- Cryptography and Data Security
- Cybersecurity and Information Systems
- Privacy-Preserving Technologies in Data
- Cryptography and Residue Arithmetic
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Advanced Data Storage Technologies
- Blockchain Technology Applications and Security
- Advanced Data Processing Techniques
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Distributed and Parallel Computing Systems
- Neural Networks and Applications
- Advanced Research in Systems and Signal Processing
- Cloud Data Security Solutions
- Advanced Computational Techniques in Science and Engineering
- Complexity and Algorithms in Graphs
- Recycling and Waste Management Techniques
- Caching and Content Delivery
- Big Data and Business Intelligence
- Stochastic Gradient Optimization Techniques
- Simulation Techniques and Applications
- Information Systems and Technology Applications
- Graph Theory and Algorithms
- Advanced Steganography and Watermarking Techniques
North-Caucasus Federal University
2020-2024
A smart city has a complex hierarchical communication system with various components. It must meet the requirements of fast connection, reliability, and security without data compromise. Internet Things technology is widely used to provide connectivity control solutions for sensors other devices using heterogeneous networking technologies. In this paper, we propose routing solution Wireless Sensor Networks (WSN) Mobile Ad hoc NETworks (MANET) increasing speed, sufficient security. Many...
This article presents a study related to increasing the performance of distributed computing systems. The essence fog lies in use so-called edge devices. These devices are low-power, so they extremely sensitive computational complexity methods used. is aimed at improving efficiency calculations while maintaining an appropriate level reliability by applying Residue Number System (RNS). We investigating for determining sign number RNS based on core function order develop new, fast method. As...
In this paper, a study is carried out related to improving the reliability and fault tolerance of Fog Computing systems. This work continuation previous studies. past, we have developed method fast operation for determining sign number in Residue Number System based on Akushsky Core Function. We managed increase efficiency calculations by using approximate rank number. However, result not final. consider detail methods techniques During research, it was found that so-called weights can be...
Fully Homomorphic Encryption (FHE) permits processing information in the form of ciphertexts without decryption. It can ensure security common technologies used today, such as cloud computing, Internet Things, and machine learning, among others. A primary disadvantage for its practical application is low efficiency sign comparison operations. Several FHE schemes use Residue Number System (RNS) to decrease time complexity these Converting from RNS positional number system calculating...
Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such machine learning, statistics, and image to remains challenge. The computational complexity some operations can significantly increase time. In this paper, we focus on the analysis two state-of-the-art HE matrix multiplication algorithms with best time space complexities....
The widespread use of cloud technology allows optimizing the economic costs maintaining IT infrastructure enterprises, but this increases likelihood theft confidential data. One mechanisms to protect data from is cryptography. Using classical primitives symmetric and asymmetric encryption does not allow processing in encrypted form. Homomorphic used for performing arithmetic operations over text obtaining an result that corresponds performed plaintext. perspective directions constructing...
Confidential data security is associated with the cryptographic primitives, asymmetric encryption, elliptic curve cryptography, homomorphic pseudorandom sequence generators based on an curve, etc. For their efficient implementation often used Residue Number System that allows executing additions and multiplications parallel computing channels without bit carrying between channels. A critical operation in implementations of cryptosystems base extension. It refers to a residue extended moduli...
The technologies of artificial intelligence and cloud systems have recently been actively developed implemented. In this regard, the issue their joint use, which has topical for several years, become more acute. problem data privacy preservation in computing acquired status critical long before necessity use with intelligence, made it even complicated. This paper presents an overview both techniques themselves, as well methods to ensure privacy. review considers that utilize differentiated...
the use of homomorphic encryption to ensure computational security imposes additional overhead associated with and decryption data. One mechanisms that can be used increase data coding rate is quadratic residue number system. The system reduces decimal multiplications by half when multiplying two complex numbers. However, a restrictions related representation number. In this article, we propose mechanism for choosing parameters develop an efficient encoding algorithm.
Fog computing (FC) is a distributed architecture in which resources and services are placed on edge devices closer to data sources. This enables more efficient processing, shorter latency times, better performance. was shown be promising solution for addressing the new requirements. However, there still many challenges overcome utilize this paradigm, particular, reliability security. Following need, systematic literature review conducted create list of As result, following four key...
Computationally complex problems can be solved using distributed computing resources, but the problem arises in optimal way of distributing tasks between nodes order to reduce total execution time. However, computation time for a task on same device is not constant and change dynamically over In this article, we explore methods dynamic load balancing minimize problem. We study three groups based use probability theory mathematical statistics methods, evolutionary algorithms artificial neural...
The issue of data security is one the key issues using homomorphic encryption algorithms. In this article, we investigate computational indistinguishability scheme BFV. We propose a scenario in which attackers can find out secret key, potentially lead to information leakage. show that postulate BFV increase level by introducing an additional error erroneous.