CN-116405511-B - Method and system for resource allocation of smart city based on redundancy control strategy
Abstract
The invention discloses a method and a system for carrying out resource allocation on smart cities based on a redundancy control strategy, wherein the method comprises the steps of determining a plurality of smart cities with alternative external resources, determining the allocation limit x j of information security resources and the recoverable loss E of unit information security resources of each smart city, determining the invasion probability p j of each smart city successfully invaded by illegal users after the information security resources are allocated based on the allocation limit x j of the information security resources of each smart city and the recoverable loss E of the unit information security resources, determining the redundancy control strategy among the plurality of smart cities with alternative external resources, and determining the resource allocation amount of each smart city when the resources are allocated based on the redundancy control strategy and the invasion probability.
Inventors
- XING LINING
- HUANG ZHENHUA
- HE MINFAN
- RONG HAIWU
- YANG YONG
- YANG JINGHUI
- WANG KESHENG
- SHANG JUNFENG
- GAO XIAORONG
- LI JUN
- JIA DAN
- LIU XIANBAO
- Zhuang ze
- YANG GUANGBIN
- LU HONGYU
- ZHANG YALONG
- SUN JINQIANG
Assignees
- 佛山科学技术学院
- 广州浩传网络科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20220908
Claims (15)
- 1. A method of resource allocation for a smart city based on a redundancy control policy, the method comprising: Determining a plurality of smart cities with alternative external resources, wherein the alternative external resources refer to at least two smart cities storing the same part or all of data resources in the plurality of smart cities, and when part or all of the data resources in a first smart city are maliciously tampered or maliciously deleted, the second smart city can determine whether to utilize the same part or all of the data resources stored in the second smart city as the first smart city to restore the data resources in the first smart city by replacing the data resources; determining a configuration credit for information security resources of each smart city Loss of unit information security resource ; Configuration credit of information security resources based on each smart city Loss of unit information security resource Determining the invasion probability of each smart city successfully invaded by illegal users after information security resource allocation : (5.1) Where j is a natural number and 2≤j≤n, where n is the number of smart cities with alternative external resources, The probability of invading the smart city for an illegal user, wherein the probability of invading each smart city by the illegal user is the same, For probability of successful intrusion by illegal users of smart cities without information security resource allocation, wherein each smart city Identical to Determining a redundancy control strategy among a plurality of smart cities with alternative external resources, and determining the resource allocation amount of each smart city when performing resource allocation based on the redundancy control strategy and the invasion probability; Further comprises, based on the intrusion probability that each smart city is successfully intruded by an illegal user after information security resource allocation Determining probability of an illegal user attacking a current smart city and successfully invading the current smart city in case that the attack fails in each smart city except the current smart city : (5.2) Wherein, the For the probability of an illegal user successfully invading the current smart city B, Representing the probability that an illegal user fails to attack each smart city except the current smart city and turns to attack the current smart city B; Wherein determining a redundancy control policy among a plurality of smart cities having alternative external resources, determining a resource allocation amount when each smart city performs resource allocation based on the redundancy control policy and the intrusion probability, comprises: In the case where it is determined that the redundancy control policy between the plurality of smart cities having the alternative external resources is the cooperative sharing policy, the data substitution rate between smart cities among the plurality of smart cities having the alternative external resources is based on Determining that the j-th smart city obtains the cooperative resource allocation amount from other smart cities as Determining a loss function for a jth smart city Minimum value of (2) : (5.12) The collaborative sharing strategy is that each smart city performs redundant storage on different data sets and shares the data sets stored in redundant storage to the smart city needing the data sets; Setting up And substituting formula (5.1) into formula (5.12) to obtain: (5.13) determining the resource allocation amount of the smart city of which the redundancy control policy is the cooperative sharing policy by the formula (5.13): (5.14)。
- 2. The method of claim 1, determining a redundancy control policy between a plurality of smart cities having alternative external resources, determining an amount of resource allocation for each smart city when performing resource allocation based on the redundancy control policy and the intrusion probability, comprising: When determining that a redundant control strategy between multiple smart cities with alternative external resources is an independent strategy, the expected loss of each or the I-th smart city is determined Take the minimum as a function of the loss of each or the I-th smart city : (5.3) Wherein the independent policy means that when part or all of the data resources of the first smart city among the plurality of smart cities are maliciously tampered or maliciously deleted, the second smart city does not utilize the same part or all of the data resources stored in itself as the first smart city to recover the data resources of the first smart city by replacing the data resources, Wherein, the Is the data loss after the intelligent city is successfully invaded by illegal users, wherein each intelligent city The same; selecting probabilities of attacking arbitrary smart cities for illegal users, wherein each smart city The same; Determining a data substitution rate between intelligent cities among a plurality of intelligent cities with alternative external resources based on the formula (5.1) and the formula (5.2) For the j-th smart city Probability of successful intrusion by illegal users, k is a natural number; substituting formula (5.1) into formula (5.3), determining: (5.4) Due to the formula (5.4) And (3) with Irrespective of the arrangement And (3) solving the bias derivative of the formula (5.4), and determining: (5.5) Continuing to deflect equation (5.5) to determine the second derivative of equation (5.4): (5.6) Based on the determination of the formula (5.6), The constant is established, thus in At the loss function Obtaining the minimum value ; When determining redundancy control policies between multiple smart cities with alternative external resources as independent policies, a Nash equalization solution is obtained Resource allocation amount of each smart city using Nash equilibrium solution as redundancy control policy as independent policy Wherein Satisfy formula (5.7): (5.7)。
- 3. The method of claim 2, further comprising, Satisfy the following requirements And due to Constant is established, thereby determining that as the number of smart cities with information security-alternative external resources increases, the amount of resource allocation of the smart cities for information security Will correspondingly decrease, i.e And (3) with Is inversely related and when In the time-course of which the first and second contact surfaces, Zero; Wherein due to follow-up Is used for the increase of (a), Will decrease, thereby resulting in Increase due to Therefore, it is And consequently, will necessarily decrease.
- 4. The method of claim 3, further comprising, in the event that the redundant control policy between the plurality of smart cities with the alternative external resources is determined to be an independent policy, an intrusion probability for any illegal user Resource allocation of smart city Compared with the invasion probability Will monotonously increase, i.e The constant holds.
- 5. The method of claim 3, further comprising, in the event that the redundancy control policy between the plurality of smart cities with the alternative external resources is determined to be an independent policy, substituting the data between smart cities in the plurality of smart cities with the alternative external resources for Resource allocation of smart city Compared to data substitution rate Monotonically decreasing, i.e The constant holds.
- 6. The method of claim 1, determining a redundancy control policy between a plurality of smart cities having alternative external resources, determining an amount of resource allocation for each smart city when performing resource allocation based on the redundancy control policy and the intrusion probability, comprising: when the redundant control strategy among a plurality of smart cities with alternative external resources is determined to be a joint strategy, the probability of successful invasion by illegal users after information security resource allocation of the smart cities is set as Setting the configuration limit of information security resources in smart city as Determining a redundancy control policy as a loss function of a smart city group consisting of a plurality of smart cities of a joint policy Minimum value of (2) : (5.8) Wherein the joint policy means that when part or all of the data resources of the first smart city are tampered with or deleted maliciously, the second smart city uses the same part or all of the data resources stored in itself as the first smart city to recover the data resources of the first smart city by replacing the data resources, Substituting formula (5.1) into formula (5.8) to obtain: (5.9) And (3) solving the bias derivative of the formula (5.9) to obtain: (5.10) continuing to deflect the formula (5.10) to obtain a second derivative of the formula (5.9): (5.11) Wherein, the The constant is established, thus in At the loss function Obtaining the minimum value ; Obtaining a nash equalization solution when determining a redundancy control strategy between a plurality of smart cities with alternative external resources as a joint strategy Nash equalization solution as redundancy control policy is the resource allocation amount of each smart city of the joint policy : 。
- 7. The method of claim 6, further comprising, in the case where the redundant control policy between the plurality of smart cities with the alternative external resources is determined to be a joint policy, when At this time, as the number of smart cities having information security-alternative external resources increases, the resource allocation amount of the smart cities Will correspondingly decrease, i.e And (3) with In the form of a negative correlation, 。
- 8. The method of claim 6, further comprising, in the case where the redundant control policy between the plurality of smart cities with the alternative external resources is determined to be a joint policy, an intrusion probability for any illegal user Resource allocation of smart city With intrusion probability Monotonically increasing, i.e. The constant holds.
- 9. The method of claim 6, further comprising, in the case where the redundancy control policy between the plurality of smart cities having the alternative external resources is determined to be the joint policy, substituting the data between smart cities among the plurality of smart cities having the alternative external resources for the data between smart cities Resource allocation of smart city With data substitution rate Monotonically increasing, i.e. The constant holds.
- 10. The method of claim 6, further comprising, when In the time-course of which the first and second contact surfaces, Redundancy control policy is the resource allocation amount of smart city of independent policy Resource allocation amount of smart city smaller than redundancy control policy is joint policy The redundant control strategy is the desired cost of the smart city for the independent strategy Desired cost for smart cities less than a redundant control strategy being a joint strategy 。
- 11. The method of claim 1, further comprising, after the smart city is successfully invaded by an illegal user, losing an amount of data When the redundancy control strategy is the resource allocation quantity of the smart city of the cooperative sharing strategy Resource allocation for smart cities with independent policies than redundant control policies Large and redundant control policy is the amount of resource allocation for smart cities that cooperate with a sharing policy Resource allocation amount for joint policy than redundancy control policy Small, redundant control strategy is the expected cost of a smart city with a collaborative sharing strategy Desired cost of smart cities that are independent of redundancy control policies Low.
- 12. The method of claim 1, further comprising, in the case where the redundant control policy between the plurality of smart cities with the alternative external resources is determined to be a collaborative sharing policy, when Resource allocation amount of smart city Monotonically increasing, and when Resource allocation amount of smart city Monotonically decreasing.
- 13. A system for resource allocation for a smart city based on a data sharing type, the system comprising: a first determining means for determining a plurality of smart cities having alternative external resources, wherein the alternative external resources refer to at least two smart cities in which the same part or all of the data resources are stored, among the plurality of smart cities, and when part or all of the data resources of a first smart city are maliciously tampered with or maliciously deleted, a second smart city is able to determine whether to perform data resource restoration for the first smart city by using the same part or all of the data resources stored in the second smart city as the first smart city through substitution of the data resources; Second determining means for determining a configuration credit of the information security resource of each smart city Loss of unit information security resource ; Third determining means for determining a configuration credit of the information security resource based on each smart city Loss of unit information security resource Determining the invasion probability of each smart city successfully invaded by illegal users after information security resource allocation : (5.1) Where j is a natural number and 2≤j≤n, where n is the number of smart cities with alternative external resources, The probability of invading the smart city for an illegal user, wherein the probability of invading each smart city by the illegal user is the same, For probability of successful intrusion by illegal users of smart cities without information security resource allocation, wherein each smart city Identical to Fourth determining means for determining a redundancy control policy among a plurality of smart cities having alternative external resources, the resource allocation amount when each smart city performs resource allocation being determined based on the redundancy control policy and the intrusion probability; Further comprises, based on the intrusion probability that each smart city is successfully intruded by an illegal user after information security resource allocation Determining probability of an illegal user attacking a current smart city and successfully invading the current smart city in case that the attack fails in each smart city except the current smart city : (5.2) Wherein, the For the probability of an illegal user successfully invading the current smart city B, Representing the probability that an illegal user fails to attack each smart city except the current smart city and turns to attack the current smart city B; Wherein determining a redundancy control policy among a plurality of smart cities having alternative external resources, determining a resource allocation amount when each smart city performs resource allocation based on the redundancy control policy and the intrusion probability, comprises: In the case where it is determined that the redundancy control policy between the plurality of smart cities having the alternative external resources is the cooperative sharing policy, the data substitution rate between smart cities among the plurality of smart cities having the alternative external resources is based on Determining that the j-th smart city obtains the cooperative resource allocation amount from other smart cities as Determining a loss function for a jth smart city Minimum value of (2) : (5.12) The collaborative sharing strategy is that each smart city performs redundant storage on different data sets and shares the data sets stored in redundant storage to the smart city needing the data sets; Setting up And substituting formula (5.1) into formula (5.12) to obtain: (5.13) determining the resource allocation amount of the smart city of which the redundancy control policy is the cooperative sharing policy by the formula (5.13): (5.14)。
- 14. A computer readable storage medium, characterized in that the storage medium stores a computer program for executing the method of any one of claims 1-12.
- 15. An electronic device, comprising: A processor; A memory for storing the processor-executable instructions; The processor is configured to read the executable instructions from the memory and execute the instructions to implement the method of any one of claims 1-12.
Description
Method and system for resource allocation of smart city based on redundancy control strategy Technical Field The present invention relates to the field of information processing technology, and more particularly, to a method and system for resource allocation in a smart city based on a redundancy control policy, a computer-readable storage medium, and an electronic device. Background Since the advent of smart cities, smart cities are valued around the world, and more convenient conditions are provided for people's life while the level of urban intelligence is improved, but because smart cities highly depend on novel technical means such as cloud computing and the Internet of things, hidden dangers of information risk diffusion are brought to technical application, multi-angle impact is brought to urban information safety, and how to reasonably allocate digital resources of the current cities is avoided as much as possible, so that the smart cities become an actual problem that the healthy development of the current smart cities must face. Smart cities are an open, shared, ecologically circulated system, and there are various communications and decisions between cities in terms of information security. There are alternative external resources between smart cities, that is, no matter which city is illegally invaded, no other cities are lost, so that effective improvement is needed when the cities are subjected to resource allocation analysis. Disclosure of Invention According to the application, firstly, problem description and modeling are carried out according to the characteristics of substitutable external resources, then, the information security resource allocation methods under the two conditions of independent strategies and combined strategies are discussed, the influence of factors such as the scale of a smart city or a network system, the invasion probability of illegal users, the substitution rate of the smart city or the network system and the like on the two conditions is analyzed, nash equilibrium solutions under the two conditions are compared, and then, the configuration optimization is carried out according to the actual conditions, and meanwhile, the combined strategies are carried out between the smart city or the network system by introducing a cooperative mechanism. According to an aspect of the present invention, there is provided a method of resource allocation for a smart city based on a redundancy control policy, the method comprising: Determining a plurality of smart cities with alternative external resources, wherein the alternative external resources refer to at least two smart cities storing the same part or all of data resources in the plurality of smart cities, and when part or all of the data resources in a first smart city are maliciously tampered or maliciously deleted, the second smart city can determine whether to utilize the same part or all of the data resources stored in the second smart city as the first smart city to restore the data resources in the first smart city by replacing the data resources; Determining the configuration limit x j of the information security resource of each smart city and the recoverable loss E of the unit information security resource; Based on the configuration limit x j of the information security resource of each smart city and the loss E which can be recovered by the unit information security resource, determining the invasion probability p j of successful invasion of each smart city by illegal users after information security resource configuration: Wherein j is a natural number and 2≤j≤n, wherein n is the number of smart cities with alternative external resources, β is the probability of an illegal user invading the smart cities, wherein the probability of an illegal user invading each smart city is the same, v is the probability of a smart city being successfully invaded by an illegal user without information security resource allocation, wherein v of each smart city is the same, and A redundancy control policy between a plurality of smart cities having alternative external resources is determined, and an amount of resource allocation when each smart city performs resource allocation is determined based on the redundancy control policy and the intrusion probability. Preferably, the method further includes determining, based on the intrusion probability P j that each smart city is successfully intruded by the illegal user after the information security resource allocation, a probability P B that the illegal user attacks the current smart city and successfully intrudes the current smart city in case that the attack of each smart city other than the current smart city fails: wherein p 1 is the probability that an illegal user successfully invades the current smart city B, Representing the probability that an illegal user fails to attack every smart city except the current smart city, and turns to attack the current smart city B. Preferab