Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/28755
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShiriaev, E. M.-
dc.contributor.authorШиряев, Е. М.-
dc.contributor.authorNazarov, A. S.-
dc.contributor.authorНазаров, А. С.-
dc.contributor.authorKucherov, N. N.-
dc.contributor.authorКучеров, Н. Н.-
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.date.accessioned2024-08-14T13:11:53Z-
dc.date.available2024-08-14T13:11:53Z-
dc.date.issued2024-
dc.identifier.citationShiriaev, E.M., Nazarov, A.S., Kucherov, N.N., Babenko, M.G. Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing // Programming and Computer Software. - 2024. - 50 (4). - pp. 304-314. - DOI: 10.1134/S0361768824700117ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/28755-
dc.description.abstractThe technologies of artificial intelligence and cloud computing systems have recently been actively developed and implemented. In this regard, the issue of their joint use, which has been topical for several years, has become more acute. The problem of data privacy preservation in cloud computing acquired the status of critical long before the necessity of their joint use with artificial intelligence, which made it even more complicated. This paper presents an overview of both the artificial intelligence and cloud computing techniques themselves, as well as methods to ensure data privacy. The review considers methods that utilize differentiated privacy; secret sharing schemes; homomorphic encryption; and hybrid methods. The conducted research has shown that each considered method has its pros and cons outlined in the paper, but there is no universal solution. It was found that theoretical models of hybrid methods based on secret sharing schemes and fully homomorphic encryption can significantly improve the confidentiality of data processing using artificial intelligence.ru
dc.language.isoenru
dc.publisherPleiades Publishingru
dc.relation.ispartofseriesProgramming and Computer Software-
dc.subjectArtificial intelligenceru
dc.subjectSecret sharing schemeru
dc.subjectCloud computingru
dc.subjectHomomorphic encryptionru
dc.subjectNeural networkru
dc.subjectResidue number system (RNS)ru
dc.titleAnalytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computingru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File Description SizeFormat 
scopusresults 3149 .pdf
  Restricted Access
132.07 kBAdobe PDFView/Open
WoS 1922 .pdf
  Restricted Access
122.88 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.