Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/638
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chervyakov, N. I. | - |
dc.contributor.author | Червяков, Н. И. | - |
dc.contributor.author | Babenko, M. G. | - |
dc.contributor.author | Бабенко, М. Г. | - |
dc.contributor.author | Nepretimova, E. V. | - |
dc.contributor.author | Непретимова, Е. В. | - |
dc.date.accessioned | 2018-06-18T14:18:12Z | - |
dc.date.available | 2018-06-18T14:18:12Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Lopez-Falcon, E., Tchernykh, A., Chervyakov, N., Babenko, M., Nepretimova, E., Miranda-López, V., Drozdov, A.Y., Radchenko, G., Avetisyan, A. Adaptive encrypted cloud storage model // Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018. - 2018. - Pages 329-334 | ru |
dc.identifier.uri | https://www.scopus.com/record/display.uri?eid=2-s2.0-85047987021&origin=resultslist&sort=plf-f&src=s&nlo=1&nlr=20&nls=afprfnm-t&affilName=nort*+caucas*+fed*+univ*&sid=762e6d30544023d6a322a94577ba172b&sot=afnl&sdt=afsp&sl=53&s=%28AF-ID%28%22North+Caucasus+Federal+University%22+60070541%29%29&relpos=27&citeCnt=0&searchTerm= | - |
dc.identifier.uri | https://dspace.ncfu.ru:443/handle/20.500.12258/638 | - |
dc.description.abstract | In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechanism between cloud providers. We provide theoretical analysis and experimental evaluation of our scheme with six real data storage providers. We show how dynamic adaptive strategies not only increase security, reliability, and reduction of data redundancy but allow processing encrypted data. We also discuss potentials of this approach, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage | ru |
dc.language.iso | en | ru |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | ru |
dc.relation.ispartofseries | Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018 | - |
dc.subject | Cloud | ru |
dc.subject | Redundant residue number system | ru |
dc.subject | Reliability | ru |
dc.subject | Secret sharing schemes | ru |
dc.subject | Security | ru |
dc.title | Adaptive encrypted cloud storage model | ru |
dc.type | Статья | ru |
vkr.amount | Pages 329-334 | ru |
vkr.inst | Институт математики и естественных наук | - |
Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
scopusresults (98).pdf Restricted Access | 62.73 kB | Adobe PDF | View/Open | |
WoS 407 .pdf Restricted Access | 78.43 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.