International Journal of Interactive Mobile Technologies(iJIM) – eISSN: 1865-7923 – Vol 16 No 10 (2022) Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks https://doi.org/10.3991/ijim.v16i10.30479 Ayoub Alsarhan1(*), Bashar Alkhawaldeh2, Atalla Fahed Al-Serhan3, Muhsen Alkhalidy2 1Department of Information Technology, Hashemite University, Zarqa, Jordan 2Computer Science Department, Hashemite University, Zarqa, Jordan 3Department of Business Administration, Al-Bayt University, Al-Mafraq, Jordan ayoubm@hu.edu.jo Abstract—The evolution of the current centric cloud to distributed clouds such as fog presents a suitable path to counteract the intolerable processing delays for time-critical applications. It is anticipated that more fog nodes (FN) will be connected to the IoT paradigm to improve the quality of service and meet the requirements of emerging IoT applications. Typically, the owner manages these FN nodes opening up promising doors towards new business opportunities. Thus, this paper considers fog computing driven network that consists of a set of FNs, distributed on the network edge to serve cloud clients. Cloud service provider (CSP), in turn, can offer new services, define a profile for each service, and set generate revenue. However, new schemes should be developed to make this dynamic business model economically feasible. In this context, we propose a new intelligent scheme for service trading, in which a new genetic algorithm is developed for selecting a set of optimal clients that maximize CSP’s profit using game theory for setting the service price. Game theory captures the conflict between cloud clients and CSP, where clients and CSP try to maximize their respective utilities. While CSP attempts to maximize profit, each client tries to negotiate for a lower service price. Simulation results stress that the CSP can maximize profit by utilizing computational resources efficiently and selecting service requests with the highest possible bid. Keywords—fog computing, Internet of Things (IoT), game theory, genetic algorithm 1 Introduction The Internet of Things (IoT) has been thriving in terms of the number of connected devices/things as well as the applications. The industry and academia anticipate that all of electronics devices can be soon connected to the internet, revolutionizing our life style. [1–5]. As a result, huge computing resources are needed to process the large data generated by all types of IoT devices [1–4]. The past years have witnessed the signif- icant innovation of cloud computing technologies and rapid deployment of practical iJIM ‒ Vol. 16, No. 10, 2022 191 https://doi.org/10.3991/ijim.v16i10.30479 mailto:ayoubm@hu.edu.jo Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks cloud computing systems. With the tremendous growth in IoT and the dramatic increase in demand for innovative services, new problems have emerged in cloud computing. Indeed, the widespread demand for data and the emergency of new services are inev- itably leading to the so-called Resource Crisis. This crisis leads to the failure to meet the requirements of all cloud users in terms of availability, performance, robustness, and so on. Hence, the evolution of the current centralized model of cloud computing to new paradigms (heterogeneous, federated, distributed clouds) presents a suitable path to counteract this crisis by proposing advanced technologies and, most importantly, by adopting new infrastructures to reduce end-user delays, increase the offered services, improve and differentiate their quality. Recently, fog computing has emerged as new distributed cloud computing paradigm where edge devices are used to carry out signifi- cant amount of processing, storage, communication locally and routed over the internet backbone [5]. In this paradigm, all computing resources are distributed close to end devices over the IoT network [28–30]. In the smart city applications, extra devices are required sometimes for deliv- ering effective clients service and quick solutions. For example, nearby FNs can be used to maintain proper operation of the smart city services provided in the event of malfunctions or system failures. Each client must pay for CSP to access comput- ing resources [5]. CSP aims to maximize profit by efficiently manage the computing resources. Clients can access computing resources in cloud and able to access to fog’s resources if they are close to clients to reduce latency. In the cloud market, in any geographic region, there are multiple CSPs along where clients able to choose the CSP that provides the best service at the lowest price. In order to maximize the profit, the key concern of the CSP is to attract more clients and get large sufficient computing resources to meet the clients’ demands. However, CSP cannot serve infinite number of clients since the number of available computing resources are finite. Clients select CSP according to their requirements. It is worth indicating that it is important to examine the economic issues that have a profound impact on the quality of service (QoS) and the cost of service paid by cloud clients [4–5]. CSP has to specify the optimal service price to attract customers as much as possible in line with the demand for service and the expected revenue, which is the basis for the CSP’s strategies. The price of service has a significant impact on customer’s demand that leads to a cyclical reliance on a traditional supply-demand scenario. In our work, genetic trading algorithm (GTA) is used to select a set of clients that will be served. We deviate from the notion of static prices for service and allow mul- tiple CSP’s to dynamically set service prices based on the service demand in fog com- puting market. Such a market mechanism is more realistic because there is competition between CSPs to set prices and there is no centralized authority to control the service price. We prove the existence of a price (Nash) equilibrium among competing CSPs, where no user can increase the benefit by changing the price. In summary, the contribu- tions of this paper are summarized as follows: 1) This study, to the best of our knowledge, is the first to explore the emerging market of trading resources in edge computing where the required computation is performed on distributed edge devices close to clients. 192 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 2) A game theory based algorithm is proposed to captures non-cooperative interactions among CSP and clients. It takes into account the time-varying availability of compu- tational resources and clients’ requirements. 3) A novel, lightweight, and practical scheme is developed for profit-aware dynamic provisioning of fog services with no assumptions and minimal information about service demand. The trading problem is formulated as an optimization problem. For this problem, GA is proposed to select requests that maximize CSP’s profit. 4) A model for the rational reaction of clients is proposed. Each client selects his bid without any cooperation or information exchange with other clients. The main con- cern of client is getting service with the lowest price. This paper is organized as follows. We describe the system model in Section 2 and show related works in Section 3. We formulate the problems in Section 4 and then we describe our scheme. We evaluate the performance of the proposed scheme in Section 5. Finally, the is concluded and future research directions are given. 2 System model Fog computing market refers to current state of system, e.g., service demand, service price, and complete description of available resources, etc. In this market, each CSP has some computing resources. The main concern of CSP is hiring these resources to generate extra revenue. Fog computing market is made up of large and small companies with different service demand. The market consist of N CSPs that compete for a total clients M. Each client submits a request to CSP that represents the client strategy. Each CSP owns K computing resources. The request for ith client is represented as follows: Si = {di, bi} (1) where di denotes the amount of computing resources requested and bi denotes the corresponding bid that the ith client is willing to pay. Each client has knowledge of his own bid, but does not have knowledge of the other bids. In our work, fog market param- eters change over time in line with the system requirements, such as workload, service demand, and the hiring cost computing resources. We assume that the client’s arrival request follows the Poisson distribution and each request has an arrival rate l. Service time μ is assumed to be exponentially distributed for each request. Requests are sent via a wireless communication network. The cost of renting a computing resource is C. At the beginning of each auction phase, the price decision for each resource is made by CSP. CSP faces the challenge of the winner- determination problem in such a way so that the CSP maximizes profit by choosing a bundle of bidders provided that the total fog resources do not exceed K. For clear expo- sition, the primary notations used throughout the problem description are summarized in Table 1. iJIM ‒ Vol. 16, No. 10, 2022 193 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks Table 1. List of relevant notation Notations Description N Number of CSPs in the system K Number of computational resources l Request arrival rate m service time for each request M Number of clients in the system C cost of renting computational resource xi number of allocated resources for ith user Si request for ith client W number of selected requests for service di Size of request bi bid for ith client T Time horizon F(bi) joint cumulative distribution function Nj profit from jth request is m number of different fog resources A allocation vector xi total number of allocated resources for ith user j (di, bi) conditional virtual function for ith request v–i truth values for other clients O(A) objective function for genetic trading algorithm O–i(A) objective function after accepting ith client’s request O ANi− ( ) objective function after rejecting ith client’s request ei efficiency of ith resource v resource sustainability D(A) demand function for ith resource Ei expected payoff for ith client bi * optimal bid for ith client S remaining capacity G(bi, S) genetic trading allocation rule for serving ith client q(R, S) payment rule for a client i Ui the utility for ith client L(Si) action space for ith request Bi maximum budget for ith client 3 Related work Fog computing is promising technology that enables delivering functionality to cus- tomers by set of low-power fog nodes most expediently. In [6], authors proposed new 194 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks conceptual framework for fog’s computing resource management. The problem was formalized as an optimization problem. The objective function for this problem was defined as providing delay-sensitive utilization of computational resources in fog mar- ket. Authors modeled resource management in fog market as a non-cooperative game in [7]. The fog market consists of Infrastructure and Service Provider (ISP), end Service Users (SUs), and Edge Resource Owners (EROs). In this market, edge resources were leased to SUs by ISP. For computational resource trading, a two-stage dynamic game was used. Equilibrium analysis was presented to stress economic benefits obtained by ISP, SUs, and EROs under whatever conditions. In [8], authors presented a new scheme for solving service pricing in fog computing market. Dynamic pricing scheme was presented to enable blockchain-based monetization and automated payment in crypto- currency for services trading in fog market. Ethereum blockchain was used to govern the interactions between devices and fog nodes. Authors investigated service selection in a fog market where customer choses service provider from two providers (CSPs). M/M/∞ queue and M/M/1 queue were used to model CSPs and clients, respectively. Stackelberg game was adopted to analyze the interaction of the two CSPs and clients where both set the prices first, and then the clients decide to select CSP based on per- formances and prices. The problem of maximizing the profit of the CSPs was consid- ered in [10]. CSP receives computing requests from clients and serve these requests by leveraging computing service of participating cloudlets. However, maximizing the operating profit for CSP is a challenging problem due to uncertain service demand and complexity in computing resource allocations. Authors proposed the Lyapunov opti- mization technique combined with the technique of weight perturbation to tackle this problem. The proposed control algorithm makes online decisions to admit requests and to allocate computing resources. Authors developed new distributed market framework for pricing the offloading service in [11]. Furthermore, they conducted a detailed anal- ysis of the incentives for offloading CSP and conflicts arising from the interactions of different participators. Stackelberg game was used to model the interactions between the offloading service providers and the offloading service consumers in the considered market framework. In [12] authors studied service pricing in cloud market. The problem was formu- lated as maximization problem where many objectives were taken into account. These objectives include: the energy consumption, delay, and price of cloud services. On the CSP side, authors proposed new pricing strategy by formulating a profit maximization problem. The problem of resource allocation in fog market was studied in [13]. Game theory was used to formulate the competition between clients for service. Each client aims to maximize his own utility, which reflects his satisfaction towards the service in terms of delay. Authors proved the existence of a pure Nash equilibrium. In [14], authors addressed the tasks offloading from the base station to vehicular fog nodes. They proposed new mechanism for task assignment. The main objective of the proposed mechanism was minimizing the network delay from a contract-matching integration perspective. Pricing-based stable matching algorithm was used for service pricing. In [15], authors proposed new strategy to offload tasks from clients to Fog Nodes. The problem was formulated as a matching game. The main concern of the proposed strategy was minimizing the service time by taking into account both com- putational and communications costs. In [16], several methods were used for multiple iJIM ‒ Vol. 16, No. 10, 2022 195 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks task scheduling in fog computing market. These methods include: Local Regression (LR), Inter Quartile Range (IQR), Local Regression Robust (LRR), Non-Power Aware (NPA), Median Absolute Deviation (MAD), Dynamic Voltage and Frequency Schedul- ing (DVFS) and The Static Threshold (THR) methods. Authors in [17] proposed new scheme for spatial task scheduling and resource optimization. The aim of the proposed method was minimizing the total cost of CSP by cost-effectively scheduling all new requests while meeting request’ delay-bound constraints. In [18], a new dynamic programming algorithm was introduced for mobile-to-cloud transmission scheduling of the offloaded task’s data. The proposed algorithm considers multiple service class where each class has different computing power and different service charge. The problem was formulated as an optimization problem where the main concern of the proposed solution is minimizing the cost of service. Novel crowdsourcing-based QoS supported mobile cloud service framework was introduced in [19]. The proposed framework meets clients’ satisfaction by sensing their context information and providing appropriate services to each of the clients. The framework adapts cloud service dynamically based on client’s activity context, social context, service context, and device context. In [20], authors introduced new frame- work for fog service provisioning. The main objective of the proposed framework is meeting low latency and QoS constraints while minimizing the service cost. Authors in [21] presented new multi-objective framework to find suitable fog nodes for serving clients’ requests. The main objective of the proposed framework is achieving a trade- off between the cost of resources and average service delay. The problem was formu- lated as a mixed-integer linear programming and it solved using the weighted goal programming. In [22], authors studied the task scheduling algorithm using a hybrid approach. The proposed scheme combines two of the most widely used biologically-in- spired heuristic algorithms, the genetic algorithms and the bacterial foraging algorithms in the computing cloud. The key objective of the scheduling algorithm was minimizing the makespan and reducing the energy consumption. The aim of this paper is to provide an effective trading algorithm that makes optimal use of the resources to maximize CSP’s profit. Unlike other approaches, the resource allocation problem is formulated as maximization problem for each user to make its computation offloading decision. In order to maximize the objective function, the CSP selects winners using a dynamic genetic algorithm. Clients in the market bid to acquire some computational resources. Game theory is used to model the conflicting objectives between players in the game. This market is more realistic since multiple clients deliver multiple tasks to CPS. It is assumed that no centralized authority exists in this market to decide the service price. 4 Fog computing resources trading using GTA In this section, we introduce the computing resources trading model in fog comput- ing market. In this market, CSP is greedy and seeks for the maximum profit. Clients compete among themselves to get service from CSP in lowest price. The resources for the CSP are computing resources that have been statically allocated. Clients, on the other hand, get service depending on the benefits they wish to obtain and the prices they pay for CSP. 196 http://www.i-jim.org https://www.sciencedirect.com/topics/computer-science/scheduling-algorithm https://www.sciencedirect.com/topics/computer-science/heuristic-algorithm Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 4.1 CSP profit function The problem of trading computing resources can be modeled as the classical knap- sack problem, where the objective is to fill a sack of finite capacity with several comput- ing resources such that the total profit of the selected requests in the sack is maximized. The requests are served if the total demand for service is less than market capacity (i.e. number of resources). GTA is applied if the demand is exceeded the number of com- puting resources. The CSP has a “knapsack” of given capacity K ∈ R that he wants to fill with clients’ requests in a profit maximizing way in at most T < ∞ period. Each new request is characterized by the bid (i.e., weight of request), and the number of required resources (i.e., size of request). We use a non-cooperative game to model the price competition among players of the game. Definition 1. A non-cooperative game has two types of players: CSPs and clients. CSP chooses his strategy first (i.e. service price) and then clients make decision sequentially. The strategy of each of the players is the service price. We assume CSP knows the bids of clients at each decision epoch. CPS sets the service price based on demand and clients’ bids. While CSP attempts to maximize his own profit, clients try to pay less. The request information is private for each client but its distribution is assumed to be known which is the joint cumulative distribution function F(bi) with continuously dif- ferentiable density f(bi) > 0, However, service demand is unknown and it is independent over time. CSP serves requests based on the bid and the size of request (i.e. number of required fog resources). The generated profit from jth request is computed as follows: N d b Cj i m i i i� � � � 1 ( ) (2) where Ci is the cost of renting fog i th resource and m is the number of different fog resources. Definition 2. A general fog computing market is one where the service provider (CSP) must pay a service cost Ci for the allocation i th resource. Each client has a single private value for getting some computing resource and quasi linear utility. The utility for each client is the truth value for a computing resource which should be less than the service price. The outcome of the GTA is the allocation vector which can be represented as follows: A = {(x1, N1) (x2, N2),…,(xn, Nn)} (3) where xi is the total number of allocated resources for i th user. The conditional virtual function for ith request is computed as follows: ( | )( , ) (1 ) ( | ) i i i i i i i F b d d b b f b d ϕ = − − (4) Definition 3. A general feasibility fog market is one where there is feasibility constraint for serving clients. For GTA, the feasible solution is a set of clients whom cumulative payments are more than the cost of service and serving this set does not violate any constraint in the market. The main concern of GTA is finding the allocation vector that maximize the profit. The problem of allocating fog resources can be iJIM ‒ Vol. 16, No. 10, 2022 197 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks formulated as follows: max A j W jN � � 1 (5) subject to: d Kii m j W � �� �� 11 Lemma 1. In a fog market, for ith client and all truth values for other clients v–i, the objective function for GTA for ith client is a step function. Proof: CSP either serve ith client or reject his request using GTA. We write the objec- tive function for both decisions (i.e. serving or rejecting the request). The objective function for GTA after accepting the ith client can written be as follows: O A N Ni jj W � � � � � � � 1 1 (6) The objective function can be written as follows: O(A) = Ni + O–i (A) (7) where O–i (A) is the objective function for finding the optimal allocation vector that maximize CSP’s profit after accepting ith client’s request. Clearly, O–i (A) is not func- tion of Ni. However, if the i th request is rejected, the objective function can be written as follows: O A O ANi( ) ( )� � (8) Notice that O ANi− ( ) is not function of Ni. GTA selects i th client based on the gener- ated profit. Therefore, GTA admits ith request when: N O A O Ai i Ni� �� �( ) ( ) (9) Solving for Ni, the i th request is served whenever: N O A O Ai N ii� �� �( ) ( ) (11) Clearly, the admission policy of CSP for any request i is a step function which can be written as follows: o i O A O AN ii( ) ( ) ( )� �� � (12) The step function describes the impact of serving ith client on other clients. Serving ith client reduces the offered resources for other clients. Hence, the main concern of GTA is profit maximization where a client is served if and only if the total profit is maximized and this action causes the externality impact on other clients (i.e. reducing number of fog resources). Theorem 1. The profit maximization problem in fog computing market using GTA is dominant strategy incentive compatible. GTA maximizes the profit for a CSP for all possible strategies (i.e. bids) of clients. The algorithm makes no assumption about the information available to clients about 198 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks others. GTA solicits clients in a truth-manner, and it does not have knowledge of the service demand in future. Definition 4. In fog market, CSPs are correlated since their actions affect the profit of each other. 4.2 Client strategies The service demand increases, if the computing resources available to the CSP cre- ates high utility for clients. The utility of service reflects the actual value that the client is willing to pay to the quality of service. The following quadratic function is used to quantify the utility gained by a client [27]: U A d e d v d d bdi ii n ii n i ji j i ii n ( ) � � �� ��� � � �� � � �1 21 112 2 (13) where ei is the efficiency of i th resource, and v is the resource sustainability (0.0 ≤ v ≤ 1). The sustainability resource reflects the ability of using other resources. For example, when v = 0 a client cannot switch to use another computing resource. However, a client can freely switch to any resource for v = 1. The demand function for ith resource can be extracted by computing the first derivative utility function as follows: D A e b vN v e b v v N i i i j j i( ) ( )( ) ( ) ( )( ( ) ) � � � � � � � �� 1 1 1 (14) Generally, if the utility derived from the ith resource is still greater than the bid bi, the client will pay for the service. The optimal bid for ith client bi * should be the minimum price the CSP should accept. Obliviously, CSP declines lower bids. Thus, the bid for ith client is the measure of contention among the fog market clients and shows the mar- ginal increase in utility by purchasing the service. Lemma 2. Dominant strategy of the ith client is the bid bi * that increase the likelihood of winning the auction. Proof. The probability that the ith client offers the highest bid is computed as follows: p b F bi i n( ) ( )* � �1 (15) The request for ith client will be admitted as the offer is equal or greater than the minimum acceptable bid. Assume ti is the truth value for a service. The expected payoff for ith client is computed as follows: E d t d bi i i i ij m � � �� ( )1 (16) The optimal bid for ith client is computed as follows: b N Ni jj W ji j j W * , � � � � � � �� � (17) We assume that ith client does not submit his optimal bid bi *. Accordingly, the client has two options for selecting the bid: 1. The bid is less than the optimal price bi * and the request will be rejected since CSP selects only the highest bids. Thus, the client’s payoff will be 0. iJIM ‒ Vol. 16, No. 10, 2022 199 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 2. The bid is more than the optimal price bi * and the request will be granted but with less payoff for the client. So, ith client will not be interested to increase the offer. Clearly, if the ith client’s request is admitted, the maximum payoff is Ei and bidding any other price will decrease the payoff. Thus, the dominant strategy of the ith client is the bid bi *. At any period t, the GTA is called deterministic and Markovian if it uses nonrandom rules for resource allocating that depends only on the bids, and on the still available capacity denoted by S. For each request i, the GTA rule can be described as follows: G(bi, S) → {1, 0} (18) where 1 (0) the request is served (rejected). Indeed, the request is served when the quantity of fog computing resources are adequate to serve the request and the cus- tomer is willing to pay for this. However, CSP will not allocate more resources than the requested amount since this action will not increase the profit of CSP. The payment rule for a client i can be expressed as follows: q R S Sbi( , ) *→ (19) Lemma 3. GTA is a deterministic, Markovian allocation policy if and only if for every request, the following two conditions are met: (i) For all (bi, S), b́i ≥ bi, G(bi, S) = 1, G(b́i, S) = 1. (ii) The payment function Sbi * is nondecreasing in S. When the two conditions are met, the payment function can be expressed as follows: q R S Sb if G b S if G b S i i i ( , ) , ( , ) , ( , ) * * * � � � � � � �� 1 0 0 (20) Proof of Lemma 3. There are two cases for ith request: (1) G(bi, S) = 1, where bi < ti. Then, the reported profit Ni. However, if the client offers bi which greater than bi and CSP will admit the request since it will generate more profit. However, the client’s payoff will decrease according to Eq. (16). Hence, b́i is not profitable bid. Consequently, equation (17) can be rewritten as follows: b inf G b Si i * ,� � � �� �1 (21) (2) G(bi, S) = 0, where bi ≥ ti. Assume the client submits b́i. If (b́i, S) = 0, then the utility for client is 0 and the offer will be rejected. Assume now that b́i < bi. By the form of the profit function for a CSP, the bid b́i will be rejected since it reduces the CPS’s profit. Hence, the client should offer the optimal bid for guaranteeing the approval of his request. 200 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks Assume first, by contradiction, that condition (1) in the lemma is not satisfied. Then there exist (b́i, S) and (bi, S) such that b́i > bi, G(bi, S) = 1, and G(b́i, S) = 0. Then, the following inequality is obtained: b́iS – Ci ≥ biS – Ci (22) Selecting bi that generates less profit than b́i contradicts the implementability of GTA. Therefore, condition (1) must be held. Now, assume condition (2) is not satisfied. Then there exist bi, and b́i such that b́i > bi but biS > b́iS. In order to maximize his utility, the ith client offers bi to get the utility Ui: Ui = tiS – biS (23) Therefore, condition (2) holds for this case. Theorem 2. Game theory converges to a pure Nash equilibrium with the highest possible payoff, in the pricing game, when the GTA is applied. Proof. Let the current state of bids be b = (b1, b2, b3,…, bm) and GTA is applied to select the winners. Without loss of generality assume that CSPs indexes imply the players , i.e., only CSPs 1 to N – 1 are correlated, meaning that their decisions affects the profit of each other. Then, if ith CSP selects bi * using GTA at first round of auction that is not affected by other CSPs in the fog market. Clearly, all CSPs in the market try to maximize their profit by selecting the optimal bid. Hence, the total profit of all CSPs will be the maximum one. The total profit of all CSPs in fog market after bi * is determined by ith CSP can be expressed as follows: b b bi i j j W j j W j * , � � � � � � � � � (24) Clearly, if prices for other CSPs are optimal, then the price bi * is the optimal one for the ith CSP since it will maximize the total expected profit. Hence, CSPs will not change their prices in the future. The same is true for clients in fog market. 4.3 Computational resource trading problem using genetic trading algorithm Genetic trading algorithm tries to maximize the reported profit by selecting a subset of requests to be served so that the total amount of requested resources is less than or equal to a given limit and the total profit is as large as possible. For each request, CSP either accept or reject the request. The action space for ith request is given by: L(Si) = {ai:ai ∈ {0, 1}} (25) where ai = 0 denotes request rejection, ai = 1indicates that the CSP accepts serving ith request. Every request has a size weight di and a value bi. The goal is to maximize the profit of serving optimal requests. Mathematically, the problem can be formulated as follows: max ( )d b Ci i ii m j w � �� �� 1 (26) s.t. d Kii m j w � �� �� 1 iJIM ‒ Vol. 16, No. 10, 2022 201 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks b Bi i m i� �� 1 � Bi is the maximum amount that the i th request can pay for CSP (i.e., CSP’s budget). Genetic algorithm has many applications such as capital budgeting, inventory control routing and project scheduling [26]. John Holland [24] introduced genetic Algorithm (GA) in the 1960s. GA is heuristic search algorithm inspired by the process of natural selection and genetics developed. In order to use the GA for determining the optimal subset of requests that contribute to maximize CSP profit, we first need to represent them in a binary string. In GA, the requests belong to {1; 0}, and the binary representa- tion is sufficient. In evaluation step of the GA the quality of each candidate solution in the population is determined. In our work, the value of the objective function is defined in Eq. (5). In the selection phase of GA, the selection operator performs the following tasks: • Extracting good solutions in the current population. • Generating multiple copies of the good solutions. • Eliminating bad solutions from the current population. In order to generate new population, the selection operator chooses a chromosome from the current generation’s population. Several algorithms have been proposed for selecting a good solutions [24–25]. In our work, Tournament technique [24] is adopted for selecting good solution. The crossover operator creates the new solutions by com- bining the genes of one individual with those of another. New individuals inherit char- acteristics of parents. We use the two- and three-points crossover [25]. In mutation phase, the worst genes in term of profit are selected randomly. Then, they are changed oppositely to create new population. The mutation does not perform when the corre- sponding solutions generate a good profit. 5 Performance evaluation In this section, the performance of the proposed scheme (GTA) is evaluated and compared with greedy auction scheme [23]. The requests in greedy scheme are served based on bids and on the free number of resources. The client with the highest bid wins the auction. The GTA and greedy schemes are implemented in the C language. In this section, the performance of the proposed scheme is evaluated through simulation. The uniform distribution is used to generate the parameters for each request (i.e. number of required resources, and bid). Each simulation run consists of 100000 requests. The results are averaged over enough independent runs so that the confidence level is 95% and the relative errors do not exceed 5%. We examine the performance under different parameter settings. 202 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 5.1 Simulation results 990 1990 2990 3990 1 2 3 4 5 Pr of it λ Greedy scheme GT scheme Fig. 1. CSP’s profit under different system loads Figure 1 shows the effect of varying load on the reported profit for GTA and the greedy scheme. The figure shows that the proposed scheme always achieves more profit than greedy scheme. GTA scheme outperforms greedy scheme because it spans all the possible combinations of fitting requests and finds the one with the highest total profit. The greedy scheme selects the highest bid at any time and continue to serve requests until no more available resource. GTA scheme spreads the net widely in the search space (i.e. a request queue). It tries all possible subsets of requests and select the subset 1 2 3 4 5 0 10 20 30 40 50 60 70 80 90 100 U til iz at io n λ Greedy scheme GT scheme Fig. 2. Resource’s utilization under different system loads iJIM ‒ Vol. 16, No. 10, 2022 203 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks with highest total profit. Note that, the profit is low in the low values of load (i.e. request arrival rate) and subsequently increases with high demand for service. For lower service demand, the competition for service is low and bidders are dubious. Therefore, they offer low bids. With increase in competition, potential bidders emerged as expected and raised the reported profit. We observe that the proposed auction generates 5–10% more profit compared to the greedy scheme. Higher profit requires high competition among clients (i.e. increment in the number of requests). Figure 1 shows that the profit increases for both schemes as the number of served requests increases (load) but after certain number of load the profit reaches the steady state since the available resources are fully utilized. We further present the results of resource utilization with different system loads in Figure 2. Our scheme performs better than greedy scheme. Our scheme utilizes the whole resources because it considers both the number of resources and the price for each resource. It determines the number of each resource to include in a col- lection so that the total number is less than or equal to a given number of resources. This improves the reported profit significantly. Greedy scheme always favors requests with high request size (i.e. amount of resources required) and high bid, thus discouraging low potential bidders. Figure 3 shows the average wining price under different system loads. We observe that the greedy scheme always prioritizes requests with higher bids with ignoring selecting optimal subset of requests that generate maximum profit. Although the average of winning price for greedy scheme is higher than GTA, it fails to yield optimum benefit. Next, we evaluate the scalability of our scheme for a large fog market. The profit comparison of the two schemes is shown in Figure 4 that shows the impact of resources quantity on the profit of GTA and greedy schemes. It is clear that the profit increases as the number of resources quantity increases. Since GTA utilizes the free resources 1 2 3 4 5 105 115 125 135 145 155 165 175 185 A ve ra ge w in in g pr ic e λ Greedy scheme GT scheme Fig. 3. Average wining price under different system loads 204 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks efficiently, it generates more profit than greedy scheme. Clearly, the effective/admitted rate of GTA is strictly higher than that of greedy scheme, since GTA takes into account the sizes of requests when allocating resources and prices. The likelihood of finding a set of requests with highest total profit increases as the number of resources increases. GTA trades its resources for a greater number of clients that leads to a higher profit as we see in Figure 4. We illustrate greedy and GTA schemes’ performance as we increase the service demand in Figure 5. The figure shows the impact of service demand on the acceptance rate of client’s requests. Clearly, the acceptance rate of GTA is strictly higher than that of greedy, since GTA utilizes the whole resources for serving clients. Clearly, there are more requests served by GTA, which lead to a higher profit and higher utilization of resources. For high service demand, the acceptance rate decreases significantly for both schemes because the number of resources insufficient to accommodate large number of requests. 60 80 100 3 4 5 6 7 A cc ep te nc e R at e λ Greedy scheme GT scheme Fig. 5. Request’s acceptance under different system loads We plot the lowest winning price of ith CSP competitors against profit for ith CSP in Figure 6. The results illustrate the impact of CSPs’ prices on the profit of ith CSP. Clearly, the profit of GTA is strictly higher than that of greedy, since GTA considers 10 20 30 40 50 1000 1500 2000 2500 3000 3500 4000 Pr of it Number of Resources Greedy scheme GT scheme Fig. 4. CSP’s profit under different market sizes iJIM ‒ Vol. 16, No. 10, 2022 205 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks the competition with other CSPs and utilizes the whole resources for serving clients. A higher price0 rival increases significantly the profit of ith CSP for both schemes because clients wish to pay less for service for maximizing their utility. 990 1490 1990 2490 2990 105 125 145 165 Pr of it Lowest optimal price Greedy schemeGT scheme Fig. 6. CPS’s profit under different prices for other CSPs 6 Conclusion and future work An increasing number of applications with low latency requirements motivate new paradigm of computing where computing resources and storage on the edges of a net- work are rented to execute tasks and to store data for customers. In this paper, we studied the fog-computing market where client lease CSP’s computing resources and storage for transaction processing. For this market, CSP is compensated for the comput- ing resources and storage contributions. In particular, an innovative concept has been proposed to lease free computational resources. In order to maximize CPS profit, GA has been proposed to select a set of clients’ requests. The trading problem is modeled and inspired by the game theory, in which the clients attempt to be served in lowest price, while the CSP aims to maximize the profit. The proposed scheme considers the desire of clients to pay less cost. Our game theoretic analysis demonstrates that CSP can derive the optimal service price in any scenario. The results demonstrate our scheme ability to maximize CPS’ profit in a variety of scenarios. Future extensions of the present work may involve carrying similar analysis on real market. Further investigations into different fitness functions that include QoS constraints such as latency. 206 http://www.i-jim.org Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 7 References [1] R. K. Naha, S. Garg, D. Georgakopoulos, P. P. Jayaraman, L. Gao, Y. Xiang et al., “Fog Computing: Survey of Trends Architectures Requirements and Research Directions”, IEEE Access, vol. 6, pp. 47980–48009, 2018. https://doi.org/10.1109/ACCESS.2018.2866491 [2] R. Mahmud, R. Kotagiri, R. Buyya, Fog Computing: A Taxonomy, Survey and Future Direc- tions. In: Di Martino B., Li KC., Yang L., Esposito A. (eds) Internet of Everything. Inter- net of Things (Technology, Communications and Computing). Springer, Singapore, 2018. https://doi.org/10.1007/978-3-319-94890-4 [3] J. Du, L. Zhao, J. Feng, and X. Chu, “Computation Offloading and Resource Allocation in Mixed Fog/Cloud Computing Systems with Min-Max Fairness Guarantee”, IEEE Trans- actions on Communications, vol. 66, no. 4, pp. 1594–1608, 2018. https://doi.org/10.1109/ TCOMM.2017.2787700 [4] J. Moura, and D. Hutchison, “Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends,” IEEE Communications Surveys & Tutorials, vol. 21, no.1, pp. 260–288, 2018. https://doi.org/10.1109/COMST.2018.2863030 [5] A. Alsarhan, “Game Theoretic Approach for Virtual Machines in IoT Fog Networks,” 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), Hammamet, 2018, pp. 710–715. https://doi.org/10.1109/SSD.2018.8570585 [6] O. Skarlat, S. Schulte, M. Borkowski, and P. Leitner, “Resource Provisioning for IoT Ser- vices in the Fog,” 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA), Macau, 2016, pp. 32–39. https://doi.org/10.1109/SOCA.2016.10 [7] D. Kim, H. Lee, H. Song, N. Choi, and Y. Yi, “On the Economics of Fog Computing: Inter- Play among Infrastructure and Service Providers, Users, and Edge Resource Owners,” 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 1–6. https://doi.org/10.1109/ICC.2018.8422773 [8] M. Debe, K. Salah, M. H. Ur Rehman and D. Svetinovic, “Monetization of Services Pro- vided by Public Fog Nodes Using Blockchain and Smart Contracts,” in IEEE Access, vol. 8, pp. 20118–20128, 2020. https://doi.org/10.1109/ACCESS.2020.2968573 [9] X. Li, C. Zhang, B. Gu, K. Yamori and Y. Tanaka, “Optimal Pricing and Service Selection in the Mobile Cloud Architectures,” in IEEE Access, vol. 7, pp. 43564–43572, 2019. https:// doi.org/10.1109/ACCESS.2019.2908223 [10] W. Fang, X. Yao, X. Zhao, J. Yin, and N. Xiong, “A Stochastic Control Approach to Maximize Proton Service Provisioning for Mobile Cloudlet Platforms,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 48, no. 4, pp. 522–534, 2018. https://doi.org/10.1109/TSMC. 2016.2606400 [11] K. Wang, F. C. M. Lau, L. Chen, and R. Schober, “Pricing Mobile Data Offloading: A Dis- tributed Market Framework,’’ IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 913–927, 2016. https://doi.org/10.1109/TWC.2015.2480394 [12] H. Shah-Mansouri, V. W. S. Wong, and R. Schober, “Joint Optimal Pricing and Task Sched- uling in Mobile Cloud Computing Systems,” in IEEE Transactions on Wireless Communi- cations, vol. 16, no. 8, pp. 5218–5232, 2017. https://doi.org/10.1109/TWC.2017.2707084 [13] Hamed Shah-Mansouri and Vincent W. S. Wong, “Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game”, Internet of Things Journal IEEE, vol. 5, no. 4, pp. 3246–3257, 2018. https://doi.org/10.1109/JIOT.2018.2838022 [14] Zhenyu Zhou, Pengju Liu, Junhao Feng, Yan Zhang, Shahid Mumtaz, and Jonathan Rodriguez, “Computation Resource Allocation and Task Assignment Optimization in Vehicular Fog Computing: A Contract-Matching Approach”, Vehicular Technology IEEE Transactions on, vol. 68, no. 4, pp. 3113–3125, 2019. https://doi.org/10.1109/TVT.2019.2894851 iJIM ‒ Vol. 16, No. 10, 2022 207 https://doi.org/10.1109/ACCESS.2018.2866491 https://doi.org/10.1007/978-3-319-94890-4 https://doi.org/10.1109/TCOMM.2017.2787700 https://doi.org/10.1109/TCOMM.2017.2787700 https://doi.org/10.1109/COMST.2018.2863030 https://doi.org/10.1109/SSD.2018.8570585 https://doi.org/10.1109/SOCA.2016.10 https://doi.org/10.1109/ICC.2018.8422773 https://doi.org/10.1109/ACCESS.2020.2968573 https://doi.org/10.1109/ACCESS.2019.2908223 https://doi.org/10.1109/ACCESS.2019.2908223 https://doi.org/10.1109/TSMC.2016.2606400 https://doi.org/10.1109/TSMC.2016.2606400 https://doi.org/10.1109/TWC.2015.2480394 https://doi.org/10.1109/TWC.2017.2707084 https://doi.org/10.1109/JIOT.2018.2838022 https://doi.org/10.1109/TVT.2019.2894851 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks [15] F. Chiti, R. Fantacci, and B. Picano, “A Matching Theory Framework for Tasks Offloading in Fog Computing for IoT Systems,” in IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5089–5096, Dec. 2018. https://doi.org/10.1109/JIOT.2018.2871251 [16] Singh, Simar Preet, et al,” “Dynamic Task Scheduling using Balanced VM Allocation Pol- icy for Fog Computing Platforms,” Scalable Computing: Practice and Experience, vol. 20, no. 2, pp. 433–456, 2019. https://doi.org/10.12694/scpe.v20i2.1538 [17] Haitao Yuan, Jing Bi, and MengChu Zhou, “Spatial Task Scheduling for Cost Minimization in Distributed Green Cloud Data Centers”, Automation Science and Engineering IEEE Trans- actions on, vol. 16, no. 2, pp. 729–740, 2019. https://doi.org/10.1109/TASE.2018.2857206 [18] Sung-Tae Hong and Hyoil Kim, “QoE-Aware Computation Offloading to Capture Energy- Latency-Pricing Tradeoff in Mobile Clouds”, Mobile Computing IEEE Transactions on, vol. 18, no. 9, pp. 2174–2189, 2019. https://doi.org/10.1109/TMC.2018.2871460 [19] D. Yao, C. Yu, L. Yang, H. Jin, “Using Crowdsourcing to Provide QoS for Mobile Cloud Computing”, IEEE Trans. Cloud Comput., vol. 7, no. 2, pp. 344–356, 2019. https://doi. org/10.1109/TCC.2015.2513390 [20] Ashkan Yousefpour, Ashish Patil, Genya Ishigaki, Inwoong Kim, Xi Wang, Hakki C. Cankaya, Qiong Zhang, Weisheng Xie, and Jason P. Jue, “FOGPLAN: A Lightweight QoS-Aware Dynamic Fog Service Provisioning Framework”, Internet of Things Journal IEEE, vol. 6, no. 3, pp. 5080–5096, 2019. https://doi.org/10.1109/JIOT.2019.2896311 [21] F. M. Dalvand and K. Zamanifar, “Multi-Objective Service Provisioning in Fog: A Trade- Off Between Delay and Cost Using Goal Programming,” 2019 27th Iranian Conference on Electrical Engineering (ICEE), Yazd, Iran, 2019, pp. 2050–2056. https://doi.org/10.1109/ IranianCEE.2019.8786694 [22] W. Vickrey, “Couterspeculation, Auctions, and Competitive Sealed Tenders”, J. Finance, vol. 16, no. 1, pp. 8–37, 1961. https://doi.org/10.1111/j.1540-6261.1961.tb02789.x [23] David E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, Pearson, 1989. [24] D.E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Massachusetts, 1989. [25] WM. Spears. The Role of Mutation and Recombinaison in Evolutionary Algorithms. Ph.D. Thesis, George Mason University, Fairfax, VA, 1998. [26] Aytug, H., Khouja, M., and Vergara, F.E., “Use of Genetic Algorithms to Solve Production and Operations Management Problems: A Review,” International Journal of Production Research, vol. 41, no. 17, pp. 3955–4009, 2003. https://doi.org/10.1080/002075403100016 26319 [27] N. Singh and X. Vives, “Price and Quantity Competition in a Differentiated Duopoly,” RAND J. Economics, vol. 15, no. 4, pp. 546–554, 1984. https://doi.org/10.2307/2555525 [28] Ayoub Alsarhan, Islam Almalkawi, and Yousef Kilani “A New Covid-19 Tracing Approach using Machine Learning and Drones Enabled Wireless Network,” International Journal of Interactive Mobile Technologies, vol. 15, no. 22, pp. 111–126, 2021. https://doi.org/10.3991/ ijim.v15i22.22623 [29] Fady Esmat, Fathel Samann, Adnan Mohsin Abdulazeez, Shavan Askar, “Fog Computing Based on Machine Learning: A Review,” International Journal of Interactive Mobile Tech- nologies, vol. 15, no. 12, pp. 21–46, 2021. https://doi.org/10.3991/ijim.v15i12.21313 [30] Mais Haj Qasem, Alaa Abu-Srhan, Hutaf Natoureah, Esra Alzaghoul, “Fog Computing Framework for Smart City Design”, International Journal of Interactive Mobile Technolo- gies, vol. 14, no. 1, pp. 109–125, 2020. https://doi.org/10.3991/ijim.v14i01.9762 208 http://www.i-jim.org https://doi.org/10.1109/JIOT.2018.2871251 https://doi.org/10.12694/scpe.v20i2.1538 https://doi.org/10.1109/TASE.2018.2857206 https://doi.org/10.1109/TMC.2018.2871460 https://doi.org/10.1109/TCC.2015.2513390 https://doi.org/10.1109/TCC.2015.2513390 https://doi.org/10.1109/JIOT.2019.2896311 https://doi.org/10.1109/IranianCEE.2019.8786694 https://doi.org/10.1109/IranianCEE.2019.8786694 https://doi.org/10.1111/j.1540-6261.1961.tb02789.x https://doi.org/10.1080/00207540310001626319 https://doi.org/10.1080/00207540310001626319 https://doi.org/10.2307/2555525 https://doi.org/10.3991/ijim.v15i22.22623 https://doi.org/10.3991/ijim.v15i22.22623 https://doi.org/10.3991/ijim.v15i12.21313 https://doi.org/10.3991/ijim.v14i01.9762 Paper—A Novel Genetic and Intelligent Scheme for Service Trading in IoT Fog Networks 8 Authors Ayoub Alsarhan received the B.E. degree in computer science from the Yarmouk University, Jordan, in 1997, the M.Sc. degree in computer science from Al-Bayt University, Jordan, in 2001, and the Ph.D. degree in electrical and computer engi- neering from Concordia University, Canada, in 2011. He is currently Professor with the Department of Information Technology, Hashemite University, Zarqa, Jordan. His research interests include cognitive networks, parallel processing, cloud computing, machine learning, and real-time multimedia communication over the Internet. Bashar Igried received his Ph.D. in Computer Science from the Swansea Univer- sity, UKA in 2017, M.Sc. in Computer Science from the University of Middle East University in 2011, and B.Sc. in Computer Science from the Hashemite University, in 2009. He is currently an Assistant Professor at the Computer Science Department of the Hashemite University, Zarqa, Jordan. His research interests include software engi- neering, cloud computing, service level agreements, requirement engineering, cloud computing database, information retrieval, big data, and database systems. Atalla Alserhan received his Ph.D. in 2016, M.Sc. in Computer Science from the Yarmouk University in 2001, and B.Sc. from the Mutah University in 1990. He is currently an Assistant Professor at the Department of Information Technology of the Hashemite University, Zarqa, Jordan. Her research interests include Marketing, Total Qualty Management, Strategic Planning, Innovation, Creativity. Muhsen Alkhalidy received his M.Sc. in Computer Science from the Al-Albayt University in 2008, and B.Sc. in Computer Science from the Mutah University in 1990. He is currently Lecturer at the Computer Science Department of the Hashemite University, Zarqa, Jordan. His research interests include wireless network, security, and Industrial Data analysis. Article submitted 2022-02-28. Resubmitted 2022-04-08. Final acceptance 2022-04-08. Final version published as submitted by the authors. iJIM ‒ Vol. 16, No. 10, 2022 209