried using a Windows 10 64-bit Operating System PC with the following specifications, Intel Core i7-6700HQCPU, 2.6 GHz, 8 GB RAM. Each provider i selects a bid c bid i that maximizes its utility as described in (7). For the first round, we assume that the providers have no historical reference. Hence, the bids shown in fig 2 are randomly generated to capture the nature of the bidders. For example, provider i may bid the ½ b i1 ¼ 10 fig 3, we present the varying scores for 10 providers after generating 10 random bids. The broker calculates these scores based on equation (3) . As explained in the mechanism design section, the broker announces the winners for the second stage based on equation (13) . In this experiment, we set the scale value m ¼ 1, which means that the average value of the bidders will be used to determine the winners of the first stage. In this case, the winner set T includes providers f4; 5; 7; 8; 10g. Each provider will be able to increase its offering for the next stage knowing that the highest score is 0.8. However, the providers do not know the price and quality attribute rating values of each others. The score increment is affected by the choice of decreasing or increasing the offerings of beneficial and nonbeneficial attributes. For this experiment, we assume that the providers can increase the beneficial value anywhere between [1] [2] [3] [4] [5] for the bandwidth and decrease by [5-10 ms] for non-beneficial attributes such as latency. The price/cost decrease follows a value ranges between [1-5$] . increments are considered. In order to simulate a realistic scenario, we assumed that the winning provider in the first stage did not increase its score in the second stage while others may increase their score by a fixed amount in all iterations. Applying Algorithm (3), we noticed that the provider who may have the flexibility to offer various quality attributes is winning more iterations than those who cannot make changes. For example, in fig 5 provider 5 won six times whenever reached the second stage of the bidding. Provider 5 won most of the time because the score was increased aggressively above the maximum score from the first stage. Provider 4 was able to win 3 times while provider 7 won one time only after it raises its score to 0.98. Provider 8 and 10 did not win because as we mentioned earlier provider 8 kept the same score value from previous stage. Provider 10 increased the score by a fixed amount that was obviously below other bidders. To examine the monoticity of the proposed model, we let each winner provider in the corresponding iteration to adjust its bidding cost to enhance its position in the winning set. For this experiment, we allow each winning provider to adjust by a 2% amount. As explained earlier, the provider's average cost decreases, thus giving him a better score since his bid density decreases. For example, provider 4 in fig 6 won in iteration 4, 6 and 8 again with same benefit as in the case before making any adjustment to the cost. Similarly, provider 5 won in the same iterations 1,2,3,5,7 and 9 while provider 7 won in iteration 10. In any winning case, the benefit for providers 4,5 and 7 did not change, which means the mechanism is maintaining monoticity. Furthermore, the winning providers are receiving the critical cost function, which concludes that the mechanism is incentive compatible. It should be noted that the providers may adjust their cost with values higher than 2%, but the final output stays the same because they would not be able to improve their position in the winning set any further. Similarly, a smaller value than 2% would enhance their cost offering and bid density by a margin that would not affect their position score. In either case, the providers receive the critical payment. Fig 7 shows the comparison of benefits among the winning providers. Obviously, the percentage of benefit for provider 5 is much higher than those of provider 4 and provider 7 because of the wining iterations. Similarly, provider 4 has higher percentage of benefit than provider 7. The computational complexity of the proposed model is affected by the overhead of the negotiation process. However, as the number of providers in the system increases the algorithms in both stages conform to the expecting execution time as shown in Lemma 1. In the simulation experiments, the average execution time of the algorithms was 2.1 ms for 10 providers. We executed the algorithms for 20 providers and the average execution time was 2.9 ms. In these results, the mechanism shows that the latency to finalize the two stage bidding process is acceptable and the delay is not significant. Furthermore, it is not common in real-life scenario to have more than 20 edge computing service providers. This paper addresses the issue of increased demand for network resources during special times, such as the COVID-19 pandemic. We presented a model by which users can work with a broker to negotiate on their behalf to allocate network resources that satisfy their large demand. The proposed twostage model ensures fairness and truthfulness while aiming to maximize the benefit and attain higher quality attributes. We have shown through experiments that the provider would have a higher chance of winning when bidding truthfully. This helps the broker to make an informed decision and serves the users better. As for future direction, we need to study much more complex scenarios where the cost and the score functions are not linearly additive. We also need to explore options where the quality attribute values are not continuous. Another point worth exploring is to study cases where the providers might collude or cooperate to offer bundled services. These directions may be more realistic as the development and implementation of edge network resources become widely adopted. Why the coronavirus lockdown is making the internet stronger than ever Explainable AI and mass surveillance system-based healthcare framework to combat COVID-I9 like pandemics IoT big data analytics for smart homes with fog and cloud computing Bandwidth on-demand for multimedia big data transfer across geo-distributed cloud data centers Edge-CoCaCo: Toward joint optimization of computation, caching, and communication on edge cloud Smart-Edge-CoCaCo: AI-enabled smart edge with joint computation, caching, and communication in heterogeneous IoT Why Organizations are Betting on Edge Computing source An Envy-Free Auction Mechanism for Resource Allocation in Edge Computing Systems Three dynamic pricing schemes for resource allocation of edge computing for IoT environment Credit-based payments for fast computing resource trading in edge-assisted Internet of Things COCME: Content-oriented caching on the mobile edge for wireless communications A deep-tree-model-based radio resource distribution for 5G networks Double auction-based resource allocation for mobile edge computing in industrial Internet of Things Emotion recognition using secure edge and cloud computing Edge intelligence in the cognitive Internet of Things: Improving sensitivity and interactivity Edge-MAP: Auction markets for edge resource provisioning Cloudletbased intelligent auctioning agents for truthful autonomous electric vehicles energy crowdsourcing Winning providers in each iteration after benefit adjustment Double auction mechanisms for dynamic autonomous electric vehicles energy trading Resource provisioning of MVNOs in a virtualized wireless network: A procurement auction approach Bandwidth and cache leasing in wireless information-centric networks: A game-theoretic study CABOB: A fast optimal algorithm for winner determination combinatorial auctions A reverse auction based allocation mechanism the cloud computing environment A combinatorial auction mechanism for multiple resource procurement cloud computing A mechanism design approach to resource procurement in cloud computing A truthful and fair multi-attribute combinatorial reverse auction for resource procurement in cloud computing Game Theoretic Problems in Network Economics and Mechanism Design Solutions Gossip-enabled stochastic channel negotiation for cognitive radio Ad hoc networks Measuring users' privacy payoff using intelligent agents Privacy and market for private data: A negotiation model to capitalize private data Two-stage multi-attribute auction mechanism for price discovery and winner determination Determining winner multi-attribute procurement auction: A method based technical and business experts' evaluation information Multiple attribute decision making: Methods and appl Multiple Attribute Decision Making: Methods and Applications Average-bid method-competitive bidding strategy Journal of Construct An investigation average bid mechanism for procurement auctions Algorithmic Game Theory (PDF) Quality-aware service selection for service-based systems based on iterative multi-attribute combinatorial auction His research interests are mostly focused on behavior and predictive analytics, big data systems and networks, artificial intelligence He is also an Adjunct Professor with the School of Electrical Engineering and Computer Science, University of Ottawa. His research interests include cloud networking, smart environment (smart city, smart health), AI, deep learning, edge computing, Internet of Things (IoT), multimedia for health care, and multimedia big data. He has authored and coauthored more than 300 publications including refereed journals, conference papers, books, and book chapters. Recently Previously, he served as a Guest Editor of IEEE Communications Magazine