MODEL AND METHODOLOGY OF MEASURING AND FORECASTING OF ENERGY IMPACT OF SECURITY RISKS MITIGATION APPROACHES IN DISTRIBUTED COMPUTING SYSTEMS ON PERSONAL MOBILE DEVICES
DOI:
https://doi.org/10.35546/kntu2078-4481.2025.3.2.42Keywords:
volunteer computing, distributed computing, distributed computing systems, energy efficiency, information security, mathematical modelingAbstract
The rapid growth of cloud computing and artificial intelligence has drastically increased energy consumption in data centers. Volunteer computing using personal mobile devices represents a promising solution by potentially reducing energy demands. However, such systems face critical challenges related to reliability, security, and sustainability. The subject of this study is the mitigation of three principal risks – node outage, result cheating, and data fishing – within mobile volunteer computing environments, and the evaluation of their energy overhead. The goal of the research is to extend a unified model capable of forecasting energy consumption under different security mitigation strategies and to quantify their trade-offs between efficiency and trustworthiness. The methodology combines mathematical modeling, simulation, and empirical measurements conducted on networks of mobile devices. Case studies employing ray tracing workloads were used to compare baseline energy efficiency with scenarios involving node outages, malicious result injection, and data leakage attempts. Results demonstrate that each mitigation strategy entails distinct energy implications. Node outage protection introduces moderate and predictable overheads that scale with failure probability.Cheating mitigation, based on redundancy and trust evaluation mechanisms, is identified as the most energy-expensive approach, with overhead rising exponentially in adversarial environments and, in extreme cases, collapsing system performance. Data fishing mitigation produces minimal additional energy consumption but restricts task allocation, potentially leading to incomplete job execution if trusted nodes are unavailable. The scientific novelty of this work lies in the integrated framework that unifies security and reliability risk mitigation with quantitative energy modeling in distributed computing. Unlike prior studies that address risks in isolation, this research systematically compares their energy impacts, establishing the taxonomy of overhead profiles and providing a foundation for balancing efficiency and security in future large-scale distributed systems.
References
Shehabi, A., Newkirk, A, Smith, S.J., Hubbard, A., Lei, N., Siddik, Md A. B., Holecek, B., Koomey, J., Masanet, E., & Sartor, D. 2024 United States Data Center Energy Usage Report Lawrence Berkley National Laboratory, 2024, Report LBNL-2001637, DOI: 10.71468/P1WC7Q
Barroso, L. A., Hölzle, U., The Case for Energy-Proportional Computing, 2007, Computer, no. 40, vol. 12, pp. 33–37. DOI:10.1109/mc.2007.443
Mamchych O., Volk M., A unified model and method for forecasting energy consumption in distributed computing systems based on stationary and mobile devices, RADIOELECTRONIC AND COMPUTER SYSTEMS, 2024, vol. 2, pp. 120–135, DOI: 10.32620/reks.2024.2.10
Bibi, I., Akhunzada, A., Malik, J., Khan, M. K., & Dawood, M. Secure Distributed Mobile Volunteer Computing with Android, ACM Transactions on Internet Technology, 2021, no. 22, vol. 1, pp. 1–21. DOI:10.1145/3428151
Ma, P., Garg, S. & Barika, M. Research allocation in mobile volunteer computing system: Taxonomy, challenges and future work, Future Generation Computer Systems, 2024, no. 154, pp. 251–265. DOI:10.1016/j.future.2024.01.015
Alsenani, Y. VonEdgeSim: A Framework for Simulating IoT Application in Volunteer Edge Computing, Electronics, 2024, no. 13(20), p. 4124. DOI:10.3390/electronics13204124
Anderson, D. P. BOINC: A Platform for Volunteer Computing, Journal of Grid Computing, 2019, no. 18(1), pp. 99–122. DOI:10.1007/s10723-019-09497-9
Antelmi, A., D’Ambrosio, G, Petta, A., Serra, L., & Spagnuolo, C. A Volunteer Computing Architecture for Computational Workflows on Decentralized Web, IEEE Access, 2022, no. 10, pp. 98993–99010. DOI:10.1109/access.2022.3207167
Pandey, A., Calyam, P., Debroy, S., Wang, S., & Alarcon, M.L. VEC Trust Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, 2021, doi:10.1145/3468737.3494099







