Green-Aware Security: Towards a new Research Field

نویسندگان

  • Luca Caviglione
  • Alessio Merlo
  • Mauro Migliardi
چکیده

Green Security is a new research field aimed at defining and investigating security solutions under an energy-aware perspective. The aim of Green Security is twofold: 1) evaluating the actual security mechanisms both considering the energy costs and the effectiveness; 2) building new security mechanisms by considering energy efficiency from the design phase. In this paper, we first provide a definition of Green-Aware Security and an early manifest. Thus, we investigate some formalism to model Green-Aware Security issues, then we provide a use case showing how it is possible to model the energy consumption of two Intrusion Detection System (IDS) strategies, then we leverage this model to assess the energy leakage due to the late discovery of bad packets. Finally, we discuss an introductory assessment of the energy costs related to security on mobile device, which is a promising research trend for Green-Aware Security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems

Rob Antrobus Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.lancs.ac.uk [email protected] Sylvain Frey Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.lancs.ac.uk [email protected] Benjamin Green Security Lancaster Research Centre Lancaster University Lancaster LA1 4WA UK security-centre.la...

متن کامل

A Revisit to the Incorporation of Context - Awareness in Affective Computing Systems

The research field of Human Computer Interaction (HCI) is moving towards more natural, sensitive and intelligent paradigms. Especially in domains such as Affective Computing (AC), incorporating interaction context has been identified as one of the most important requirements towards this concept. Nevertheless, research on modeling and utilizing context in affect-aware systems is quite scarce. I...

متن کامل

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Green Energy-aware task scheduling using the DVFS technique in Cloud Computing

Nowdays, energy consumption as a critical issue in distributed computing systems with high performance has become so green computing tries to energy consumption, carbon footprint and CO2 emissions in high performance computing systems (HPCs) such as clusters, Grid and Cloud that a large number of parallel. Reducing energy consumption for high end computing can bring various benefits such as red...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012