Algebraic aspects of effective implementation of methods for information protection in cloud computing by using residue number system

Автор: Chervyakov Nikolai Ivanovich, Babenko Mikhail Grigorevich, Kucherov Nikolay Nikolaevich

Журнал: Инфокоммуникационные технологии @ikt-psuti

Рубрика: Теоретические основы технологий передачи и обработки информации и сигналов

Статья в выпуске: 4 т.14, 2016 года.

Бесплатный доступ

The article researches the methods of confidential information security processed with cloud computing. We demonstrated effectiveness of homomorphic encryption application with residue number system for cloud computing protection. Proposed schemes of homomorphic encryption provide to perform arithmetic operations (+, ´, Å) in cloud by ciphertext. We researched security dependence on information capacity known to cloud providers under cloudy conspiracy. Analysis of encrypted data protection is performed by using homomorphic encryption under cloudy conspiracy and various computational models. We propose solution of security problem during data transmission and cloud storage.

Еще

Homomorphic encryption, residue number system, cloud computing, secret sharing schemes, montgomery algorithm

Короткий адрес: https://sciup.org/140191911

IDR: 140191911   |   DOI: 10.18469/ikt.2016.14.4.01

Статья научная