Next Article in Journal
A Domain-Adaptable Heterogeneous Information Integration Platform: Tourism and Biomedicine Domains
Next Article in Special Issue
Risk Factors When Implementing ERP Systems in Small Companies
Previous Article in Journal
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application
Previous Article in Special Issue
Could a Conversational AI Identify Offensive Language?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Equilibrium Analysis of a Secondary Mobile Data-Share Market

by
Jordan Blocher
* and
Frederick C. Harris, Jr.
Department of Computer Science and Engineering, University of Nevada, Reno, NV 89557, USA
*
Author to whom correspondence should be addressed.
Information 2021, 12(11), 434; https://doi.org/10.3390/info12110434
Submission received: 1 September 2021 / Revised: 13 October 2021 / Accepted: 14 October 2021 / Published: 20 October 2021
(This article belongs to the Special Issue Information Technology: New Generations (ITNG 2020 & 2021))

Abstract

:
Internet service providers are offering shared data plans where multiple users may buy and sell their overage data in a secondary market managed by the ISP. We propose a game-theoretic approach to a software-defined network for modeling this wireless data exchange market: a fully connected, non-cooperative network. We identify and define the rules for the underlying progressive second price (PSP) auction for the respective network and market structure. We allow for a single degree of statistical freedom—the reserve price—and show that the secondary data exchange market allows for greater flexibility in the acquisition decision making of mechanism design. We have designed a framework to optimize the strategy space using the elasticity of supply and demand. Wireless users are modeled as a distribution of buyers and sellers with normal incentives. Our derivation of a buyer-response strategy for wireless users based on second price market dynamics leads us to prove the existence of a balanced pricing scheme. We examine shifts in the market price function and prove that our network upholds the desired properties for optimization with respect to software-defined networks and prove the existence of a Nash equilibrium in the overlying non-cooperative game.

1. Introduction

We study an evolving non-cooperative real-time market. The changing demand of consumers operating on a wireless network has led companies to change their strategy towards data management and networking among wireless users. Mobile phone data experiences dynamically changing demand. Companies are beginning to measure, customize prices, and serve customers according to their individual demand in real time. Recently, AT&T has introduced a mobile data-sharing plan [1], which allows consumers to manage their own data usage in a real-time auction on a public platform managed by AT&T. In this work, we derive the Nash equilibrium by examining the resulting structure of this secondary data market. We address several topics: data as a product in the real-monetary market, and data as a network resource in a wireless topology.
As older softwares move from (wired) grid-based to node-based communication, a new paradigm of programmable network architectures is becoming the standard for wireless communication. These decentralized software-centric networks manage services modularly and allow for flexibility of demand; a decentralized design better suited to managing mobile networks, and mobility becomes a factor in network design. The relationship between the provider and the consumer is shifting; it is becoming a necessity to discretize consumer valuation. This is the new paradigm of digital economics.
There is a clear need for algorithms designed for optimization in this mobile space. Mobile devices provide flexibility, and may make individual decisions regarding local network infrastructure. In many cases, the direct communication between mobile devices allows for a simple mutation of classic optimization models. In online (web) resource allocation algorithms, auctions are used to implement the fair distribution of resources in network allocation algorithms. Mobile data is individually requested by each consumer as demand is unique to each mobile device. For the customer, they perceive a higher level of value for the service. For the ISP, progressive pricing allows for all customers to actively control, create, and share value. As stated by Izaret and Schürmann, “Making progressive pricing a …reality can happen only if firms change how they create, define, and measure value so that they can share it fairly.” [2].
An auction mechanism is defined as distributed when the allocations at any element depend only on local state, i.e., no single entity holds a global market knowledge. In [3], Lazar and Semret introduced the Distributed Progressive Second Price (PSP) Mechanism for bandwidth allocation, auction mechanisms that are (1) easily distributed, and (2) allocate an infinitely divisible resource. In classic mechanism design, with multiple user types, there is no single way to design the transformation from the direct revelation mechanism to its corresponding computational design. We apply a modifier to the PSP mechanism in order to mutate the strategy space, following the dynamics of user correspondence. As in [3], we obtain our result by design in composition with the PSP rules.
The secondary market provides a unique opportunity for social equilibrium, as it allows users to share data without sharing the same data plan, a restriction in most ISPs, such as [1]. We address the need for privacy in the bidding market; bid privacy is a concern for two reasons: (1) Sellers may use a buyer’s valuation to discriminate against a specific buyer(s), (2) an auctioneer might create a fake second highest bid slightly below the highest bid in order to increase his revenue. In general, the buyer does not trust the auctioneer. We therefore determine that our mechanism must be locally privacy preserving. By privacy preserving, we mean anonymous. That is, the winning bid in each local auction maintains anonymity, although the bid itself may be public information. In this way, consumers are able to trust the pricing scheme of the local auction and the resulting allocation.
To the best of our knowledge, this is the first work to provide a comprehensive derivation of a truthful mechanism that is self-contained within this specific dynamic market topology, the second price auction platform pioneered by AT&T. We focus on providing the existing auction platform with an incentive framework, and so rational users choose a collaborative exchange. In other words, adhering to the second-price rule, where price is derived from autonomous demand, we build “order” within the dynamic network of shifting demand and supply based on non-cooperative, autonomous consumers. This is the (built-in) transformation from the direct-revelation mechanism to the desired message space. Our auction mechanism may be described in game-theoretical terms as a pure-strategy progressive game with incomplete, but perfect, information.
The rest of of this paper is structured as follows: Section 2 presents the related work on auction theory and resulting policy software. Section 3 details the market derivation and mathematical form, which we present as an extension of the formulation found in [3]. The analysis of user behavior and the resulting algorithms that drive the non-cooperative game are presented in Section 4 along with a simple example. The analysis of the VCG properties and the network Nash equilibria are given in Section 5. Conclusions and Future Work follow in Section 6.

2. Related Work

Different definitions of social welfare define different auction strategies. Typical goals of optimization are the maximization of revenue and optimal allocation. Google AdWords allows advertisers to set their own prices by using an auction system where advertisers bid on keywords to get their ads placed in Google search results [2]. According to [2], progressive pricing, when used in combination with an auction platform, is a fairer way to determine prices. This is the “smart” pricing rule. We are used to understanding prices in units of data, or rates such as units of data per hour. If we can instead see prices in terms of a unit of value, then the price the customer pays can scale in proportion to the value demanded; this is our dynamic reserve price. Progressive second price auctions strive for this dynamic price in different ways, some try to optimize the sellers’ reserve price, or market price, as in this work. Research has been done for PSP auctions, and improvements have been made to the original work from Lazar and Semret. In [4], user strategy gives a “quantized” version of PSP, improving the rate of convergence of the game by shifting the bid price based on some threshold. Modifications to the mechanism that result in improved convergence also appear in [5], which relies on a global approximation function of demand.
Approximation of demand is a popular avenue of research for the division of data in a PSP auction. The complexity and amount of data inherent in digital data sharing creates a natural necessity; platforms must take advantage of the continuity of auctions restricted to simple sellers and buyers, as well as grid-based platforms. An approximation of the global demand function that uses a statistical approximation of the state space is derived from the theory of potential games. Potential games make use of a global strategy defined by the potential function; many companies use this as a mathematical tool to gather user data in order to further shape their market space. The idea of potential games in PSP markets was used by Zhong to coordinate the fair charging of electric vehicles in [6]; the potential game modeled the distribution of the load variance in electric vehicle charging, minimizing it as a global function with some constraints. The benefit of potential games is that, under some conditions, we are guaranteed convergence to a Nash equilibrium.
The analysis and interpretation of the data exchanged between the data-serve platform and the user quantify user value individually and strive to understand the decision process with increasing granularity. Usually, companies only know their marginal costs and can only infer user value by sample estimation. Today, with pervasive data and increasingly precise analytical capabilities, companies can derive a more precise estimate of value per user, and still maintain a zero marginal cost. Recently, using a mobile app as a platform,  Ref. [7] assigns electric vehicles to charging stations, replacing a first-come-first-serve system, and ensuring that there is enough power assigned to keep each user satisfied without overloading the supply. Importantly,  Ref. [7] considers the individual valuations of the users. More generally,  Ref. [8] defines an optimal strategy for buyers and brokers using a game-theoretic derivation, and further shows the existence of network-wide market equilibria obtained by the specific provisioning of this network given specific network dynamics. Indeed, various equilibria may be derived by designing the structure of provisioning in distributed systems, motivated by individual users interests. The continuity of data supplied by the customer demand allows for the continuity of change to the pricing system of the data-serve platform. By allowing a user preference to, loosely, represent a policy, we may interpret a user preference from the data exchange market as a plan to allow users to set their own policies, and rely on the existing framework to implement their preferences. Game-theoretical analysis of mobile data has been presented in [9] as a framework for mobile-data offloading.
This new type of provisioning is described as virtual elasticity in [10], a paper that has recently provided an innovative way to estimate future prices, an avenue of research that is of great interest to the marketing community. The estimation of future prices is difficult in PSP auctions, due to the dynamically changing bids. However, an estimation of future demand (price) can greatly affect the efficiency of the provisioning system, particularly with static resources, such as computer memory.
Finally, we mention that the concern of privacy is addressed in [11]. This paper addresses the problem of privacy between the web user and the advertiser, which is beyond the scope of this paper. However, we mention that the issue of privacy can change based on the platform, and the extent to which we have implemented data privacy, through anonymous bids, may not be sufficient. Our analysis is largely based on the work of [12] and his examination of second price auctions in networked settings. In particular, we make use of the assumption of consistent bids, in the special case where consistent bidding is an optimal solution, i.e., a Nash equilibrium.

3. Market Formulation and Definitions

3.1. The Market Mechanism

We aim to design a distributed PSP auction, operating within a strategic framework that determines the bidding behavior of users in a wireless network. The auction design must must meet a certain set of known criteria: (1) truthfulness, (2) individual rationality/selfishness, (3) social welfare maximization, and (4) an anonymous winning bid. For the secondary data exchange market, we determine that the strategy space must meet additional criteria: (5) privacy and independence from the ISP, (6) locally fair division, and (7) minimize crossover in buyer/seller pools. In second-price markets, the winning bid does not pay the winning bid price, but the price from next lowest bid. This provides the market with the property of truthfulness through incentive compatibility, meaning that a bidder will truthfully reveal its valuation of the resource. The exclusion-compensation principle, or Pareto criterion, is built into the pricing mechanism, and guarantees that at equilibrium, any change to the system would make at least one user worse-off.
Let the set of all wireless users be labeled by the index set I = { 1 , , I } . In our current formulation, we do not allow a seller to host multiple auctions, and so we may assume that data is a unary resource belonging to the seller, and identify each local auction with the index of the seller j I . The bid profiles of the users are given as, s [ s i j ] where ( i , j ) I × I . We assume that all inactive bids are zeroed, i.e., if there is no interaction between two players i and j, then ( i , j ) = 0 . Then, I × I is a matrix, with each element of the matrix representing a single buyer-seller interaction, one projective representation of the space. The matrix allows for ease in our analysis by vectorizing the space, and represents a single snapshot of a static system, all quantities and prices are fixed. We call this space S, as in standard game-theoretic notation, and so the (full) strategy space for buyer i as all possible bids at all auctions: S i = Π j I S i j , and  S i = Π j I Π k i I S k j as the associated opponent profiles.
The grid(s) of bid profiles, s, represents the statistical distribution of player types and corresponding actions, the userwise distributed state of actions in the secondary market. We will use the context of the bid to indicate the user type as well as the notation: s i is a buyer’s bid, s i [ s 1 j , , s i 1 j , s i + 1 j , , s I j ] j I is the profile of user i’s opponents, and  s j a seller’s local auction. We describe the rules as follows:
  • The bid is represented by s i j = ( d i j , p i j ) , indicating that i would like to buy from j a quantity d i j and is willing to pay a unit price p i j .
  • The auction platform maintains and updates all bids.
  • s i j > 0 represents an active bid in s, with bid, s i j = ( d i j , p i j ) .
  • A buyer that does not submit a bid, i.e.,  s i j = 0 , will not receive opponent profiles from seller j.
  • A seller’s profile [ s i ] is comprised of buyers in auction j, and a buyer’s profile [ s j ] a set of auctions in which the buyer holds active bids.
We will assume that a buyer’s budget is sufficient, as the alternative would be to pay a higher price to the ISP.

3.2. Market Incentive

As a market with perfect with incomplete information, we determine that sellers can only gain information about the market by observing buyer behavior in their local auction. Buyers are able to see the sellers reserve price for each market in which they bid. The reserve price of each auction is determined by the valuations of the buyers, that is, the seller takes a passive, or reactive role, and modifies its reserve price according to market demand. Thus the buyer is able to determine the state of the market through the reserve price of its active auctions, and so may be able to infer some behavior resulting from opponent bid profiles. Our analysis focuses the role of buyers, who are able to directly influence global market dynamics. Each buyer i will have information from each seller j, as well as opponent profiles s i , from each auction in which it is participating. In the extreme case, where i submits bids to all auctions j I , buyer i gains access all buyer profiles, [ s 1 , , s I ] for each auction j.
Define the set of sellers chosen by buyer i I as,
I i ( n ) = arg max I I , | I | = n j I D j ,
and similarly, for a seller j I , we define the set of buyers participating in auction j as,
I j ( m ) = arg max I I , | I | = m i I p i j ,
where m , n I .
We now must determine a function which regulates the behavior of the buyers in our dynamic market. We define an opt-out function, σ i , associated with a buyer i as part of its type. Buyer i, when determining how to acquire a possible allocation a, will determine its bid quantities by,
σ i ( a ) = [ σ i j ( a ) ] j I .
In a general sense, σ i applies the PSP rules to our user strategy. The rules presented here incorporate the opt-out function with the auction mechanism. The market price function, P i , for a buyer in the secondary market is:
P i ( z , s i ) = j I σ i j p i j ( z i j , s i j ) = j I inf y 0 : d i j ( y , s i j ) σ i j ( z ) ,
which we interpret as the aggregate of minimum prices that buyer i bids in order to obtain data amount z given opponent profile s i . The maximum available quantity of data in auction j at unit price y given s i j is given as:
d i j ( y , s i j ) = σ i j d i j ( y , s i j ) = D j p k j > y σ k j ( a ) + .
It follows from the upper-semicontinuity of D i j that for s i j fixed, y , z 0 ,
σ i j ( z ) σ i j d i j ( y , s i j ) y σ i j p i j ( z , s i j ) .
The data allocation rule is a function of the local market interactions between buyers and sellers over all local auctions, as is composed with i’s opt-out value, so that for each i I , the allocation from auction j is,
a i j ( s ) = σ i j a i j ( s ) = min σ i j ( a ) , σ i j ( a ) p k j = p i j σ k j ( a ) d i j ( p i j , s i j ) .
Remark 1.
The bid quantity σ i j ( a ) and the allocation a i j are complementary.
Finally, we must have that the cost function.
c i ( s ) = j I p i j a i j ( 0 ; s i j ) a i j ( s i j ; s i j ) .
The cost to buyer i adds up the willingness of all buyers excluded by player i to pay for quantity a i j , i.e.,
c i j ( s ) = 0 a i j p i j ( z , s i j ) d z .
This is the “social opportunity cost” of the PSP pricing rule.

3.3. The Anonymity Problem

The PSP auction given in [3] is comprised of a set of simple and symmetric rules that closely follow market theory, and as it is distributed we require privacy to be computed on an individual basis, each user must be able to confirm its own anonymity. We describe the process as given in [13]. In general, a distributed computation, where buyer i is part of a coalition comprising auction j, is as follows:
Denoting m i = [ ( s i j , r i ) , m 1 , , m n ] k i I , buyer sends a message to each of its opponents, where s i j is i’s bid, r i is an independent random value, and  m 1 , , m n the messages i has received so far. Then, all buyers are able to confirm the winning bid s i ¯ * . It was proven in [13] that full privacy is not possible in a second price auction, even if we allow partial revelation and weak coalitions. We propose anonymity, in the winning bid only.

3.3.1. Buyers Are Anonymous

In our secondary market, we have that any local auction is anonymous by definition, as a permutation of the valuations results in a permutation of allocations and prices, equivalently, exchanging the bids of two losing buyers does not change the auction’s result. Formally,
Definition 1
((Anonymous auction) [13]). Given an auction j and buyers i I , a protocol for computing max { i I : p i j p k j k I } if for all coalitions T I , any pair of inputs x = [ s 1 j , , s I j ] , ξ , so that ξ is a permutation of x, i T : x i = ξ i , and  max ( ) , and any choice of random inputs { r i } i T . Let T ¯ = T × I \ T ,
P r [ x , { r i } i T ] x | { r i } i T
= P r [ ξ , { r i } i T ] ξ T × I \ T | { r i } i T ) ,
which states that any two inputs, the messages seen by coalition T are identically distributed.

3.3.2. The Winning Bid Is Trusted (Anonymous) Information

We claim that a buyer’s trust in a local auction is fulfilled when the outcome of the auction is guaranteed to be correct, and if the winner’s identity remains private information. For each local auction, we define a coalition to be the participating buyers. The winning bidder is chosen by distributed computation via homomorphic encryption. We present the Lemma in its general form,
Lemma 1
(Benaloh 1987). f ( x 1 , x 2 , , x n ) = i = 1 n x i mod p is privately computable.
Thus, it is possible to anonymously compute,
ω = max ( [ p i j ] i I j ) = ( p 1 j , p 2 j , , p n j , arg max ( p j ) ) .
Algorithm 1 presents the procedure determining the winner of auction j for some fixed time in the bid progression, where D j > 0 .
Algorithm 1 Max bid private computation.
1:
ω 1 , e 0
2:
while  e 1 do
3:
for  i I j  do
4:
  if  p i j ω  then
5:
    p i j 1
6:
  else
7:
    p i j 0
8:
  end if
9:
end for
10:
e = i I j p i j mod ( n + 1 ) (Lemma 1)
11:
for  i I j  do
12:
  if  p i j e  then return  i ( w i n n e r )
13:
  end if
14:
end for
15:
end while
The winning buyer then leaves the auction, and so we have that the privacy of the winning buyer is persistent. We note that it is possible for a winner to anonymously rejoin an auction; however, this does not alter our result. At time t = 0 , a seller j entering the market will submit bid s κ j = ( D j , ϵ ) to the public data exchange platform, and so the initial bid s κ j , is public knowledge. The auction begins at time t > 0 , and at t = 0 , j will initializing its reserve price by executing a single bid iteration.
We will assume that the cost of participating in the secondary market is absorbed by the bid fee, which could represent data used in submitting bids, or a fee charged per unit of data, or a flat rate charged at the completion of the purchase. We do not model ISP revenue, but assume it may be extracted from the bid fee at t = 0 .
The formulation is inspired to the thinnest allocation route for bandwidth given in [3]. We note that if a single seller j can satisfy i’s demand, then (8) reduces to the original form, defined in [12] as “a simple buyer at a single resource element”.

3.3.3. Truthfulness (Incentive Compatibility)

We will prove that the dominant strategy for buyers is to submit coordinated bids, where all bids the buyer submits are equal. Our motivation for coordinated bids comes from the idea of potential games. In potential games, the incentive of all users to change strategy can be expressed as a single global function. We map the incentive of a buyer over all auctions j I to a single potential function. This is a standard method that is used often, as it simplifies the analysis of both strategy and auction design. Thus, our strategic bid is an ϵ -best response. The necessary condition of an ϵ -best reply is that the new bid price must differ from the last by at least ϵ . Now, an  ϵ -best reply for user i is p i * = θ i ( σ i ( a ) ) + ϵ , for a given opponent profile s i , and for each j I i . Now, as  ϵ is the bid fee, we have that p i j is equal to the marginal valuation of player i in auction j, and so incentive compatibility holds.

4. Strategic Framework

4.1. User Valuation (Strategic Incentive)

In any market, a buyer or seller would like to obtain the maximum amount of utility possible while staying within budget. The buyer’s utility maximizes the amount of data allocated by the seller, while the seller’s utility maximizes the cost of the data sold. We illustrate the resulting product space for the buyer in Figure 1.
The level, or price associated with the buyer’s bid may be projected onto a line. As we will show, this holds when buyers use the same bid price for all non-zero bids. The projection, or the amount of data requested, is a plane, since buyers may bid in more than one auction. Clearly, the allocation is the product of the price and the data request. The resulting step function is convex. We define a move to a better market position to be synonymous with a strategic bid.
Remark 2.
The terms “bid” and “strategy” are often interchangeable, from auction design and game theory, respectively.
Our mechanism allows a buyer to opt-out of auctions by submitting zero bids. This strategy maximizes utility while minimizing the number of positive bids submitted to the overall market. We define each buyer as a user i I with quasi-linear utility function u i = [ u i j ] j I , a buyers’ utility function is of the form,
u i = θ i σ i ( a ) c i ,
where the composition of the elastic valuation function θ i with σ i distributes a buyers’ valuation of data allocation a across local markets (and thus multiple sellers). The composition map (the codomain of θ i ( σ i ) is the same as the domain of σ i ( a ) ) and restricts the buyer’s domain to minimize d j p j c i and so maximize u i . We formally extend the PSP rules described in [12] to determine the presence of equilibria across fully connected subsets of local data-exchange markets. By fully connected, we mean that the market subset maintains its own equilibrium without the influence of any other data-exchange (any other auction). The sellers, j I are not associated with an opt-out function. The sellers’ strategy can only be to determine the reserve price of their local auction, using only information from buyers who have not opted out.
Remark 3.
It is possible that a seller would be able to derive information about other auctions by examining buyer bids over time, particularly if the seller had knowledge of the buyer strategy. In this work, we assume sellers are unable to derive opponent information from buyer bids.
Elastic valuation functions allow for even infinitesimal changes in the market dynamics to be modeled. We give the definition for an elastic valuation function as in [3].
Definition 2
(Elastic demand [3]). A real valued function, θ ( · ) : [ 0 , ) [ 0 , ) , is an (elastic) valuation function on [ 0 , D ] if
  • θ ( 0 ) = 0 ,
  • θ is differentiable,
  • θ 0 , and  θ i is non-increasing and continuous,
  • There exists γ > 0 , such that for all z [ 0 , D ] , θ ( z ) > 0 implies that for all η [ 0 , z ) , θ ( z ) θ ( η ) γ ( z η ) .
The elastic valuation of users and homogeneous nature of data in the secondary market allows for continuity in the constraints imposed by the user strategies. We begin our analysis with buyer valuation θ i . A buyers’ valuation of an amount of data represents how much a buyer is willing to pay for that amount. This is equivalent to the bid price, given a fixed amount of data, satisfying θ i . We determine the buyers’ utility-maximizing bid given quantity z 0 to be a mapping to the lowest possible unit price. We have,
f i ( z ) inf y 0 : ρ i ( y ) z , j I ,
where ρ i ( y ) represents the demand function of buyer i at bid price y 0 , and gives the quantity that buyer i would buy at a given price. We determine that the market supply function corresponds to an extreme of possible buyer demand, and acts as an “inverse” function of f i . We have, for bid price y 0 ,
ρ i ( y ) = j I : p i j y D j .
We note that f i is such that i could still bid in any auction j I . Therefore, the utility-maximizing bid price is the lowest unit cost of the buyer to participate in all auctions, and corresponds to the maximum reserve price amongst the sellers.
From the perspective of the seller we have a more direct interpretation of valuation as revenue. We determine the demand function of seller j at reserve price y 0 to be,
ρ j ( y ) = i I : p i j y σ i j ( a ) ,
and define the “inverse” of the buyer demand function for seller j as potential revenue at unit price y, we have,
f j ( z ) sup y 0 : ρ j ( y ) z , i I ,
and, unsurprisingly, f j maps quantity z to the highest possible unit data price.
The valuation of any user must be modeled as a function of the entire marketplace. Naturally, a buyers’ valuation is aggregated over local markets, and the sellers’ valuation is aggregated over its own auction. We have already introduced the composition θ i σ i as the valuation of the buyers. We further show that user valuation satisfies the conditions for an elastic demand function, with valuations based on (11) and (12). We first note that, in general (and so we omit the subscript/superscript notation), the valuation of data quantity x 0 is given by,
θ ( x ) = 0 x f ( z ) d z ,
as in [12]. Now, we have the following Lemma,
Lemma 2
(User valuation). For any buyer i I , the valuation of a potential allocation a is,
θ i σ i ( a ) = j I 0 σ i j ( a ) f i ( z ) d z .
Now, we may define seller j’s valuation in terms of revenue,
θ j = i I θ j σ i j ( a ) = i I 0 σ i j ( a ) f j ( z ) d z .
We have that θ i and θ j are elastic valuation functions, with derivatives θ i and θ j satisfying the conditions of elastic demand.
Proof. 
Let ξ be a unit of data from buyer bid quantity σ i j ( a ) . If  ξ decreases by incremental amount x, then seller bid d i j must similarly decrease. The lost potential revenue for seller j is the price of the unit times the quantity decreased, by definition, f j ( ξ ) x , and so,
θ j ( ξ ) θ j ( ξ x ) = f j ( ξ ) x .
Thus (14) holds. As we may use the same argument for (13), as such, we will denote f i = f j = f for the remainder of the proof. We observe that the function f is the first derivative of the valuation function with respect to quantity. Letting θ i = θ j = θ , the existence of the derivative implies θ is continuous, and therefore, in this context, f represents the marginal valuation of the user, θ . Also, clearly θ ( 0 ) = θ ( σ ( 0 ) ) = 0 . Now, as we consider data to be an infinitely divisible resource, we have a continuous interval between allocations a and b, where a b . Now, as  θ is continuous, for some c [ a , b ] ,
θ ( c ) = lim x c θ ( x ) θ ( c ) x c = f ( c ) ,
and so f = θ is continuous at c [ a , b ] , and so as a 0 , θ 0 . Finally, we have that concavity follows from the demand function. Then, as  θ is non-increasing, we may denote its derivative γ 0 , and taking the derivative of the Taylor approximation, we have, θ ( z ) θ ( η ) + γ ( z η ) .    □
The sellers’ natural utility is the potential profit, or simply u j = θ j , where we have chosen to omit the original cost of the data paid to the ISP, as it is not a component of our mechanism, and as a discussion of mobile data plans is outside the scope of this paper. Now, a rational user will try to maximize its utility, thus, user incentive manifests as a response to market dynamics. A buyer has the choice to opt-out of any auction, and as a seller will try to sell the maximum amount of data, the highest possible reserve price is conditioned by “natural” constraints. Utility-maximization acts as revenue maximization for a rational seller, and as cost minimization for a rational buyer. Thus, for each user p i j min ( p i j ) and p i j max ( p i j ) , which holds i , j I such that s i j > 0 . Now, rational buyer does not want to purchase extra data, as this would be equivalent to overpaying, however i submits positive bids to a set of sellers, and a rational seller will attempt to maximize profit, and so will try and sell all of its data. Therefore,
i I σ i j ( a ) D j and j I d i j D i ,
which holds i , j I . We will assume that buyers and sellers do not overbid, and so omit this constraint from our formulation. Thus, at equilibrium all users are satisfied, and  D j = D i , although we observe that this result does not imply that s i = s j .
Finally, it is worth mention that the analysis of the auction as a game assumes some forms of demand and supply, in order to derive properties. The mechanism itself does not require any knowledge of user demand or valuation.

4.2. User Behavior

The user local strategy space is non-deterministic: the preferences of users are subject to change, determinations and predictions are based on the binary dependence of the variables. Arrow’s Theorem states that no deterministic strategy can provide a mapping of the preferences of users into a market-wide (complete and transitive) strategy. As individual bids cannot map to a general objective, a better market position can only be determined by an adaptive strategy. We will address the market risks and securities in our secondary data exchange market, and provide a game-theoretic model of a real market progression, which we then use to derive, and then define, adaptive variables.
Assuming equal bandwidth for all users, we derive a globally optimal strategy suited for users with local information in a distributed data-sharing model. In a multi-auction market, each auction a buyer joins has the possibility of decreasing the potential cost of its data. However, increasing the size of the auction implies a certain risk, which we may interpret as a definite liability. Increasing the number of transactions causes additional messaging overhead, fees, and increased competition from other buyers. A transaction also causes potential indirect costs, which may be considered work done to find sellers, or effort of communication from participation. A seller has the potential for greater profit with each new buyer in its auction, taking the same risk. To simplify our analysis, here the liability of any user is naturally absorbed into the bid fee ϵ , as in [12]. Therefore, according to our interpretation, the bid fee is dependent on the association between two users and their market positions, in addition to the underlying network structure. Now, both sellers and buyers must consider the cost of adding additional users to their subsequent pools.
Buyer i’s seller pool is determined by minimizing n, and is the smallest set of sellers that allows for a coordinated bid, and the aggregate bids satisfy its demand, D i .
min { n I | n D n D i } .
Similarly, seller j determines the minimal set of buyers that maximizes revenue and sells all of its data, D j .
min m I | i I j ( m ) d i j D j ,
We further determine that the set of buyers and sellers participating in a single equilibrium is bounded by the potential indirect costs of participation. We will denote this individual cost to each user as ϱ . The indirect cost is the portion of the bid fee ϵ that is dependent on the underlying network and the individual. Observing that ϱ indirectly effects user utility, and therefore acts to establish a natural budget for each user. We define this constraint as,
u ϱ ,
which may be interpreted as the effort a rational user is willing to expend on its message space, and serves to limit the size of the buyer/seller pools. This information may be collected from a specific device’s configuration, i.e., enabled roaming, daily data restrictions. It is clear that an unconstrained market, even with a finite number of users, could suffer from the expense of many local auctions trading an infinitely divisible resource, thus ϱ is interpreted as the “liability” component of ϵ , and attempts to regulate network congestion.

4.2.1. Buyer Strategy

Although it is possible for a seller to fully satisfy a buyer i’s demand, it is also reasonable to expect that a seller may come close to using their entire data cap, and only sell the fractional overage. In this case, a buyer must split its bid among multiple sellers. The buyer strategy bids in auctions with the highest quantities first, a natural exploitation of the demand curve. A new seller entering the market with a large quantity of data will be in high demand. This behavior contributes to market price stability, as seller valuation is determined by buyer demand, the buyer strategy tends towards equal valuation of all local markets, and therefore similar prices. If a buyers’ demand is not satisfied, they will need to bid in markets with smaller data quantities, and so will bid on a larger portion of the sellers’ bid quantity, increasing their unit price. We define j * = n I represent the seller with the least amount of data I i , i.e.,  D j * D j , j I j . We define the composition,
σ i j a = σ i j ( a ) = a i j | I i | ,
to be the buyer strategy with respect to quantity for all sellers j I i . We propose the following strategy.
Lemma 3
(Opt-out buyer strategy). Let i I be a buyer and fix all other buyers’ bids s i at time t > 0 , and let a be i’s desired allocation. Define,
σ i j ( a ) σ i j * ( a ) , j I j , 0 , j I j .
and bid price p i j = θ i ( σ i j ( a ) ) . Now, (19) holds j I .
Each time step, s j , the vector of bids held by auction j, is updated and is shared with all participating buyers. At this point buyers have the opportunity to bid again, where a buyer that does not bid again is assumed to hold the same bid, since a buyer dropping out of the auction will set their bid to s i j = ( 0 , 0 ) . The implementation of the Opt-out buyer strategy is presented in Algorithm 2.
Proof. 
We assume that a buyer will try and fill their data requirement. In the case that there exists a seller who can completely satisfy a buyers’ demand, j * = 1 , | I i | = 1 and (16) holds. If such a buyer does not exist, as the set I i is ordered by the quantity of the sellers’ bids, i may discover j * by computing I i . Suppose that D i > j I D j , then j * > I and I i = Ø . We model the ISP at time t > 0 as a seller κ with bid s κ = ( d κ , p κ ) , where d κ > D j , j I i , and  p κ represents the price for data set by the ISP, which we note is also the upper bound of the sellers’ pricing function. We note that in [14] this cost is the data overage fee. Consider some k i I where p i j = p k j . The allocation rule (5) determines that the data will be split proportionally between all buyers with the same unit price. It is possible that the resulting partial allocation of data to i and k would not satisfy some demand. As the two cases i and k are the same, we will only consider one. Suppose seller j updates its bid to reflect the new data quantity, where d i j ( t + 1 ) < σ i j ( t ) ( a ) . First, i sets its bid to s i j = 0 , and from the new subset I i , submits bids until j I i σ ( a ) i j D i , by (15). Now, we consider the case where a new buyer k with bid price p k j > p i j for some j I i , in other words, a new buyer k may enter the market with a better price, decreasing the value of i’s bid for j I i . In this case, by (16), i will choose I i so that, σ i j ( t + 1 ) ( a ) = σ i j ( t ) ( a ) σ k j ( t ) ( a ) , and so I i is large enough to balance the additional demand from k. Finally, we consider the case where | I j | = I , where the demand of buyer i exceeds the supply, and the case where σ i ( ϱ ) > θ i ( σ i ( a ) ) , where the overhead exceeds the current valuation of the data. Then, by (9), the valuation of the data increases until either the demand is satisfied, the debit from the overhead costs are balanced (18), or the upper bound of the sellers’ reserve price p κ is reached. Thus, as in each case we have that i is able to satisfy their demand, and we determine that the opt-out strategy is optimal.    □
Finally, we note that I i is not the only possible minimum subset I able to satisfy i’s demand, in fact, by restricting the size of the set I i , we would be able to improve the computation time of buyer i, at the cost of increasing the price.
Algorithm 2 Buyer response.
1:
p i ( 0 ) ϵ , s i ( 0 ) ( p i , D i ) , D t D i , compute I i ( 0 )
2:
Update s i
3:
while D i ( t ) > 0 do
4:
D i ( t + 1 ) j j I i σ i j ( t ) ( a )
5:
if  D i ( t + 1 ) j < D t  then
6:
  Compute I i ( t )
7:
   p i θ i ( σ i ( a ) )
8:
end if
9:
s i ( t + 1 ) ( σ i ( a ) , p i )
10:
 Update s i
11:
D i ( t + 1 ) j D i ( t ) j
12:
t t + 1
13:
end while

4.2.2. Seller Strategy

We define the reserve price for seller j as,
p * j = p i * j + ϵ ,
where i * is the highest losing bidder with respect to bid price. We claim that the choice of reserve price p * j does not force any buyers out of the local auction. In order to maximize revenue, the seller must also be able to respond dynamically to strategic bids. In order to do this, we determine that the seller may modify its reserve price in response to the changing market dynamics.
Define any auction duration to be τ [ 0 , ) . We will show that sellers are able to maximize revenue in restricted subset of buyers in I , and as such will attempt to facilitate a local market equilibrium for this subset. A local auction j converges when i I , s i j ( t + 1 ) = s i j ( t ) , at which point the allocation is stable, the data is sold, and the auction ends. In the sellers’ local environment, we determine that the best course of action is to maximize revenue, and then try to keep its buyer pool stable until convergence occurs.
Lemma 4
(Localized seller strategy (i.e., progressive allocation)). For any seller j, fix all other bids [ s i k ] i , k j I at time t > 0 τ . For each t τ , let ω ( t ) be given by (7), and perform the update,
D j ( t + 1 ) = D j ( t ) σ ω ( t ) j ( t ) ( a ) .
Allowing t to range over τ, we have that D j = 0 , and a local market equilibrium.
Consider a user purchasing data from a subset of other network users. The sellers’ auction will function as follows: at each bid iteration all buyers submit bids, and the winning bid is the buyer i that has the highest price p i j . The seller allocates data to this winner, at which point all other buyers are able to bid again, and the winner leaves the auction (or equivalently, maintain their bid). The auction progresses as such until all the sellers’ data has been allocated. The seller progressive allocation algorithm is given in Algorithm 3.
Proof. 
We assume that the seller will try to maximize its revenue. In the case where | I j | = 1 , then if σ i j ( a ) = D j , then j’s market is at equilibrium. Otherwise, we arrive at the case of multiple buyers, which we note includes the case where σ i j ( a ) < D j , which is reflected trivially here.
For auction j with multiple buyers, i * is the losing buyer with the highest unit price offer, determined by (17), Suppose that for some i I j , buyer demand is not met. In this case, by (15) the seller must notify i of a partial allocation by changing the bid vector at index i. With this caveat, and Proposition 3, we have that the aggregate demand of subset I j is satisfied by seller j. Although the buyers’ valuation θ i is not known to the seller, we will assume that buyers are bidding truthfully, and so the new reserve price p i * j + ϵ = θ i * + ϵ . For clarity, let the reserve price be denoted by p * j . Now, by the elasticity of (9) and (12), we have that, z 0 , f i * ( z ) < f j ( z ) f i ( z ) , which holds i I j , and  j I i . We claim that the choice of reserve price p * j does not force any buyers out of the local auction. To show this, we use the assumption of truthful bids, and the fact that since the auction begins at time t > 0 , buyers will bid at least once. As will be addressed in further analysis, we assume that a new bid price differs from the last bid price by at least ϵ . Suppose the auction starts at equilibrium, so i I j σ i j ( a ) = D j at time t = 0 . The reserve price p * j set at time t = 0 begins the auction with the first bid iteration, and so at t > 0 , i I j , we have that p i j p * j ϵ . Now, in the case where at t = 0 , i I j σ i j ( a ) > D j , by (5), the seller notifies (any) buyer k with the lowest bid price of a partial allocation by changing d k j thus by Proposition 3, k either decreases its demand or increases its valuation until σ i j ( a ) d i j . Then, as the seller computes the set I j at each time step, a new i * may be chosen and the buyers bid again. Suppose k I j such that l I k , i I l i k I j . That is, k is disconnected from all other buyers i I j , and suppose that d k j is partial allocation at t > 0 , and further suppose that there are many l I k where | I l | > | I j | . The more buyers an auction has, the more likely that cases will occur that cause buyers to rebid, particularly if auctions l I k have overlapping buyers, then k may opt-out of auction j, i.e.,  s k j ( t ) s k j ( t + 1 ) = 0 , then the seller may simply return the tentatively allocated data to D j . Finally, we note that if for some i I j k I j such that p i j = p k j , then the seller again notifies the buyers of a partial allocation by changing d i j and d k j by (5). Thus we determine the valuation between seller j and buyer i is well-posed, the reserve price (20) is justified, and we have a local equilibrium at time τ .    □
Remark 4.
In the case where market resources do not satisfy (15), we reason that in the case of insufficient data in the market buyers may wait for additional sellers or purchase from the ISP, κ, as a monopoly sale. Similarly, in the case of insufficient demand, where we may assume that data is held at time t = 0 by κ at bid price ϵ.

4.3. A Simple Example

Example 1.
Finally, we give an additional simple example of convergence to a local market equilibrium, where the buyers are assumed to respond with their truthful, ϵ-best replies. The data for this example is shown in Table 1.
Algorithm 3 Seller progressive allocation.
1:
p j ( 0 ) ϵ , s j ( 0 ) ( p j , D j ) , I ¯ = Ø , compute I j ( 0 )
2:
Update s j
3:
while  D j ( t ) > 0   do
4:
i ¯ max i I j i I j p i j
5:
D j ( t + 1 ) D j ( t ) σ i ¯ j ( t ) ( a )
6:
p j p i * j + ϵ and d j D j ( t + 1 )
7:
s j ( t + 1 ) ( d j , p j )
8:
 Update s j
9:
I ¯ I ¯ i ¯
10:
for  k I ¯  do
11:
  if  p k j < p i * j  then
12:
    D j ( t + 1 ) = d k j
13:
    I ¯ I ¯ \ { k }
14:
  end if
15:
end for
16:
 Compute I j ( t )
17:
I j ( t + 1 ) = I j ( t ) \ I ¯
18:
t t + 1
19:
end while
Let s ( 1 ) = [ ( 65 , ϵ ) ] i I and s ( 2 ) = [ ( 85 , ϵ ) ] i I . The buyer bids are as follows:
s A = [ ( 0 , 0 ) , ( 50 , 1 ) ] , s B = [ ( 0 , 0 ) , ( 40 , 1.2 ) ] , s C = [ ( 0 , 0 ) , ( 26 , 1.5 ) ] , s D = [ ( 0 , 0 ) , ( 20 , 2 ) ] , s E = [ ( 0 , 0 ) , ( 14 , 2.2 ) ] .
Then at t = 1 , we have bid vector s ( 2 ) = [ ( 0 , p ( 2 ) ) , ( 20 , p ( 2 ) ) , ( 26 , p ( 2 ) ) , ( 20 , p ( 2 ) ) , ( 14 , p ( 2 ) ) ] , and so ( D ( 2 ) , p ( 2 ) ) = ( 85 , 1 + ϵ ) , The buyer response is,
s A = [ ( 50 , 1 ) , ( 0 , 0 ) ] , s B = [ ( 40 , 1.2 ) , ( 0 , 0 ) ] , s C = [ ( 0 , 0 ) , ( 26 , p ( 2 ) ) ] , s D = [ ( 0 , 0 ) , ( 20 , p ( 2 ) ) ] , s E = [ ( 0 , 0 ) , ( 14 , p ( 2 ) ) ] .
At t = 2 , ( D ( 1 ) , p ( 1 ) ) = ( 65 , 1 + ϵ ) , with bid vector s ( 1 ) = [ ( 25 , p ( 1 ) ) , ( 40 , p ( 1 ) ) , ( 0 , 0 ) , ( 0 , 0 ) , ( 0 , 0 ) ] . ( D ( 2 ) , p ( 2 ) ) = ( 25 , 1 + ϵ ) . Then,
s A = [ ( 25 , p ( 1 ) ) , ( 25 , p ( 2 ) ) ] , s B = [ ( 40 , p ( 1 ) ) , ( 0 , 0 ) ] ,
where we have removed bids to indicate winner(s) with a tentative allocation. At t = 3 , ( D ( 1 ) , p ( 1 ) ) = ( 50 , 1 + ϵ ) , with bid vector s ( 1 ) = [ ( 25 , p ( 1 ) ) , ( 40 , p ( 1 ) ) , ( 0 , 0 ) , ( 0 , 0 ) , ( 0 , 0 ) ] . ( D ( 2 ) , p ( 2 ) ) = ( 0 , 1 + ϵ ) and s ( 2 ) = [ ( 25 , p ( 1 ) ) , ( 0 , 0 ) , ( 26 , p ( 2 ) ) , ( 20 , p ( 2 ) ) , ( 14 , p ( 2 ) ) ] . Then,
s A = [ ( 25 , p ( 1 ) ) , ( 0 , 0 ) ) ] .
At t = 4 the auction ends.

4.3.1. Individual Rationality/Selfishness

We conclude this portion by examining the relationship between the strategies of buyers and sellers in local auctions. We have proven that a buyer cannot have a negative utility. Our strategic framework creates an incentive for the seller to maintain a local equilibrium, where supply equals demand. A truthful bid implies that the new bid price differs from the last bid price by at least ϵ . As a seller must distribute bid vectors to all buyers in its auction, we reason that the seller may employ a strategic caveat. The seller will notify a buyer who is subject to a market shift by changing its bid at the appropriate index. As we have shown, the seller is a functional extension of the buyer, with rules determined by the buyers’ behavior. This gives an auction j a natural logical extension into the global market through its buyers. We demonstrate that the symmetry between buyer and seller behavior, consequently strategies, stretches into a symmetry across subsets of local auctions. Value is modeled as a function of the entire marketplace: a buyer’s valuation is aggregated over all the auctions, and the seller’s valuation is aggregated over its own auction. We must ensure that a user’s private action satisfies the conditions of a direct-revelation mechanism, as well as adheres to the collective goals. We show that, from Lemma 4 and Definition 3, an individual user will contribute to local stability, given global market dynamics S.
We model the impact of the dynamics of S of the data-exchange market on a local auction j. The market fluctuations from S give auctioneer j the chance to infer information about the global market. We identify a clear bound restricting the range of influence that local auctions have on each other. Consider a single iteration of the auction, where a seller updates bid vector s j , and the buyers’ response s i , to comprise a single time step. We have the following Proposition,
Proposition 1
(Valuation across local auctions). For any i , j I ,
j I i i I j .
Fix an auction j I with duration τ and define the influence sets of users. The primary and secondary influencing sets are given as,
Λ = i I j I i , and λ = i I j k I i I k .
Define Δ = Λ λ . Fixing all other bids s i j I , and time t > 0 τ , we have that,
j Λ θ i j = i λ θ i j .
Proof. 
As this is our main result, we provide an outline of the (exhaustive) proof, illustrating the most important case, when a market shifts affect auction j, and the direct influence of the shift on the connected subset of local markets.
A local auction j I , is determined by the collection of buyer bid profiles. Using Lemma 4 and (22), we have that,
i I j p i j > p i * j ,
where we define i * as the losing buyer with the highest bid price in auction j. By (9) p i j p i * j + ϵ , thus p i j < p i * j can only happen during a market shift. Consider k I j at time t where, for example, some buyer(s) enter the auction, and so (25) implies that i I j σ i j ( a ) > D j . Now, p i j < p i * j k I j and s k j > 0 will cause k to initiate a shift. By Definition 3, k will set s k j = 0 , and begin to add sellers to its pool. Suppose that at time t, j’s market is at equilibrium. Unless k adds a seller with a higher reserve price within | I j | time steps, by (21), the auction ends. We have that, i I j , s i j > 0 where i I j , and (22) holds.
Now, the subset I j I determines j’s reserve price p i * j . We will assume the buyer submits a coordinated bid, using (5). The reserve price (20) of seller j is determined at each shift, and is the lowest price that j will accept to perform any allocation. Let p * j denote the reserve price of auction j and p i * denote the bid price of buyer i, i.e., p i k = p i * , k I i . Using Lemma 4, for each i I j , we have from (9), (12), that p i * p * k , k I i . In the simplest case, consider a disjoint local market j, where i I j , s i k = 0 , k j I i Λ = { j } and λ = I j . Again using (9) and (12), it is clear that θ i = θ j , i I j . In all other cases, the sellers Λ are competing to sell their respective resources to buyers whose valuations are distributed across multiple auctions. The bid price of buyer i I j is determined by, p i * = max k I i ( p * k ) . Λ is the set of sellers directly influencing the bids of buyers in auction j. Now, the reserve price for auction j is such that, p * j min i I j ( p i * ) ϵ . From (23), Λ is defined by a seller j I , where each user k λ has some direct or indirect influence on j. Denote Δ j = Λ j λ j .
Consider the set λ j . For some buyer i I j , and then for some seller k I i , we have a buyer l I k . By (22), i , l I k , and so the reserve price p * k min ( p l * , p i * ) , and k , j I i p i * max ( p * k , p * j ) . Suppose that l I j j I l , so that p l * < p * j , and the valuation of buyer l does not impact auction j and vice versa, i.e., θ l j = 0 . Since l I k , p l * p * k p * k < p * j , and i I j p i * p * j . Therefore, we have that the ordering implied by (23) holds, and,
p * k p l * < p * j p i * ,
for any buyer l λ j such that l I j . We use a similar argument for a secondary user q I l .
Finally, consider the subset Λ j ; a shift occurs in 2 cases. (1) If i I j decreases its bid quantity so that i I j σ i j ( a ) < D j , and (2) if buyer i * , defined in Lemma 4, increases its valuation so that p i * j < p * j . Fixing all other bids, a decrease in q’s demand will directly impact buyer i. If at the end of the bid iteration, we still have that i is the buyer with the lowest bid price, then (12) holds and j’s valuation does not change. Otherwise a new i * will be chosen upon recomputing I j , as a consequence of Definition 3 and Lemma 4, and the market will attempt to regain equilibrium. We determine the influence of Δ k * on Δ j by (25).
In each case we have that (9) and (12) hold for some fixed time t, and so, i I j , any bid outside of our construction has a zero valuation, with respect to buyers λ and sellers Λ , and therefore cannot cause shifts to occur except through a shared buyer, e.g., some l I k . Thus, in all cases, (9) and (12) hold. Fixing all bids in any auction where q Λ j , i I j , k I i , l I k ,
0 σ i k ( a ) f i ( z ) d z = 0 σ i k ( a ) f k ( z ) d z ,
and
0 σ l k ( a ) f k ( z ) d z = 0 σ l k ( a ) f l ( z ) d z .
Thus, with a slight abuse of notation for clarity,
λ 0 σ ( a ) f Λ ( z ) d z = Λ 0 σ ( a ) f λ ( z ) d z ,
where the result follows by construction, and the continuity of θ . □
For completeness, in the case where the ISP κ does not adhere to the market dynamics, so p κ > p j + ϵ , j I , then we may absorb the overage (difference) as part of the bid fee.

4.3.2. Locally Fair Division

We claim that the allocation a by seller j for a local auction at equilibrium is an equitable division, a fair division where each buyer equally values their valuation. We have that equitable division holds from (27) Proposition 1.

4.3.3. Social Welfare Maximization

We define an optimal state of social welfare to be when valuations are equal across a subset of local auctions. Then, Δ I to be a subset of users where an optimal social welfare is achieved.

4.3.4. Social Welfare Maximization (Exclusion-Compensation)

We define an optimal state of social welfare to be when valuations are equal across a subset of local auctions. Then, Δ I is the subset of users where social welfare is achieved. We finally have:
Corollary 1
( Δ -Pareto efficiency). The subset Δ I is Pareto efficient, in that no user can make a strategic move without making any other user worse off.
Proof. 
Define s * = ( z * , θ * ( z * ) as the set of truthful ϵ -best replies for user i given opponent bid profile S i , where j I i , s * j = s * . Since θ i is continuous, as was shown in Lemma 2, and as s | Δ = { [ s i j ] λ j × Λ j } is continuous in s on S k = Π k λ j S k j , then given that s * = s * = ( f * ( p * ) , p * ) = ( z * , θ ( z * ) ) , we have that s * is truthful. The result now follows directly from the result of Proposition 1. □

5. Equilibrium Analysis

We intend to show evidence shared network optima (a global optimum). A buyer i I will have incentive to change its bid quantity if it increases its opt-out value σ i , and therefore its utility (8). We will show that, without loss of utility, buyer i may use a “consistent” bid strategy within its seller pool, i.e., d i j = d i k , j , k I i , and as such, Proposition 3 supports an optimal strategy with respect to (8). Our result shows that a buyer may select I i in order to maximize its utility while maintaining a coordinated bid strategy. Reasonably, if j * < I , a buyer may increase the size of its seller pool I i , thereby lowering its coordinated bid quantity while obtaining the same (potential) allocation a i . As buyer i submits identical bids to multiple auctions, the bid price must be as high as the highest reserve price p i j I i . Buyer i’s bid then has identical bid price p i j j I i . We further note that i optimal strategy does not require reducing its bid price to a minimum in each auction, where the bid quantity σ i j ( a ) is still fulfilled. The pricing rule of the PSP auction dictates that a buyer i will pay the cost of excluding other players from the auction, and as i’s bid price reflects its valuation of it data requirement D i across all local markets, we have identical bid prices in each auction where s i j > 0 . Obviously, if j I i , then θ i j = 0 .
Lemma 5
(Opt-out buyer coordination). Let i I be a opt-out buyer and fix all sellers’ profiles s j . For any profile S i = ( D i , P i ) , let a i j a i j ( s ) be a tentative data allocation. For any fixed S i , a better reply for i in any auction is x i = σ i ( z i , y i ) , where j I i ,
z i j = σ i j ( a ) , y i j = θ i ( z i j ) .
Furthermore,
a i j ( z i , y i ) = z i j ,
and
c i j ( z i , y i ) = y i j ,
where i’s strategy is as in Proposition 3.
The proof follows closely the work in [12].
Proof. 
As s i is fixed, we omit it, in addition, we will use u u i u i ( s i ) u i ( s i ; s i ) . In full notation, we intend to show
u i ( ( d i , p i ) ; s ) u i ( ( z i , y i ) ; s i ) .
Now, if there exists a seller who can fully satisfy i’s demand, then | I i | = 1 , and the case is trivial as no coordination is necessary for a single bid. Otherwise, buyer i’s demand can only be satisfied by purchasing data from multiple sellers. We will show that i may increase | I i | , and so decreasing d i j , j I i , without decreasing j I i u i j . Buyer i maintains ordered set I i where the sellers with the largest bid quantities are considered first; the index of seller j * defines a minimal subset I i , satisfying (16). By construction, d i j * is the minimum quantity bid offered by any j I i . Thus by (16) and (19), j I i , k I i , σ i k ( a ) z i j = σ i j ( a ) , and so, using (24),
σ i j ( a ) D j k I j : p k j > y i j d k j + .
The buyer valuation function (13), guarantees that j I i , y i j p i * j , where p i * j is the reserve price of seller j, defined in Proposition 4, and is by definition the minimum price for a buyer bid to be accepted. As D ¯ i j is non-decreasing, j I i , k I i ,
D i j ( y i j ) D i j ( p i j ) D i j ( p i k ) .
Thus (32) holds and so, by (5),
a i j ( z i , p i ) = min i I j z i j , D j p k j > y i j d k j + = z i j = σ i j ( a )
where the last equality is by definition, and so (30) is proven. From (3), D ¯ i j ( y , s i ) = 0 y < p i * j , and D ¯ i j ( y , s i ) = 0 ϵ σ i j ( a ) = 0 z i k = 0 , k I i , and therefore,
j I i c i j ( z i , y i ) = j I i c i j ( z i , p i ) ,
thus (31) simply shows that changing the price p i j to y i j does not exclude any additional buyers, as the bid p i j was already above the reserve price of any seller j I i . We proceed to show that x i does not result in a loss of utility for buyer i, that is,
u i u i ( z i , y i ) .
From (30), we have a i j ( z i , y i ) = z i j = σ i j ( a ( z i , y i ) ) , and so,
θ i σ i j ( a ( z i , y i ) ) = θ i σ i j ( a ) ,
which holds j I i . Therefore, by the definition of utility (8), and the buyers’ valuation (13),
θ i σ i ( a ( z i , y i ) ) θ i ( a ) σ i ( a ) = u i ( z i , y i ) u i = j I i c i j c i j ( z i , y i ) = j I i a i j ( z i , p i ) a i j f i ( d i j x ) d x .
Then, as a i ( z i , p i ) z i j a i j , and noting that z i j > 0 θ i 0 f i 0 , we have u i ( z i , y i ) u i 0 , j I i . □
The property of truthfulness is an essential component of equilibrium in second-price markets. The strategies described in this paper have removed the necessity for a user to determine its own valuation function, we intend to show that the market dynamics resulting from the construction of the user strategy space results in truthful bids that are optimal for all users, i.e., bid prices are to the marginal value as determined by market dynamics. To achieve incentive compatibility, we find that the opt-out buyer must choose We have so far only made the assumption of truthful bids throughout our analysis. As was shown in Proposition 1, a buyer only has incentive to change its bid as a result of a market shift or partial allocation. In a truthful reply, the term ϵ / θ i ( 0 ) ensures that a new bid price differs from the last bid price by at least ϵ , thereby ensuring that a buyer does not change its bid without correcting the effects of unstable shifts. For any buyer i, it suffices to show the continuity of the set of truthful ϵ -best replies in the set of opponent bid profiles. So, for a buyer i, define the set of possible ϵ -best replies,
S ϵ ( s ) = { s i S i ( s i ) : u ( s i ; s i ) u i ( s i ; s i ) ϵ , s i S i ( s i ) } ,
and the set of truthful bids,
T i = { s i S i ( s i ) : z = j I i σ i j ( a ) p i = θ i ( z ) } ,
where ∧ denotes the logical “and” operator. We note that the “strategic” set T i is restricted by Proposition 3. We have the following Proposition,
Proposition 2
(Incentive compatibility across local auctions). Let Λ, λ be defined as in Proposition (1), and fix time t > 0 τ , and fix s j , j Λ , and for some buyer i I j , let s l also be fixed l i λ . Define,
χ i = { x [ 0 , D i ] : θ i ( x ) > max j Λ P i j ( x ) } ,
and z = sup ( χ i ϵ / θ i ( 0 ) ) + , and for each j Λ ,
v i j = σ i j ( z ) ,
and
w i j = θ i ( z ) .
Then a (coordinated) ϵ-best reply for the opt-out buyer is t i = ( v i , w i ) T i S i ϵ ( s i ) , i.e., s i , u i ( t i ; s i ) + ϵ u i ( s i ; s i ) . With reserve prices p j > 0 , there exists a “truthful” strategy game embedded Δ . Therefore, a fixed point Δ is a fixed point in the multi-auction game.
Proof. 
We claim that t i is an ϵ -best reply for buyer i. That is,
u i ( t i ; s i ) + ϵ u i ( s i ; s i ) .
As a result of auction initialization, a seller j’s valuation defines its reserve price to be determined by a buyer i λ , even if this price is zero, we have that p j = ϵ 0 j Λ . Let z = sup ( χ i j ) , and again let p * j = f j σ i j ( a ) denote the reserve price of auction j, and p i * = f i σ i j ( a ) denote the (coordinated) bid price of buyer i. We have that i I j , and (9) defines θ i ( z ) as being max of the reserve prices p * j , j I i , therefore (35) is such that,
θ i ( z ) > max j Λ P i j ( v i j ) ,
which implies, as θ i is non-increasing and P i j 0 , we have j I i ,
w i j > P i j ( v i j ) v i j D i j ( w i j ) = D j ρ j ( w i j ) .
And so, by (5),
a i j ( t i ; s i ) = v i j j Λ a i j ( t i ; s i ) = z .
Therefore, j Λ and i λ such that (27) and (28) hold,
0 v i j P ¯ i ( x ) d x = j Λ 0 σ i j ( z ) P i j ( x ) d x .
It follows that,
u i ( t i ; s i ) = 0 z θ i ( x ) d x σ i 0 z P ¯ i ( x ) d x .
Suppose s i = ( d i , p i ) such that u i j ( s i ; s i ) > u i j ( t i ; s i ) + ϵ . Propositions 5 and 3, define the coordinated bid, ν i = ( ζ i , p i ) , using (27) and (28), for each j Λ , σ i j ( a i j ( ν i ; s i ) ) = ζ i j , then clearly u i ( ν i , s i ) u i ( s i , s i ) u i ( t i ; s i ) u i ( s i ; s i ) > ϵ . Denoting ζ i j (fixed) as ζ ,
z ζ θ i ( x ) d x z ζ P ¯ i ( x ) d x > ϵ .
For concave valuation functions, the first-order derivative of θ at point 0 gives the maximum slope of the valuation function, and so the factor ϵ / θ ( 0 ) guarantees that new bids will differ by at least ϵ , and as such, buyer i will remain in any local auction with reserve price determined by (20). We therefore verify that,
z z + ϵ / θ i ( 0 ) θ i ( x ) d x ϵ ,
and as P i j 0 , we have that, from the construction of ζ ,
z + ϵ / θ i ( 0 ) ζ θ i ( x ) d x z + ϵ / θ i ( 0 ) ζ P ¯ i ( x ) d x > 0 .
If ζ > z + ϵ / θ i ( 0 ) , then for some δ > 0 , θ i ( z + ϵ / θ i ( 0 ) + δ ) > P i j ( z + ϵ / θ i ( 0 ) + δ ) , contradicting (35). Now, if ζ z , then θ i ( z + ϵ / θ i ( 0 ) ) < P i j ( z + ϵ / θ i ( 0 ) ) , also a contradiction of (35), and so buyer s i cannot exist. Finally, as we may consider Δ I to be a multi-auction game, our user strategies form a “truthful” local game with strategy space restricted to ϵ -best replies from buyers λ . Therefore we have that a fixed point in the “truthful” game is a fixed point for the auction. □
In linear analysis, we may determine a Nash equilibrium by finding a local optima of the potential function. Additionally, as the potential function also iterates, it may be used in an analysis of convergence. The convergence of a Nash equilibrium results from the progression of ϵ -best replies, where each subsequent bid is a unilateral improvement, provided that t i is continuous in opponent profiles. From the original proof by [3], we observe that the collection of unconstrained truthful bids may be a subset of the collection of ϵ -best replies, i.e., T i S i ϵ .
Now, the strategy space is comprised of a collection of bid, or “strategy”, vectors that together, may be represented as a collection of potential functions, where change in buyer i’s utility, resulting from a change in strategy, equals the change in the local market objective of each seller j I i . These local objectives are known as potential functions, and are formulated by mapping the incentives of all users in a local auction to a single function. The goal of our analysis is to therefore construct a global potential function that encompasses all local markets, and show that this space adheres to the construction described in our proof. The conditions of convexity, connectedness and continuity must apply to the global market space in order for a global equilibrium to exist.
In order to address continuity in a global sense, we must again demonstrate continuity in the construction of our model. We will show that our global market holds a differentiable topology, where our opt-out function σ extends to an injective, differentiable map. We show that locally, the connectivity of our market subspace Δ provides a linearization, or approximation of a linear map, and so continuity holds in the global sense. We construct an extension and determine the existence and uniqueness of a global market objective by mathematical correspondence. We begin with the definition of correspondence,
Definition 3
(Correspondence). A correspondence is mathematically defined as an ordered triple ( X , Y , R ) , where R is a relation from X to Y, i.e., any subset of the Cartesian product X × Y .
In an economic model, a correspondence ( S i , S i , R ) defines a map from S i to the power set S i , where R is a binary relation, i.e., R S i × S i . The classic example of a correspondence in our model is the buyers’ best response B i ϵ , where, for the multi-auction, S i and S i are built by repeatedly using the Cartesian product over bid profiles. The power set S i = Π j ( Π k i S i j ) arises naturally from the product of ordered sets. The binary equality relation i j naturally occurs in the strategy space, and is both an equivalence relation and a partial order, and therefore is reflexive, transitive, symmetric and anti-symmetric. We use the the axiom of set equality based on first-order logic, which states that, i I , j I , ( i I j j I i ) i j , and follows from (22). Given any set of buyers I i Λ where we have an allocation from some j λ i , Given a subset B of a set A, the injection f:B->A defined by f(b) = b for all b in B is called the inclusion map. 1 λ ( S i , S i ) : λ Λ S / , and so is a canonical mapping as well as an inclusion map. The product topology of the strategy space is preserved, and the set of all indicator functions on S forms the power set P ( S ) = S i × S i on S defines a quotient space, and forms the partition s j S : s j s i of S. Now, Δ P ( S ) is the result of the correspondence map, and we have that set of users in an auction is uniquely determined by its members where sellers have fixed market prices; all users who are not changing their bids are considered equal. Therefore each seller j I is equivalent to some buyer i I ; buyer i’s utility constraint is satisfied in auction j if and only if seller j’s utility constraint is also satisfied.
The best response is a reaction correspondence defined by the mixed-strategy game. Denoting T i ϵ = T i B i ϵ , we have the set of truthful ϵ -best replies in opponent bid profiles S i . A natural induced topology of this space is the product topology, e.g., the canonical map S i Π j I S j . Now, in order to find a fixed point in the mixed strategy space, we must have a continuous mapping, i.e., Λ j λ i , i , j Δ . The data-sharing market consists of inter-dependent sets of multi-auction games around possible fixed points. Clearly, the union of all possible sets j I Δ j covers I . We claim that the shared buyers between the different subsets Δ form a sufficiently connected set, so that Proposition 1 holds. We have the following Lemma.
Lemma 6
(Continuity of ϵ -best reply on Δ ). Let Δ be defined as in Proposition (1). For any buyer i λ j , the collection of bids B i is continuous in S i .
Proof. 
Define σ i P ¯ = max i I j θ i ( 0 ) , and P ¯ i ( z , s i ) = P ̲ = ϵ ϱ , where ϵ is the bid fee, and ϱ is i’s liability estimate for auction j I . We observe that σ i B i ϵ is simply B i ϵ restricted to seller pool I i , i.e., σ i B i ϵ B i ϵ | I i . Thus, we have σ i T i = ( [ 0 , D k ] k I j × [ 0 , σ i P ¯ ] | I j | ) is a product of closed subsets of compact sets. Now, we have that a closed subset of a compact set is compact and the resulting product topology gives Tychonoff’s theorem, i.e., every product of a compact space is compact, we have σ i B i ϵ is compact subset of B i ϵ . Now, letting P ¯ = max i λ j θ i ( 0 ) , and we have by definition of Δ and the product,
σ i S i ( s i ) σ i | Λ j : S i T i S i
i I j [ 0 , D k ] k I i , [ 0 , P ¯ ] = i I j [ 0 , D k ] k I i × [ 0 , P ¯ ] = ( [ 0 , D k ] k Λ j , [ 0 , P ¯ ] ) Λ j × λ j T .
The result follows from the fact that t i is continuous in s i , as was proven in [12], and as a finite union of compact sets is a compact set. □
We have proven that buyers will submit bids according to their marginal valuations. We have that all bids represent ϵ -best replies, and, as was proven in [3]. The sellers’ positive reserve price implies that bids are truthful. Finally, by properties determined by the construction of a mixed strategy symmetric game with a two-dimensional message space, we may now restrict our analysis to the set of continuous, truthful, ϵ -best replies, T ϵ . In mathematics, the notion of the continuity of functions is not immediately extensible to multivalued mappings; we show the correspondences between the two sets λ and Λ . The correspondence between i and j forms the set λ Λ . We note that due to the binary relation, the set of all possible ϵ -best replies,
Δ ϵ = { ( i , j ) λ × Λ } | T ϵ ,
is well-posed by [15] Definition (4.3) and Corollary (4.4). We show that our bidding strategy results in (at least one), Nash equilibrium, where again the sellers reserve prices are fixed.
Lemma 7
( Δ ϵ -Nash Equilibrium). Let Δ be defined as in Proposition (1), and suppose that auction j Δ is not in a transient state, e.g., t = τ j . Fix all s i k , k j . Using the rules of the data auction mechanism, along with type-based strategic moves, j converges to an ϵ-Nash equilibrium. The proof follows closely that of [12].
Proof. 
As auction j is at equilibrium, and since θ i is continuous, as was shown in Lemma 2, and t = { [ t i j ] λ j × Λ j } is continuous in s on T k = Π k λ j T k j . Now, t represents a continuous mapping of [ 0 , k λ j D k ] i Λ j onto itself and we may use Brouwer’s fixed point theorem, as in [12], which states that the continuous mapping of a convex compact set into itself has at least one fixed point. Therefore, ∃ some k i such that z * = σ * ( z ) [ 0 , D k ] i Λ j . Then, given that s * = ( z * , θ ( z * ) ) , we have that s * = t ( s * ) T . □
The rules of the PSP multi-auction drive market mutations that evolve and are regulated by the user strategies. As a result of user behavior, and subsequent strategies, we determine that the data-exchange market behaves in a predictable way. We point out the need for better management of data on the consumer level. It is obvious that there is profit to be made by supplying data to the data-driven consumer. Mathematically, we have shown that if truthfulness holds locally for both buyers and sellers, i.e., p i = θ i , j I i and p j = θ j , i I j , then, in the absence of market shifts, there exists an ϵ -Nash equilibrium extending over a subset of connected local markets. However, each auction may be played on the same or on a different scale in valuation, time and quantity, and so the rate at which market fluctuations occur is impossible to predict. This presents a problem, as in our linear analysis we rely on the stability of the market equilibrium at a fixed time to find a convergent sequence of ϵ -best replies within any auction j, whereas in the global market discontinuities may occur when we have I i I j = Ø . In this case, we must address the market using a non-linear analysis. Up to this point, we have constructed our proofs around connected local markets, such as in Proposition 1, where we defined connectivity via a set of influencing users Λ and λ . The result was the existence of a sequence of vector-valued functions on the union of the influencing sets, Δ , allowing for the requirements of differentiability and therefore continuity to hold, resulting in a fully connected subset of local auctions.
For each Δ , the Kuhn–Tucker optimality conditions imply that s i is the optimal response of player i to s i if and only if there exists a Lagrange multiplier ρ i such that:
ρ i = θ ( s i j ) , if s i j > 0 , j Δ
ρ i θ ( s i j ) , if s i j = 0 , j Δ
j Δ s i j = a i , s i j 0 , i Δ .
where ρ turns out, in fact, to be the (stable) marginal price [16]. Without loss of generality, we will consider adding data in such a way that the ordering of the sets λ and Λ is preserved. That is, the buyers bids are such that s 1 s 2 s I . We may even define a function N : Δ R S that assigns each s S Δ the Nash equilibrium N ( s ) of its respective game. Each assignment induces a game with a unique Nash equilibria. We consider disjoint sets { Δ } , we construct an extension so that for any influencer i Δ ϵ , there is an extension such that for k Δ k such that the dominant strategy for i Δ j × k .
We construct our extension in the form of a new user type, a broker type. A broker type fills the space between Δ j and Δ k by purchasing data from one auction subset and selling it in the other. This user performs the function of connecting two fully-connected auction subsets Δ j and Δ k by supplying additional data from one auction ( Δ j ) to the ordered set I j of each seller in each auction j Δ k . We show that this additional broker type preserves the optimality of the set Δ j Δ k . Suppose that the broker assumes that there is an infinite amount of data available to buy and creates bids on the assumption that a market Δ will be available to fill the data request. The broker may create orders that are not feasible in the actual market, causing buyers in Δ to shift their bids according to the (presumed) available data. In this way, the broker may actually plan the data requirements, overage or underage, based on some finite scheduling scheme. This concept is beyond the scope of our current research, but merits some future consideration. In this case, the broker can only add data δ to Δ from the set { d R + I : s 1 s I ; ( δ i , · ) ( d i , · ) ; ( d i δ i ) δ } . We are presented with the problem of how to add additional data to Δ that is optimal with respect to its Nash equilibrium N Δ , as in [17]. For each optimal strategy s, the unique Nash equilibria N Δ ( s ) describes the allocations of data D j from each seller j in Δ .
We begin by examining the addition of data to a single market subset. We will show that this strategy, which we will call s * , is therefore userwise price optimal for the entire space N ( s ) s S . We show that, under certain conditions, the transfer of data happens in an “ordered” way, so that the natural price ordering of the space is preserved and thus, the Nash equilibrium. In particular, there exists a Lagrange multiplier ρ * such that (36)–(38) hold.
Theorem 1
( Δ ϵ * -Nash Equilibrium). Let Δ * = Δ j Δ k be a union of market subsets at equilibria. Let A Δ * ( s ) be an allocation where a bids s j ^ = ( p j , d j ^ ) , are augmented such that d j ^ = d j δ i and δ i is such that j Δ j a i j ^ = k Δ k a i k . Then,
p ^ * j < p * j Λ ,
and,
p ^ i * > p i * for all i λ .
The transfer of data δ from influencing set Λ j to Λ k preserves the ordering p ^ * j p ^ l * < p ^ * k p ^ i * for all users k , j I i , i , l I j , i I k such that l Λ k , l I k .
Proof. 
We speculate that two things are going to happen with this change in allocation. 1. Buyers in Δ j will no longer have enough data to satisfy the bid requirement of their current auction, and will increase their reserve price. 2. Sellers in Δ k will have additional data to sell, and so will lower their reserve price. We determine the influence of the modified allocation by (25) and (20). Without loss of generality, suppose that a broker purchases data from auction j Δ j , selling it in as auction k Δ k . This may happen for any pair of auctions in which the sellers reserve prices differ by more than ϵ , that is p * k p * j + ϵ for some k Δ k and for some j Δ j . In this way the broker may make a profit. We have that p ^ * j > p * j Λ j as the losing buyer with the highest bid price changes; less data in auction j will push buyers out of the auction, as seller j increases it’s price according to (20). We will call this set of buyers I ^ . Now buyers in I ^ are making consistent bids, and so must increase their bid uniformly. The set Λ j does not have enough data to satisfy the demands of all the sellers λ j , and so bids must be made that include sellers from Λ k , making Δ * a connected set (noting the allocation restriction of two sets in the premise). The sets Δ j and Δ k must be connected through auction k ^ , as buyers in I ^ will need to bid in auction k ^ in order to satisfy their data requirement. This, in effect, adds auction k ^ to Δ j , along with the corresponding influencers. As buyers bid consistently, buyers from I ^ will bid the same in all auctions from Δ j , now including auction k ^ .
We address the buyer side. The bid price of buyer i I j is determined by p i * = max j I i ( p * j ) . For some buyer i I j , and then for some seller k I i , we have a buyer l ^ I k . By (22), i , l ^ I k , and so the reserve price p * k min ( p ^ l * , p i * ) , and k , j I i p i * max ( p * k , p * j ) . With the addition data to auction k, we now have that p ^ i * max ( p ^ * k , p ^ * j ) , and p ^ i * > p i * by (39). Seller k, now adding data to Δ k , must bring new buyers in, changing its reserve price according to (20). Seller k will choose its reserve price to compete with sellers Λ k . As Δ k is a fully connected set at equilibrium, as defined in Proposition 1, the reserve price for auction k ^ must be set to max j Λ k ( p i * j | i I k a i k = D k ) . As we assume that the broker would not act without gaining a profit, we must have that the reserve price of auction k ^ is at least ϵ higher than that of auction j. Again, for all i I ^ , p ^ i * > p i * .
Now suppose that l ^ I ^ k ^ I l , the valuation of buyer l ^ does not impact auction k ^ and vice versa, i.e., θ l k = 0 . We must have that p ^ l * p j * and p ^ l * < p ^ * k . Since l I j , p l * p * j p * j < p ^ * k , and i I k p i * p ^ * k . Therefore, we have that the ordering implied by (23) holds, and,
p ^ * j p ^ l * < p ^ * k p ^ i * ,
for any buyer l ^ λ k such that l ^ I k . Market shifts will occur due to the new reserve prices chosen in auction k ^ according to Proposition 1 until the market reaches equilibrium, and so (41) holds ⇒ (39) holds. In effect, the transfer of data has forced the reserve prices of Λ j and Λ k to “squeeze” together, with the broker profiting off of the difference. Sellers in Λ j lower their reserve prices, according to the lower demand. At the same time, buyers in λ k lower their bid prices according to the increased supply of data. The sets Λ k and Λ j are connected via auction k ^ , and so the reserve price determined in auction k ^ will affect Λ j through the bid price of buyers in I ^ . We have, by transfer of data, for all i Δ * ,
0 σ i j ( a ) θ i ( x ) d x 0 σ i j ( a ) σ ^ i k ( a ) P ¯ i ( x ) d x < ϵ ,
and,
0 σ i k ( a ) θ i ( x ) d x 0 σ i k ( a ) + σ ^ i k ( a ) P ¯ i ( x ) d x < ϵ .
Using Proposition 1, we may conclude that equilibrium is achieved and so (36)–(38) hold for the sets Δ j and Δ k connected through auction k ^ , and we have the existence of at least one Nash equilibrium in Δ * . □
In this scenario, the presence of a broker causes the two sets Δ j and Δ k to become connected, arriving at a Nash equilibrium for Δ * = Δ k Δ j . These connected sets are defined by the influencing users around the auctions k and j, and are dynamically defined as such. This complicates the analysis and makes it difficult to determine stability in time. By restricting the transfer of data to two auctions within two auction subsets, we manage to create some sort of structure in the underlying market dynamics that is intuitively simple, however analytically difficult to describe.

6. Conclusions and Future Work

Mathematically, we have shown that if truthfulness holds locally for both buyers and sellers, i.e., p i = θ i , j I i and p j = θ j , i I j , then, in the absence of market shifts, there exists an ϵ -Nash equilibrium extending over a subset of connected local markets. We have provided the analysis for a network that is operated according to a game theoretic paradigm, so that its Nash equilibrium upholds the requirements of a second price auction, showing characteristics of efficiency, truthfulness and rationality with respect to certain system-wide criteria. We have focused on Nash equilibria whose uniqueness has been established, such as those for users with consistent bids [12]. We show that s | Δ represents a continuous mapping [ 0 , k λ j D k ] i Λ j onto itself, and that the continuous mapping of the convex compact set s * into itself ( s * ) has at least one fixed point. We show that the symmetry built into strategy space provides built-in conditions for convergence and stability of a ϵ -Nash equilibrium over pairwise connected subsets Δ * .
The dynamics of the system with the inclusion of brokers provides an interesting direction for future research. We speculate that certain network-wide objectives may be achieved (such as stability, bandwidth regulation, throttling) through the use of brokers. The brokers would exercise a type of feedback control, both a priori (in the static analysis) or in time, in order to maintain a desired network topology; one with a stable network-wide equilibrium. Here, we have examined the relation between two connected auction subsets under allocation constraints. We expect that with the addition of more players the strategy space will begin to suffer “the curse of dimensionality”, rendering the analytic techniques we have used here (based on order and continuity) ineffective.
We would like to begin real-world simulations of the results presented in this paper, and extend our theory to include some practical, statistical analysis. In particular, we would like to add queueing theory and an underlying Poisson arrival process or Brownian motion [12], in order to add practical structure and timing to our game. This practical experience may give us insight as to the breadth and variation of the game according to the user strategy of truthfulness. An alternative method to determining Nash equilibria in the higher-dimensional strategy space (with more users) could be found, and the nature of the space could be described using simulated results.

Author Contributions

Conceptualization, J.B.; methodology, J.B.; validation, J.B.; formal analysis, J.B.; resources, F.C.H.J.; writing—original draft preparation, J.B. and F.C.H.J.; writing—review and editing, J.B. and F.C.H.J.; supervision, F.C.H.J.; project administration, F.C.H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ISPInternet Service Provider
PSPProgressive Second Price
VCGVickrey–Clarke–Groves auction

References

  1. AT&T. AT&T Mobile Share Flex Plans. Available online: https://www.att.com/plans/wireless/mobile-share-flex.html (accessed on 14 October 2019).
  2. Izaret, J.M.; Schürmann, J. Why Progressive Pricing Is Becoming a Competitive Necessity. 2019. Available online: https://www.bcg.com/publications/2019/why-progressive-pricing-becoming-competitive-necessity (accessed on 8 October 2021).
  3. Lazar, A.; Semret, N. Design, Analysis and Simulation of the Progressive Second Price Auction for Network Bandwidth Sharing; Game Theory and Information 9809001; University Library of Munich: Munich, Germany, 1998; Available online: https://ideas.repec.org/p/wpa/wuwpga/9809001.html (accessed on 1 August 2021).
  4. Qu, C.W.; Peng, J.; Caines, P.E. Analysis of a class of decentralized decision processes: Quantized progressive second price auctions. In Proceedings of the 46th IEEE Conference on Decision and Control, New Orleans, LA, USA, 12–14 December 2007; pp. 779–784. [Google Scholar] [CrossRef]
  5. Maille, P.; Tuffin, B. Multibid auctions for bandwidth allocation in communication networks. In Proceedings of the IEEE INFOCOM 2004, Hong Kong, China, 7–11 March 2004; Volume 1, p. 65. [Google Scholar] [CrossRef]
  6. Yu, R.; Ma, Z. A distributed charging coordination of plug-in electric vehicles based on potential game considering feeder overload constraint. In Proceedings of the 2015 18th International Conference on Electrical Machines and Systems (ICEMS), Pattaya, Thailand, 25–28 October 2015; pp. 1114–1118. [Google Scholar] [CrossRef]
  7. Zhang, Y.; Yang, Q.; Yu, W.; An, D.; Li, D.; Zhao, W.H. An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging. IEEE Internet Things J. 2019, 6, 2907–2921. [Google Scholar] [CrossRef]
  8. Semret, N.; Liao, R.R.F.; Campbell, A.T.; Lazar, A.A. Pricing, provisioning and peering: Dynamic markets for differentiated Internet services and implications for network interconnections. IEEE J. Sel. Areas Commun. 2000, 18, 2499–2513. [Google Scholar] [CrossRef] [Green Version]
  9. Zhang, X.; Guo, L.; Li, M.; Fang, Y. Social-Enabled Data Offloading via Mobile Participation—A Game-Theoretical Approach. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  10. Movsowitz-Davidow, D.; Lavi, N.; Ben-Yehuda, O.A. Bill Estimation in Simplified Memory Progressive Second Price Auctions. In Economics of Grids, Clouds, Systems, and Services; Djemame, K., Altmann, J., Bañares, J.Á., Agmon Ben-Yehuda, O., Naldi, M., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 54–62. [Google Scholar]
  11. Helsloot, L.J.; Tillem, G.; Erkin, Z. BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. In Provable Security; Baek, J., Susilo, W., Kim, J., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 397–405. [Google Scholar]
  12. Semret, N. Market Mechanisms for Network Resource Sharing. Ph.D. Thesis, Columbia University, New York, NY, USA, 1999. [Google Scholar]
  13. Brandt, F.; Sandholm, T. On the Existence of Unconditionally Privacy-Preserving Auction Protocols. ACM Trans. Inf. Syst. Secur. 2008, 11, 1–21. [Google Scholar] [CrossRef]
  14. Zheng, L.; Joe-Wong, C.; Tan, C.W.; Ha, S.; Chiang, M. Secondary markets for mobile data: Feasibility and benefits of traded data plans. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 1580–1588. [Google Scholar]
  15. Hadamard, J. Lectures on Cauchy’s Problem in Linear Partial Differential Equations; Yale University Press: New Haven, CT, USA, 1923. [Google Scholar]
  16. Korilis, Y.A.; Lazar, A.A.; Orda, A. Capacity Allocation under Noncooperative Routing. IEEE Trans. Autom. Control 1997, 42, 309–325. [Google Scholar] [CrossRef] [Green Version]
  17. Korilis, Y.A.; Lazar, A.A.; Orda, A.; Orda, A. The Designer’s Perspective to Noncooperative Networks. In Proceedings of the INFOCOM’95, Boston, MA, USA, 2–6 April 1995; pp. 562–570. [Google Scholar]
Figure 1. Product/Quotient (step) Space.
Figure 1. Product/Quotient (step) Space.
Information 12 00434 g001
Table 1. Data for Example.
Table 1. Data for Example.
NameBid TotalUnit Price
A501
B401.2
C261.5
D202
E142.2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Blocher, J.; Harris, F.C., Jr. An Equilibrium Analysis of a Secondary Mobile Data-Share Market. Information 2021, 12, 434. https://doi.org/10.3390/info12110434

AMA Style

Blocher J, Harris FC Jr. An Equilibrium Analysis of a Secondary Mobile Data-Share Market. Information. 2021; 12(11):434. https://doi.org/10.3390/info12110434

Chicago/Turabian Style

Blocher, Jordan, and Frederick C. Harris, Jr. 2021. "An Equilibrium Analysis of a Secondary Mobile Data-Share Market" Information 12, no. 11: 434. https://doi.org/10.3390/info12110434

APA Style

Blocher, J., & Harris, F. C., Jr. (2021). An Equilibrium Analysis of a Secondary Mobile Data-Share Market. Information, 12(11), 434. https://doi.org/10.3390/info12110434

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop