Preview

Modern Science and Innovations

Advanced search

THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING

Abstract

The article deals with the theoretical aspects of structural and group analysis. A mathematical model and software implementation of a multilevel disjunctive threshold scheme of the secret based on the Chinese remainder theorem is proposed.

About the Authors

Nikolay Ivanovich Chervyakov
North-Caucasus Federal University
Russian Federation


Mikhail Grigorevich Babenko
North-Caucasus Federal University
Russian Federation


Nikolay Nikolaevich Kucherov
North-Caucasus Federal University
Russian Federation


Viktor Andreevich Kuchukov
North-Caucasus Federal University
Russian Federation


Nataliya Nikolaevna Kuchukova
North-Caucasus Federal University
Russian Federation


References

1. Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam Smith. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs, Journal of Cryptology, 18 Apr 2014 DOI: 10.1007/s00145-014-9184-y.

2. Gomathisankaran M., Tyagi A. Namuduri K., HORNS A Homomorphic encryption scheme for cloud computing using Residue Number System, IEEE transactions on parallel and distributed systems, vol. 23, no. 6, June 2011,pp 995-1003. DOI: 10.1109/ CISS.2011.5766176.

3. Emalda Roslin, Abhirami, Nandita,”SSS-EC: Secure storage services and erasure code implementation in cloud computing ”, International Journal of Engineering Trends and Technology, Vol.4, No.3, June 2013, pp. 275-283.

4. Kanagavalli1, R. Dr. Vagdevi S. A Survey of Homomorphic Encryption Schemes in Cloud Data Storage, International Journal of Recent Development in Engineering and Technology Volume 3, Issue 1, July 2014 pp. 71-75.

5. Craig Gentry. Computing arbitrary functions of encrypted data. Communications of the ACM, Vol. 53, No. 3, March 2010, pp. 97-105 D0I:10.1145/1666420.1666444.

6. Asmuth C., Bloom J. A modular approach to key safeguarding // IEEE Transactions on Information Theory, v. 29 n. 2, 1983 pp. 208-210. DOI: 10.1109/TIT.1983.1056651.

7. Chervyakov N. I., Babenko M. G., Lyakhov P. A., Kiyashko Y. S. and Deryabin M. A. Theoretic Development of Active Security Concept on Elliptical Curve // World Applied Sciences Journal 30 vol. 11, 2014 pp. 1566-1569. DOI: 10.5829/idosi.wasj.2014.30.11.14214.

8. Chervyakov N. I., BabenkoM. G., Lyakhov P. A., Lavrinenko I. N. An Approximate Method for Comparing Modular Numbers and its Application to the Division of Numbers in Residue Number Systems, Cybernetics and Systems Analysis, Volume 50, Issue 6, November 2014, pp. 977-984. DOI 10.1007/s10559-014-9689-2.

9. Yunlei Zhang, Yuuki Tanaka, Shugang Wei, Recoding Algorithms for Minimal Signed-Digit Numbers in Residue Number System, TENCON 2013-2013 IEEE Region 10 Conference (31194), 2013, Page(s): 1-6 DOI: 10.1109/TENCON.2013.6718910.

10. Chervyakov N. I., M. G. Babenko, Kucherov N. N. Algebraicheskie aspekti effektivnoy realizacii metodov zashiti informacii v oblachih vichisleniyah s ispolzovaniem sistemi ostatochih klassov // Infokomunikacionnie tehnologii. 2016. T. 14. №. 4. P. 343-349.


Review

For citations:


Chervyakov N.I., Babenko M.G., Kucherov N.N., Kuchukov V.A., Kuchukova N.N. THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING. Modern Science and Innovations. 2017;(4):21-25. (In Russ.)

Views: 41


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2307-910X (Print)