Complementary External Resource Allocation to Information Security in Smart Cities

2021 ◽  
Vol 7 (5) ◽  
pp. 1036-1048
Author(s):  
Jun Li ◽  
Kai Zou ◽  
Shang Xiang ◽  
Zhen Wan ◽  
Lining Xing

With the rapid development of technologies, such as big data, artificial intelligence, and cloud computing, the work cooperation among cities and the resources involved in business exchanges are deeply complementary. At the same time, information security has become one of the challenges for smart cities, which is ubiquitous and easy to cause public security issues. For this reason, this research modeled the actual problems and then made decisions on resource allocation by considering full cooperation and non-cooperation situations. Their influence with respect to city size, probability of intrusion by illegal users, and propagation probability of one-time intrusion were analyzed. Based on these foundation works, this research proposed incentive mechanisms to ensure the optimized information security for smart cities. These mechanisms ensure that cities not only voluntarily increase the intensity of resource allocation to information security, but also make the co-operation in line with the reality. Therefore, this balances the advantages and disadvantages of non-cooperation and full cooperation, so as to ensure that the information security level of urban agglomerations reaches the optimal state.

2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Peijun Zhang ◽  
Lianhai Wang ◽  
Wei Wang ◽  
Kunlun Fu ◽  
Jinpeng Wang

Blockchain, which has a distributed structure, has been widely used in many areas. Especially in the area of smart cities, blockchain technology shows great potential. The security issues of blockchain affect the construction of smart cities to varying degrees. With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough. This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation. The most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large. As a result, each block in a blockchain can only accommodate a small number of transactions. It will affect the running speed and performance of the blockchain. For overcoming this problem, we proposed a way that we only put the hash values of public keys and signatures on the blockchain and store the complete content of them on an IPFS (interplanetary file system). In this way, the number of bytes occupied by each transaction is greatly reduced. We design a bitcoin exchange scheme to evaluate the performance of the proposed quantum-resistant blockchain system. The simulation platform is verified to be available and effective.


2020 ◽  
Vol 16 (4-1) ◽  
pp. 11-21
Author(s):  
Рушана Хазиева ◽  
Розалия Юсупова

This article focuses on information technologies and gives their classification. The advantages and disadvantages of the introduction of the latest information, telecommunication and cybernetic technologies are highlighted. The authors draw attention to the necessity to unite efforts of all countries regarding information security. It is emphasized that in modern conditions the information systems of one country are part of the global system, which in turn leads to the vulnerability of information systems and the possibility of external influence on politics and the economy. Purpose of the article: to show the positive and negative consequences of the achievements of information exchange. Methods: general scientific methods of theoretical knowledge, as well as general logical methods and research techniques are used. Results: In modern conditions of globalization and integration of various world systems, information security issues should remain a priority and be considered in close cooperation of all countries.


2021 ◽  
Vol 7 (4) ◽  
pp. 805-815
Author(s):  
Jun Li ◽  
Kai Zou ◽  
Shang Xiang ◽  
Zhen Wan ◽  
Lining Xing

Smart city highly relies on cloud computing, Internet of Things and other new technology means, which bring hidden information risk diffusion to urban information security. How to reasonably allocate current urban resources, avoid these information security risks as much as possible, and obtain the highest benefits, have become a practical problem to the current healthy development of smart cities. Based on the discussion of related concepts and technical theories, the information security resource allocation influencing factors index system is constructed from the following aspects: resources, threat sources, vulnerabilities and security measures. With the further analysis of information security factors and their affecting mechanisms, the basic theoretical framework of information security resource allocation is established based on the evolutionary game. The information security resource allocation problem is divided into the internal resource allocation and external resource allocation. External resource allocation is subdivided into complementary external resource allocation, alternative external resource allocation and weakly related external resource allocation. Under this framework, the subject relationship in various situations is analyzed. This research work can conduct a reasonable allocation of resources related to information security.


2014 ◽  
Vol 539 ◽  
pp. 317-320
Author(s):  
Xiang Xin

With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance.


Author(s):  
A. V. Batskikh ◽  
V. V. Konobeevskikh ◽  
S. V. Efimov

Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation on information security of automated systems, guidelines and orders of the Federal Service for Technical and Expert Control of Russia, as well as departmental orders, instructions and regulations on information security at informatization facilities of internal affairs bodies. The analysis results in identifying the advantages and disadvantages of the specified methodology, as well as the possibilities of its use when conducting a quantitative assessment of the efficiency of access control subsystems of information security systems at the informatization facilities of internal affairs bodies. Methods. To achieve this goal, the method for system analysis of approaches used to assess the efficiency of information security tools and systems has been applied. Results. The paper presents results of analysing the main approaches used to assess the efficiency of tools and systems for information security of automated systems. The paper determines the relationship between the efficiency indicator of access control subsystems of information security systems and the main disadvantage of their use in protected automated systems of internal affairs bodies. The paper substantiates main directions of improving the existing methodology, proposes methods and indicators for quantifying the efficiency of access control subsystems (including those modified on the basis of using new information and communication technologies) of information security systems in protected automated systems of internal affairs bodies. Conclusion. The results obtained can be used to quantify the security level of existing automated systems and those being developed at informatization facilities of internal affairs bodies.


2013 ◽  
Vol 416-417 ◽  
pp. 1450-1453
Author(s):  
Wen Zhan Guo

with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.


2021 ◽  
Vol 81 (2) ◽  
pp. 104-110
Author(s):  
Ye. V. Kobko ◽  
V. A. Kobko

The emphasis has been placed on the fact that the state is currently aware of the importance of information security within its territory and takes a number of important steps in this direction, such as the development of a new Information Security Strategy. However, such steps are difficult to consider objective, since they do not take into account a number of legal and organizational problems that need to be addressed promptly. Such problems include the following. First of all, the existence of an extensive regulatory and legal base in the information sphere in general and ensuring economic security, in particular. A large number of laws and by-laws different in their content and essence significantly complicates the development of comprehensive measures to ensure information security of Ukraine, and therefore needs to be improved. The latter can be implemented by codifying the said regulatory and legal base and by adopting the Code of Ukraine on Information and Information Relations, where a separate Section will be focused on information security issues. Secondly, the current conditions, where Ukraine finds itself, require the government to quickly adopt a new modern Information Security Strategy, which will include a number of measures aimed at improving such security level, since the latter is undoubtedly one of the important components of national security. Thirdly, the issue of ensuring certain aspects of information security is attributed to the tasks of various state authorities (Parliament, Government, executive authorities, law enforcement agencies, etc.). Moreover, such issues should be addressed at the local level by both legal entities and individuals, in the latter case we can talk about the personal information security of each person. This multiplicity of subjects of information security and the difference in their powers necessitates the creation of an appropriate coordinating agency with special powers in the mentioned area.


2020 ◽  
pp. 37-55 ◽  
Author(s):  
A. E. Shastitko ◽  
O. A. Markova

Digital transformation has led to changes in business models of traditional players in the existing markets. What is more, new entrants and new markets appeared, in particular platforms and multisided markets. The emergence and rapid development of platforms are caused primarily by the existence of so called indirect network externalities. Regarding to this, a question arises of whether the existing instruments of competition law enforcement and market analysis are still relevant when analyzing markets with digital platforms? This paper aims at discussing advantages and disadvantages of using various tools to define markets with platforms. In particular, we define the features of the SSNIP test when being applyed to markets with platforms. Furthermore, we analyze adjustment in tests for platform market definition in terms of possible type I and type II errors. All in all, it turns out that to reduce the likelihood of type I and type II errors while applying market definition technique to markets with platforms one should consider the type of platform analyzed: transaction platforms without pass-through and non-transaction matching platforms should be tackled as players in a multisided market, whereas non-transaction platforms should be analyzed as players in several interrelated markets. However, if the platform is allowed to adjust prices, there emerges additional challenge that the regulator and companies may manipulate the results of SSNIP test by applying different models of competition.


Sign in / Sign up

Export Citation Format

Share Document