Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/32404Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Shiriaev, E. M. | - |
| dc.contributor.author | Ширяев, Е. М. | - |
| dc.contributor.author | Kucherov, N. N. | - |
| dc.contributor.author | Кучеров, Н. Н. | - |
| dc.contributor.author | Bezuglova, E. S. | - |
| dc.contributor.author | Безуглова, Е. С. | - |
| dc.contributor.author | Gladkov, A. V. | - |
| dc.contributor.author | Гладков, А. В. | - |
| dc.date.accessioned | 2025-12-12T08:32:37Z | - |
| dc.date.available | 2025-12-12T08:32:37Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.citation | Shiriaev, E., Kucherov, N., Bezuglova, E., Gladkov, A. Designing an Architecture for a Confidential Data Analysis System in a Fog Computing Network for Low-Power Devices // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 413 - 424. - DOI: 10.1007/978-3-032-07275-7_37 | ru |
| dc.identifier.uri | https://dspace.ncfu.ru/handle/123456789/32404 | - |
| dc.description.abstract | Smart solutions are becoming increasingly popular, this is caused by both the increase in the quality and quantity of capabilities of Internet of Things devices, and the development of methods and approaches in organizing distributed networks, in addition, the demand for such solutions is also growing. When a solution such as a Smart City is fully developed, a large amount of confidential data or data of critical importance will be transmitted and processed in its network; if an intruder gains access to this data, or is able to change or destroy it, this can lead to various kinds of problems. In this paper, we investigate the fog computing network and its security, and it is established that fully homomorphic encryption schemes can be used to ensure the best data privacy. As a result, the architecture of a confidential data analysis system in a fog computing network for low-power devices based on the TFHE scheme was obtained, for this purpose, the quantization of values was investigated, as well as the logistic regression algorithm for confidential data processing. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Data analysis | ru |
| dc.subject | Fog computing | ru |
| dc.subject | Fully homomorphic encryption | ru |
| dc.subject | Logistic regression | ru |
| dc.subject | Quantization | ru |
| dc.subject | TFHE | ru |
| dc.title | Designing an Architecture for a Confidential Data Analysis System in a Fog Computing Network for Low-Power Devices | ru |
| dc.type | Статья | ru |
| vkr.inst | Факультет математики и компьютерных наук имени профессора Н.И. Червякова | ru |
| vkr.inst | Медико-биологический факультет | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3815.pdf Restricted Access | 128.22 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.