2021
DOI: 10.11591/ijeecs.v22.i3.pp1650-1658
|View full text |Cite
|
Sign up to set email alerts
|

Methods for secure cloud processing of big data

Abstract: We study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
(9 reference statements)
0
1
0
Order By: Relevance
“…Section 3 is dedicated to the research and development of secure outsourcing methods for storing data using secret sharing technology. Such problems are especially relevant in the context of the rapid development of the internet of things (IoT) [9]- [25]. Chips, smart cards and other physically small devices, as a rule, have significant memory limitations, so there is a need to use cloud storage as an auxiliary tool for secure data storage.…”
mentioning
confidence: 99%
“…Section 3 is dedicated to the research and development of secure outsourcing methods for storing data using secret sharing technology. Such problems are especially relevant in the context of the rapid development of the internet of things (IoT) [9]- [25]. Chips, smart cards and other physically small devices, as a rule, have significant memory limitations, so there is a need to use cloud storage as an auxiliary tool for secure data storage.…”
mentioning
confidence: 99%