Context-sec: Balancing Energy Consumption and Security of Mobile Devices

Swapnoneel Roy, S. Sankaran, Preetika Singh, R. Sridhar, A. Asaithambi
{"title":"Context-sec: Balancing Energy Consumption and Security of Mobile Devices","authors":"Swapnoneel Roy, S. Sankaran, Preetika Singh, R. Sridhar, A. Asaithambi","doi":"10.1109/IGCC.2018.8752165","DOIUrl":null,"url":null,"abstract":"Energy Management is of primary importance in mobile devices due to increasing functionality coupled with rapid battery drain. Research analysis reveals that users differ in context and resource usage patterns, which can be leveraged for power savings. A key challenge lies in providing context-adaptive security in an energy aware manner due to increasing sensitivity of user data and analyzing energy-security trade-offs. Towards this challenge, we model the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec). We then prove the decision version of this problem to be NP-Complete via a reduction from a variant of the well known Knapsack problem. We then design three different algorithms to solve a relaxed offline version of Context-Sec. The first algorithm is a pseudo-polynomial dynamic programming (DP) algorithm that computes an allocation with optimal user benefit using recurrence relations. The second algorithm is a greedy heuristic for allocation of security levels based on user benefit per unit of power consumption for each level. Finally, the third algorithm is a Fully Polynomial Time Approximation Scheme (FPTAS) for the problem which is has a polynomial time execution complexity as opposed to the pseudo-polynomial DP based approach. We subsequently implement and test the three algorithms on a real-world smartphone usage and wireless networks data-set to compare their performances. To the best of our knowledge, this is the first work that is focused on modeling, design, implementation and experimental performance analysis of any algorithm for context-adaptive energy-aware security. We believe our results will be useful for researchers and practitioners working in this area.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IGCC.2018.8752165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Energy Management is of primary importance in mobile devices due to increasing functionality coupled with rapid battery drain. Research analysis reveals that users differ in context and resource usage patterns, which can be leveraged for power savings. A key challenge lies in providing context-adaptive security in an energy aware manner due to increasing sensitivity of user data and analyzing energy-security trade-offs. Towards this challenge, we model the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec). We then prove the decision version of this problem to be NP-Complete via a reduction from a variant of the well known Knapsack problem. We then design three different algorithms to solve a relaxed offline version of Context-Sec. The first algorithm is a pseudo-polynomial dynamic programming (DP) algorithm that computes an allocation with optimal user benefit using recurrence relations. The second algorithm is a greedy heuristic for allocation of security levels based on user benefit per unit of power consumption for each level. Finally, the third algorithm is a Fully Polynomial Time Approximation Scheme (FPTAS) for the problem which is has a polynomial time execution complexity as opposed to the pseudo-polynomial DP based approach. We subsequently implement and test the three algorithms on a real-world smartphone usage and wireless networks data-set to compare their performances. To the best of our knowledge, this is the first work that is focused on modeling, design, implementation and experimental performance analysis of any algorithm for context-adaptive energy-aware security. We believe our results will be useful for researchers and practitioners working in this area.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Context-sec:平衡移动设备的能耗和安全
在移动设备中,由于不断增加的功能加上快速的电池消耗,能源管理是至关重要的。研究分析表明,用户在上下文和资源使用模式上存在差异,这可以用于节省电力。一个关键的挑战在于,由于用户数据的敏感性不断提高,以及分析能源安全权衡,如何以能源感知的方式提供上下文自适应安全性。针对这一挑战,我们将环境自适应能源感知安全问题建模为组合优化问题(Context-Sec)。然后,我们通过对众所周知的背包问题的一个变体的约简,证明了该问题的决策版本是np完全的。然后,我们设计了三种不同的算法来解决一个轻松的离线版本的Context-Sec。第一种算法是伪多项式动态规划(DP)算法,该算法利用递归关系计算最优用户利益分配。第二种算法是一种贪婪的启发式算法,用于根据每个级别的单位功耗的用户收益来分配安全级别。最后,第三种算法是针对该问题的全多项式时间近似方案(FPTAS),它具有多项式时间执行复杂度,而不是基于伪多项式DP的方法。随后,我们在现实世界的智能手机使用和无线网络数据集上实现和测试了这三种算法,以比较它们的性能。据我们所知,这是第一个专注于建模、设计、实现和实验性能分析任何算法的工作,用于环境自适应能源感知安全。我们相信我们的结果将对这一领域的研究人员和从业人员有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Dynamic Programming Technique for Energy-Efficient Multicore Systems Holistic Approaches to HPC Power and Workflow Management* IGSC 2018 PhD Workshop on Power/Energy Management at Extreme Scale [Copyright notice] DiRP: Distributed Intelligent Rendezvous Point for Multicast Control Plane
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1