{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:52:49Z","timestamp":1743000769046,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030133412"},{"type":"electronic","value":"9783030133429"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-13342-9_4","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T03:24:16Z","timestamp":1549509856000},"page":"39-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Why Are Repeated Auctions in RaaS Clouds Risky?"],"prefix":"10.1007","author":[{"given":"Danielle","family":"Movsowitz","sequence":"first","affiliation":[]},{"given":"Liran","family":"Funaro","sequence":"additional","affiliation":[]},{"given":"Shunit","family":"Agmon","sequence":"additional","affiliation":[]},{"given":"Orna","family":"Agmon Ben-Yehuda","sequence":"additional","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"4_CR1","unstructured":"Litke, A.G.: Memory Overcommitment Manager. https:\/\/github.com\/aglitke\/mom. Accessed 19 July 2018"},{"key":"4_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13342-9","volume-title":"Economics of Grids, Clouds, Systems, and Services - 15th International Conference, GECON 2018, Proceedings","author":"S Agmon","year":"2018","unstructured":"Agmon, S., Agmon Ben-Yehuda, O., Schuster, A.: Preventing collusion in cloud computing auctions. In: Coppola, M., Carlini, E., D\u2019Agostino, D., Altmann, J., Ba\u00f1ares, J.\u00c1. (eds.) Economics of Grids, Clouds, Systems, and Services - 15th International Conference, GECON 2018, Proceedings. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-13342-9"},{"key":"4_CR3","unstructured":"Agmon Ben-Yehuda, O., Ben-Yehuda, M., Schuster, A., Tsafrir, D.: The Resource-as-a-Service (RaaS) cloud. In: USENIX Conference on Hot Topics in Cloud Computing (HotCloud) (2012)"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2509413.2509416","volume":"1","author":"Orna Agmon Ben-Yehuda","year":"2013","unstructured":"Agmon Ben-Yehuda, O., Ben-Yehuda, M., Schuster, A., Tsafrir, D.: Deconstructing Amazon EC2 spot instance pricing. ACM Trans. Econ. Comput. 1(3), 16:1\u201316:20 (2013). http:\/\/doi.acm.org\/10.1145\/2509413.2509416","journal-title":"ACM Transactions on Economics and Computation"},{"issue":"7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/2627422","volume":"57","author":"Orna Agmon Ben-Yehuda","year":"2014","unstructured":"Agmon Ben-Yehuda, O., Ben-Yehuda, M., Schuster, A., Tsafrir, D.: The rise of RaaS: the Resource-as-a-Service cloud. Commun. ACM 57(7), 76\u201384 (2014). http:\/\/doi.acm.org\/10.1145\/2627422","journal-title":"Communications of the ACM"},{"issue":"7","key":"4_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/2674025.2576197","volume":"49","author":"O Agmon Ben-Yehuda","year":"2014","unstructured":"Agmon Ben-Yehuda, O., Posener, E., Ben-Yehuda, M., Schuster, A., Mu\u2019alem, A.: Ginseng: market-driven memory allocation. ACM SIGPLAN Not. 49(7), 41\u201352 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"4_CR7","unstructured":"Alibaba Cloud Spot Instances. https:\/\/www.alibabacloud.com\/help\/doc-detail\/52088.htm. Accessed 11 Mar 2018"},{"key":"4_CR8","unstructured":"Azure. https:\/\/tinyurl.com\/burstable-azure-cloud-instance. Accessed 03 June 2018"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45448-9_25","volume-title":"Intelligent Agents VIII","author":"F Brandt","year":"2002","unstructured":"Brandt, F., Wei\u00df, G.: Antisocial agents and Vickrey auctions. In: Meyer, J.-J.C., Tambe, M. (eds.) ATAL 2001. LNCS, vol. 2333, pp. 335\u2013347. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45448-9_25"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Cary, M., et al.: Greedy bidding strategies for keyword auctions. In: Proceedings of the 8th ACM Conference on Electronic Commerce, pp. 262\u2013271. ACM (2007)","DOI":"10.1145\/1250910.1250949"},{"key":"4_CR11","unstructured":"Charting CloudSigma Burst Prices. https:\/\/kkovacs.eu\/cloudsigma-burst-price-chart. Accessed 21 Apr 2018"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF01726210","volume":"11","author":"EH Clarke","year":"1971","unstructured":"Clarke, E.H.: Multipart pricing of public goods. Public Choice 11(1), 17\u201333 (1971)","journal-title":"Public Choice"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Dolgikh, A., Birnbaum, Z., Chen, Y., Skormin, V.: Behavioral modeling for suspicious process detection in cloud computing environments. In: 2013 IEEE 14th International Conference on Mobile Data Management (MDM), vol. 2, pp. 177\u2013181. IEEE (2013)","DOI":"10.1109\/MDM.2013.90"},{"key":"4_CR14","unstructured":"EC2 Instances with Burstable Performance. https:\/\/aws.amazon.com\/blogs\/aws\/low-cost-burstable-ec2-instances\/. Accessed 11 Mar 2018"},{"issue":"2","key":"4_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113\u2013170 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR16","unstructured":"Funaro, L., Agmon Ben-Yehuda, O., Schuster, A.: Ginseng: market-driven LLC allocation. In: 2016 USENIX Annual Technical Conference, p. 295 (2016)"},{"key":"4_CR17","unstructured":"Google Cloud Platform. https:\/\/cloud.googleblog.com\/2016\/09\/introducing-Google-Cloud.html. Accessed 11 Mar 2018"},{"issue":"4","key":"4_CR18","doi-asserted-by":"publisher","first-page":"617","DOI":"10.2307\/1914085","volume":"41","author":"Theodore Groves","year":"1973","unstructured":"Groves, T.: Incentives in teams. Econ. J. Econ. Soc. 617\u2013631 (1973)","journal-title":"Econometrica"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 5 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"4_CR20","unstructured":"Hoff, C.: Cloud Computing Security: From DDoS (Distributed Denial of Service) to EDoS (Economic Denial of Sustainability). https:\/\/tinyurl.com\/from-ddos-to-edos. Accessed 27 May 2018"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M.: Exploiting cloud utility models for profit and ruin. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 33\u201340. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.45"},{"key":"4_CR22","unstructured":"Jellinek, R., Zhai, Y., Ristenpart, T., Swift, M.M.: A day late and a dollar short: the case for research on cloud billing systems. In: HOTCLOUD (2014)"},{"key":"4_CR23","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: the Linux virtual machine monitor. In: Proceedings of the Linux symposium, vol. 1, pp. 225\u2013230 (2007)"},{"key":"4_CR24","unstructured":"Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 535\u2013539. IEEE (2012)"},{"key":"4_CR25","unstructured":"Lazar, A.A., Semret, N.: Design, analysis and simulation of the progressive second price auction for network bandwidth sharing. Columbia University (1998)"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Maill\u00e9, P., Tuffin, B.: Multi-bid auctions for bandwidth allocation in communication networks. In: Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, 7\u201311 March 2004. IEEE (2004). https:\/\/doi.org\/10.1109\/INFCOM.2004.1354481","DOI":"10.1109\/INFCOM.2004.1354481"},{"key":"4_CR27","unstructured":"memcached. https:\/\/github.com\/ladypine\/memcached. Accessed 12 Mar 2018"},{"key":"4_CR28","unstructured":"Metz, C.: Facebook Doesn\u2019t Make As Much Money As It Could\u2013On Purpose. https:\/\/tinyurl.com\/facesbook-ads. Accessed 12 Mar 2018"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-319-28034-9_2","volume-title":"Distributed Computing and Internet Technology","author":"D Movsowitz","year":"2016","unstructured":"Movsowitz, D., Agmon Ben-Yehuda, O., Schuster, A.: Attacks in the Resource-as-a-Service (RaaS) cloud context. In: Bj\u00f8rner, N., Prasad, S., Parida, L. (eds.) ICDCIT 2016. LNCS, vol. 9581, pp. 10\u201318. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28034-9_2"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199\u2013212. ACM (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"4_CR31","unstructured":"Spot Marketing Pricing\u2013discount Packet Bare Metal Servers. https:\/\/www.packet.net\/bare-metal\/deploy\/spot\/. Accessed 02 June 2018"},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., Swift, M.M.: Resource-freeing attacks: improve your cloud performance (at your neighbor\u2019s expense). In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 281\u2013292. ACM (2012)","DOI":"10.1145\/2382196.2382228"},{"key":"4_CR34","unstructured":"Varadarajan, V., Zhang, Y., Ristenpart, T., Swift, M.M.: A placement vulnerability study in multi-tenant public clouds. In: Jung, J., Holz, T. (eds.) 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., USA, 12\u201314 August 2015, pp. 913\u2013928. USENIX Association (2015). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan"},{"issue":"1","key":"4_CR35","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Financ. 16(1), 8\u201337 (1961)","journal-title":"J. Financ."},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Waldspurger, C.A.: Memory resource management in VMware ESX server. In: Culler, D.E., Druschel, P. (eds.) 5th Symposium on Operating System Design and Implementation (OSDI 2002), Boston, Massachusetts, USA, 9\u201311 December 2002. USENIX Association (2002), http:\/\/www.usenix.org\/events\/osdi02\/tech\/waldspurger.html","DOI":"10.1145\/1060289.1060307"},{"key":"4_CR37","unstructured":"Yu, D., Mai, L., Arianfar, S., Fonseca, R., Krieger, O., Oran, D.: Towards a network marketplace in a cloud. In: HotCloud (2016)"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Lukose, R.: Vindictive bidding in keyword auctions. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp. 141\u2013146. ACM (2007)","DOI":"10.1145\/1282100.1282130"}],"container-title":["Lecture Notes in Computer Science","Economics of Grids, Clouds, Systems, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13342-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:01:36Z","timestamp":1710345696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-13342-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030133412","9783030133429"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13342-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GECON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Economics of Grids, Clouds, Systems, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gecon2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.gecon-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}