- Cryptography and Residue Arithmetic
- Cryptography and Data Security
- Advanced Data Storage Technologies
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Advanced Data Processing Techniques
- Numerical Methods and Algorithms
- Coding theory and cryptography
- Cryptographic Implementations and Security
- Cybersecurity and Information Systems
- Privacy-Preserving Technologies in Data
- Neural Networks and Applications
- Information Systems and Technology Applications
- Parallel Computing and Optimization Techniques
- Advanced Computational Techniques in Science and Engineering
- Cloud Computing and Resource Management
- Complexity and Algorithms in Graphs
- graph theory and CDMA systems
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Advanced Scientific Research Methods
- Mobile Ad Hoc Networks
- Big Data Technologies and Applications
- Image Processing and 3D Reconstruction
- Computability, Logic, AI Algorithms
North-Caucasus Federal University
2015-2024
Institute for System Programming
2020-2024
Sirius University of Science and Technology
2021-2023
South Ural State University
2018
National Research University Higher School of Economics
2017
Indian Institute of Information Technology Allahabad
2015
Abstract Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats breaches. Modern encryption techniques ensure are considered as the best option protect stored transit from an unauthorized third-party. However, decryption process is necessary when must be processed or analyzed, falling...
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss information, denial access, information leakage, collusion, technical failures, data security breaches are difficult to predict anticipate in advance. These types nonstationarity one the main issues design reliable IoT infrastructure capable mitigating their consequences. It is not sufficient propose solutions for given scenario, but mechanisms adapt...
The residue number system (RNS) is an unconventional which can lead to parallel and fault-tolerant arithmetic operations. However, the complexity of residue-to-binary conversion for large moduli reduces overall RNS performance, makes it inefficient nowadays high-performance computation systems. In this paper, we present improved approximate Chinese remainder theorem (CRT) with aim performing efficient general sets. To achieve aim, required fraction bits accurate derived. Besides, a method...
We discuss issues of modular learning in artificial neural networks and explore possibilities the partial use modules when computational resources are limited. The proposed method is based on ability a wavelet transform to separate information into high- low-frequency parts. Using expertise gained developing convolutional networks, authors perform transverse-layer partitioning network for further devices with low capability. theoretical justification this approach paper supported by...
A smart city has a complex hierarchical communication system with various components. It must meet the requirements of fast connection, reliability, and security without data compromise. Internet Things technology is widely used to provide connectivity control solutions for sensors other devices using heterogeneous networking technologies. In this paper, we propose routing solution Wireless Sensor Networks (WSN) Mobile Ad hoc NETworks (MANET) increasing speed, sufficient security. Many...
Number comparison has long been recognized as one of the most fundamental non-modular arithmetic operations to be executed in a non-positional Residue System (RNS). In this paper, new technique for designing comparators RNS numbers represented an arbitrary moduli set is presented. It based on newly introduced modified diagonal function, whose strictly monotonic properties make it possible replace cumbersome finding remainder division by large and awkward number with significantly simpler...
Ensuring reliable data storage in a cloud environment is challenging problem. One of the efficient mechanisms used to solve it Redundant Residue Number System (RRNS) with projection method, commonly mechanism for detecting errors. However, error correction based on method has exponential complexity depending number control and working moduli. In this paper, we propose an optimization using base extension Hamming distance reduce calculated projections. We show that they can be reduced up...
Cloud computing has become a part of people's lives. However, there are many unresolved problems with security this technology. According to the assessment international experts in field security, risks appearance cloud collusion uncertain conditions. To mitigate type uncertainty, and minimize data redundancy encryption together harms caused by collusion, modified threshold Asmuth-Bloom weighted Mignotte secret sharing schemes used. We show that if villains do know parts, and/or not key,...
In this paper, a new simplified iterative division algorithm for modular numbers that is optimized on the basis of Chinese remainder theorem (CRT) with fractions developed. It requires less computational resources than CRT integers and mixed radix number systems (MRNS). The main idea (a) to transform residual representation dividend divisor into weighted fixed-point code (b) find higher power 2 in written residue system (RNS). This information acquired using fractions: defined by zeros...
Today, cloud technology continues to evolve. Using services allows you get financial benefitsio Still, many companies and users are in no hurry transfer their infrastructure the due incompletely resolved problems related security of data storage processing. Since case storing processing open data, a provider gets access an attacker can also gain by hacking account. In encrypted transmission cloud, confidentiality will be preserved only tasks, since require decryption task. The use...
This paper addresses error correction codes approach in order to improve the performance of BOINC under uncertainty users' behavior. Redundant Residue Number System (RRNS) moduli set special form provides user unfairness, reliability, decreased redundancy and load computing network. Error code RRNS is improved by using syndrome. It decreases amount computations required for data decoding up 20/7 times compared projection methods. The proposed modification syndrome allow omit assumption that...
This article presents a study related to increasing the performance of distributed computing systems. The essence fog lies in use so-called edge devices. These devices are low-power, so they extremely sensitive computational complexity methods used. is aimed at improving efficiency calculations while maintaining an appropriate level reliability by applying Residue Number System (RNS). We investigating for determining sign number RNS based on core function order develop new, fast method. As...
In this paper, a study is carried out related to improving the reliability and fault tolerance of Fog Computing systems. This work continuation previous studies. past, we have developed method fast operation for determining sign number in Residue Number System based on Akushsky Core Function. We managed increase efficiency calculations by using approximate rank number. However, result not final. consider detail methods techniques During research, it was found that so-called weights can be...
Cloud technologies are widely used for storage services. However, the single cloud cannot ensure reliability of data. To solve security issue, we present a multi-cloud based architecture called WA-RRNS that combines weighted access scheme and threshold secret sharing redundant residue number system with multiple failure detection/recovery mechanisms homomorphic ciphers. For better tradeoffs between performance, uses parameters to adjust redundancy, encryption-decryption speed, data loss...