Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/20.500.12258/649
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.contributor.authorChervyakov, N. I.-
dc.contributor.authorЧервяков, Н. И.-
dc.contributor.authorKucherov, N. N.-
dc.contributor.authorКучеров, Н. Н.-
dc.contributor.authorDeryabin, M. A.-
dc.contributor.authorДерябин, М. А.-
dc.contributor.authorDvoryaninova, I. V.-
dc.contributor.authorДворянинова, И. В.-
dc.date.accessioned2018-06-19T11:44:11Z-
dc.date.available2018-06-19T11:44:11Z-
dc.date.issued2017-
dc.identifier.citationTchernykh, A., Babenko, M., Chervyakov, N., Cortés-Mendoza, J.M., Kucherov, N., Miranda-López, V., Deryabin, M., Dvoryaninova, I., Radchenko, G. Towards mitigating uncertainty of data security breaches and collusion in cloud computing // Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. - 2017. - статья № 8049702, pp. 137-141ru
dc.identifier.urihttps://www.scopus.com/record/display.uri?eid=2-s2.0-85035007097&origin=resultslist&sort=plf-f&src=s&nlo=1&nlr=20&nls=afprfnm-t&affilName=nort*+caucas*+fed*+univ*&sid=d6607c1bb93f6463cd3c6b4fdd4666d9&sot=afnl&sdt=cl&cluster=scopubyr%2c%222017%22%2ct&sl=53&s=%28AF-ID%28%22North+Caucasus+Federal+University%22+60070541%29%29&relpos=28&citeCnt=4&searchTerm=-
dc.identifier.urihttps://dspace.ncfu.ru:443/handle/20.500.12258/649-
dc.description.abstractCloud computing has become a part of people's lives. However, there are many unresolved problems with security of this technology. According to the assessment of international experts in the field of security, there are risks in the appearance of cloud collusion in uncertain conditions. To mitigate this type of uncertainty, and minimize data redundancy of encryption together with harms caused by cloud collusion, modified threshold Asmuth-Bloom and weighted Mignotte secret sharing schemes are used. We show that if the villains do know the secret parts, and/or do not know the secret key, they cannot recuperate the secret. If the attackers do not know the required number of secret parts but know the secret key, the probability that they obtain the secret depends the size of the machine word in bits that is less than 1/2 ((l-1)). We demonstrate that the proposed scheme ensures security under several types of attacks. We propose four approaches to select weights for secret sharing schemes to optimize the system behavior based on data access speed: pessimistic, balanced, and optimistic, and on speed per price ratio. We use the approximate method to improve the detection, localization and error correction accuracy under cloud parameters uncertaintyru
dc.language.isoenru
dc.publisherInstitute of Electrical and Electronics Engineers Inc.ru
dc.relation.ispartofseriesProceedings - International Workshop on Database and Expert Systems Applications, DEXA-
dc.subjectCloud computingru
dc.subjectCollusionru
dc.subjectRedundant residue number systemru
dc.subjectSecret sharing schemesru
dc.subjectUncertaintyru
dc.titleTowards mitigating uncertainty of data security breaches and collusion in cloud computingru
dc.typeСтатьяru
vkr.amountPages 137-141ru
vkr.instИнститут математики и естественных наук-
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл Описание РазмерФормат 
scopusresults (104).pdf
  Доступ ограничен
64.23 kBAdobe PDFПросмотреть/Открыть
WoS 56 .pdf
  Доступ ограничен
83.22 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.