Показать сокращенную информацию

dc.contributor.authorSeitkulov, Yerzhan N.
dc.contributor.authorBoranbayev, Seilkhan N.
dc.contributor.authorUlyukova, Gulden B.
dc.contributor.authorYergaliyeva, Banu B.
dc.contributor.authorSatybaldina, Dina Satybaldina
dc.date.accessioned2024-12-11T10:40:01Z
dc.date.available2024-12-11T10:40:01Z
dc.date.issued2021
dc.identifier.issn2502-4752
dc.identifier.otherDOI: 10.11591/ijeecs.v22.i3.pp1650-1658
dc.identifier.urihttp://rep.enu.kz/handle/enu/20096
dc.description.abstractWe study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theory and methods of secure outsourcing for various abstract equations with secret parameters, and then present the results of using these methods in solving applied problems with secret parameters, arising from the modeling of economic processes. Many economic tasks involve processing a large set of economic indicators. Therefore, we are considering a typical economic problem that can only be solved on very powerful computers.ru
dc.language.isoenru
dc.publisherIndonesian Journal of Electrical Engineering and Computer Scienceru
dc.relation.ispartofseriesVol. 22, No. 3;
dc.subjectBig dataru
dc.subjectCloud computingru
dc.subjectInformation securityru
dc.subjectInternet of thingsru
dc.subjectSecure outsourcingru
dc.titleMethods for secure cloud processing of big dataru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию