Показать сокращенную информацию
dc.contributor.author | Seitkulov, Yerzhan N. | |
dc.contributor.author | Boranbayev, Seilkhan N. | |
dc.contributor.author | Ulyukova, Gulden B. | |
dc.contributor.author | Yergaliyeva, Banu B. | |
dc.contributor.author | Satybaldina, Dina | |
dc.date.accessioned | 2024-12-18T06:49:37Z | |
dc.date.available | 2024-12-18T06:49:37Z | |
dc.date.issued | 2021 | |
dc.identifier.issn | 2502-4752 | |
dc.identifier.other | DOI: 10.11591/ijeecs.v22.i3.pp1650-1658 | |
dc.identifier.uri | http://rep.enu.kz/handle/enu/20309 | |
dc.description.abstract | We study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theory and methods of secure outsourcing for various abstract equations with secret parameters, and then present the results of using these methods in solving applied problems with secret parameters, arising from the modeling of economic processes. Many economic tasks involve processing a large set of economic indicators. Therefore, we are considering a typical economic problem that can only be solved on very powerful computers. | ru |
dc.language.iso | en | ru |
dc.publisher | Indonesian Journal of Electrical Engineering and Computer Science | ru |
dc.relation.ispartofseries | Vol. 22, No. 3, June 2021, pp. 1650~1658; | |
dc.subject | Big data | ru |
dc.subject | Cloud computing | ru |
dc.subject | Information security | ru |
dc.subject | Internet of things | ru |
dc.subject | Secure outsourcing | ru |
dc.title | Methods for secure cloud processing of big data | ru |
dc.type | Article | ru |