Information protection in the conditions of limited energy resources
Abstract
Relevance: The protection of information and the system where such information is processed and stored is a complicated task even under optimal conditions. Adding any constraints leads to the appearance of new problems. The constraint on energy resources forces us to change an approach to information protection, abandon certain solutions and change the way the way we use information system. The primary focus of this article is on information systems that use networking hardware. Networking hardware is viewed as part of the system and requires power supply. The problem of limited energy resources is examined at two levels – restricted to a single system and globally when such systems compete for limited resources. The violator is aware of the system’s functioning under constrained energy resources but in general case doesn’t kbnow how dire the situation is.
Goal: to design a model of inforamtion oritection with aforementioned constraints, to select task with high ration of reward for completion to energy usage, to create a reserve of energy for further use when the system is operating again, to estimate the risk of overloading the grid.
Research methods: vgraph theory, game theory, Fishburn’s and Way’s methods for selection of best project.
The results: the model was designed and 2 strategies of energy resources distribution were found
Conclusions: The problem of lack of energy resources in general case is solved by the means of introduction of redundamcy in computational and memory resources. The conduction of an attack and the halting of one both will affect the distribution of tasks that are queued to the syste, by legitimate users. Affecting the cost of energy resources is possible but is outside of the scope of this article.
Downloads
References
/References
M. McCune, The complete solutions guide for every Linux/Windows system administrator! Prentice Hall PTR, 2000, 416p [in English] http://armstrong.craig.free.fr/eBooks/Prentice%20Hall/Prentice%20Hall%20Integrating%20Linux%20and%20Windows.pdf
H. Kaminaga “Improving linux startup time using software resume (andother techniques)” Linux symposium .Vol2/2006 pp25-34. [in English] https://www.kernel.org/doc/mirror/ols2006v2.pdf#page=25
W Dargi “A Stochastic Model for Estimating the Power Consumption of a Processor” IEEE TransactionsonComputers, vol. 64, no. 5/2015, pp. 1311-1322, [in English] https://ieeexplore.ieee.org/abstract/document/6783802
K Schüller, K Staňková, F Thuijsman “GameTheoryofPollution: National Policies and Their International Effects”. Games. vol 8(3)/2017: p30. [in English] https://www.mdpi.com/2073-4336/8/3/30
T McGill, N Thompson “Old risks, new challenges: exploring differences in security between home computer and mobile device use” Behaviour&InformationTechnology vol36(11)/2017, pp. 1111–1124 [in English] https://www.tandfonline.com/doi/abs/10.1080/0144929X.2017.1352028
Q Burke et al., “Enforcing Multilevel Security Policies in Unstable Networks” IEEE Transactions on Network and Service Management, vol. 19, no. 3/2022, pp. 2349-2365 [in English] https://ieeexplore.ieee.org/abstract/document/9779867
C Young, M D Smith “Improving the accuracy of static branch prediction using branch correlation”ACM SIGOPS Oper. Syst. Rev., 28, 5/1994, pp 232–241. [in English] https://dl.acm.org/doi/abs/10.1145/381792.195549
A Kolli, S Pelley, A Saidi, P M Chen, T F Wenisch “High-Performance Transactions for Persistent Memories” SIGARCH Comput. Archit. News, vol 44, 2/2016, pp399–411. [in English] https://dl.acm.org/doi/abs/10.1145/2872362.2872381
McCune, M, The complete solutions guide for every Linux/Windows system administrator! Prentice Hall PTR 2000, 416p http://armstrong.craig.free.fr/eBooks/Prentice%20Hall/Prentice%20Hall%20Integrating%20Linux%20and%20Windows.pdf
Kaminaga, H., Improving linux startup time using software resume (andother techniques). Linux symposium .2006 Vol2 c25-34. https://www.kernel.org/doc/mirror/ols2006v2.pdf#page=25
Dargie,W A Stochastic Model for Estimating the Power Consumption of a Processor IEEE TransactionsonComputers, 2015, vol. 64, no. 5, cc. 1311-1322, https://ieeexplore.ieee.org/abstract/document/6783802
Schüller K, Staňková K, Thuijsman F. GameTheoryofPollution: National Policies and Their International Effects. Games. 2017; vol 8(3):30. https://www.mdpi.com/2073-4336/8/3/30
McGill T, Thompson N, Old risks, new challenges: exploring differences in security between home computer and mobile device use Behaviour&InformationTechnology,2017, vol36(11) pp. 1111–1124. https://www.tandfonline.com/doi/abs/10.1080/0144929X.2017.1352028
Burke Q et al., Enforcing Multilevel Security Policies in Unstable Networks, IEEE Transactions on Network and Service Management, 2022, vol. 19, no. 3, pp. 2349-2365. https://ieeexplore.ieee.org/abstract/document/9779867
Young C, Smith M.D Improving the accuracy of static branch prediction using branch correlation. ACM SIGOPS Oper. Syst. Rev.1994, 28, 5 pp 232–241. https://dl.acm.org/doi/abs/10.1145/381792.195549
Kolli A, Pelley S, Saidi A, Chen P.M., Wenisch T F. High-Performance Transactions for Persistent Memories. SIGARCH Comput. Archit. News 2016, vol 44, 2, pp399–411. https://dl.acm.org/doi/abs/10.1145/2872362.2872381