?
On the deductive security of queries to confidential databases in cloud computing systems
Moscow University Computational Mathematics and Cybernetics. 2017. Vol. 41. No. 1. P. 60-70.
Zakharov V., Varnovsky N. P., Shokurov A. V.
Translator: Zakharov V.
We study some simple models of confidential databases in cloud computing systems. In the framework of these models we introduce a concept of deductive security for queries to such databases, find necessary and sufficient conditions of deductive security, and describe some classes of queries which satisfy these requirements.
Zakharov V., Варновский Н. П., Шокуров А. В., Вестник Московского университета. Серия 15: Вычислительная математика и кибернетика 2017 № 1 С. 38-44
We study some simple models of confidential databases in cloud computing systems. In the framework of these models we introduce a concept of deductive security for queries to such databases, find necessary and sufficient conditions of deductive security, and describe some classes of queries which satisfy these requirements. ...
Added: October 13, 2016
Zakharov V., Варновский Н. П., Шокуров А. В., В кн. : Материалы XII Международного семинара "Дискретная математика и её приложения" имени академика О.Б. Лупанова (Москва, МГУ, 20-25 июня 2016г.). : М. : Изд-во механико-математического факультета МГУ, 2016. С. 371-373.
Открытие стойких систем вполне гомоморфного шифрования создало теоретические предпосылки решения задачи обеспечения информационной безопасности систем удаленных вычислений, включая системы облачных вычислений. Однако, как показано в работе, даже в том случае, когда проводится лишь вычисление функций от хранящихся на облаке конфиденциальных значений аргументов, защита данных невозможна уже для системы с двумя пользователями. Для преодоления этой трудности ...
Added: October 13, 2016
Mamay E., International Journal of Open Information Technologies 2022 Т. 10 № 11 С. 87-104
The article discusses the use of digital technologies in law enforcement through the prism of the balance of public and private interests. The author analyses the system of legal regulation, studies the normative legal acts regulating digital relations and the use of information and communication technologies. Empirical ground of the study constitutes of more than ...
Added: November 3, 2022
Киселева Н. Н., Дударев В.А., Столяренко А. В., Вестник Казанского технологического университета 2014 Т. 17 № 19 С. 372-376
Integrated system (IS) of databases (DB) on the properties of inorganic substances and materials that includes DBs developed by Baikov Institute (Russia) and NIMS (Japan) was created. The service-oriented architecture on the basis of Web-services application for support of interaction between heterogeneous information systems was used for DBs integrations. The special metabase is used for ...
Added: January 20, 2016
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 5 С. 69-79
Change of a contour of safety and exit of critical assets of the organizations from under internal control with the subsequent migration of these assets on cloudy Wednesday nominated a problem of management of information security of the corporate systems functioning on the basis of technology of cloud computing to the first place. All this ...
Added: March 26, 2015
Tsaregorodtsev A. V., Лавриненко М. М., Лапенкова Н. В., Безопасность информационных технологий 2014 № 1 С. 36-40
Cloud computing will be one of the most common IT technologies to deploy applications, due to its key features: on-demand network access to a shared pool of configurable computing resources, flexibility and good quality/price ratio. Migrating to cloud architecture enables organizations to reduce the overall cost of implementing and maintaining the infrastructure and reduce development ...
Added: March 26, 2015
Борисенко О. Д., Пастухов Р. К., С.Д. Кузнецов, Труды Института системного программирования РАН 2016 Т. 28 № 6 С. 111-120
Apache Spark is a framework providing fast computations on Big Data using MapReduce model. With cloud environments Big Data processing becomes more flexible since they allow to create virtual clusters on-demand. One of the most powerful open-source cloud environments is Openstack. The main goal of this project is to provide an ability to create virtual ...
Added: January 25, 2018
Tsaregorodtsev A. V., Качко А. К., Лавриненко М. М., Безопасность информационных технологий 2014 № 1 С. 22-27
In response to the ever growing needs in the storage and processing of data the main position are occupied by informational-telecommunication systems, operating on the basis of cloud computing. In this case, the key point in the use of cloud computing is the problem of information security. This article is primarily intended to cover the ...
Added: March 26, 2015
Zelenkov Y., Вестник Южно-Уральского государственного университета. Серия: Вычислительная математика и информатика 2016 Vol. 5 No. 2 P. 68-83
Migrating to the cloud is the main direction of enterprise IT optimization today. Many research papers confirm that cloud computing provides economic benefits, because it enhances flexibility and reduces costs. In other studies, cloud-specific risks are identified and their impact on the customer business is evaluated. However, most often, benefits and risks are considered separately. ...
Added: October 29, 2017
Tsaregorodtsev A. V., Дербин Е. А., Мухин И. Н., Информация и безопасность 2015 Т. 18 № 3 С. 408-411
The use of cloud computing to build of IT-infrastructure of the organization implies the refusal of the organization direct control over the security aspects. There is a need for solving the problem of data privacy in the design architecture based on cloud computing technology. In the article the simulation method of data processing using Petri ...
Added: March 15, 2016
Zakharov V., Варновский Н. П., Шокуров А. В., Вестник Московского университета. Серия 15: Вычислительная математика и кибернетика 2016 № 2 С. 32-38
We study a formal model of cloud computing systems supplied with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic open key cryptosystem we show how to build a secure cloud computing system in the framework of this model. ...
Added: October 13, 2016
Shikota S., Menshutin A., Shchur L., Программная инженерия 2012 № 9 С. 16-22
Paper concentrated on the discussion of the ways for development of platform combining software and hardware for the goal to simplify access to the resources for inexperienced user. Simply and intuitive, friendly interface to resources gives to user possibility to concentrate exclusively on the solving of his main task. ...
Added: March 7, 2016
Tsaregorodtsev A. V., Малюк А. А., Макаренко Е. В., Безопасность информационных технологий 2014 № 4 С. 68-74
Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of ...
Added: March 26, 2015
Tsaregorodtsev A. V., Нелинейный мир 2013 Т. 11 № 9 С. 610-621
Use of cloud computing applications and services requires review and adaptation of existing formal models for informational telecommunication systems security. It is necessary to consider the benefits of cloud deployment models and provide the procedure for allocating process among components of cloud computing environment for achieving confidentiality and data protection. ...
Added: March 26, 2015
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
Tsaregorodtsev A. V., Los A., Sorokin A., Национальная безопасность / nota bene 2015
В статье рассматриваются вопросы обеспечения информационной безопасности при проведении облачных вычислений. Информационно-телекоммуникационные системы, функционирующие на основе технологии облачных вычислений, в последнее время получают все большее распространение в связи с постоянно растущими потребностями в вопросах обработки и хранения больших объемов данных, что подтверждает актуальность рассматриваемых в статье вопросов. При этом ключевым моментом при использовании облачных вычислений ...
Added: October 20, 2015
Egorova K., Smirnova N., Toukach Ph., Glycobiology 2021 Vol. 31 No. 5 P. 524-529
We report the accomplishment of the first stage of the development of a novel manually curated database on glycosyltransferase (GT) activities, CSDB_GT. CSDB_GT (http://csdb.glycoscience.ru/gt.html) has been supplemented with GT activities from Saccharomyces cerevisiae. Now it provides the close-to-complete coverage on experimentally confirmed GTs from the three most studied model organisms from the three kingdoms: Plantae ...
Added: October 14, 2021
Isaev E., Dumsky D., Samodurov V. et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
Tsaregorodtsev A. V., Мухин И. Н., Боридько С. И., Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
Chuprikov P., Davydov A., Kogan K. et al., Computer Networks 2021 Vol. 189 Article 107915
Efficient representation of data aggregations is a fundamental problem in modern big data applications, where network topologies and deployed routing and transport mechanisms play a fundamental role in optimizing desired objectives such as cost, latency, and others. In traditional networking, applications use TCP and UDP transports as a primary interface for implemented applications that hide ...
Added: March 14, 2022
Kuznetsov S. D., Turdakov D. Y., Борисенко О. Д., Труды Института системного программирования РАН 2014 Т. 26 № 4 С. 33-44
This article is dedicated to automation of cluster creation and management for Apache Spark MapReduce implementation in Openstack environments. As a result of this project open-source (Apache 2.0 license) implementation of toolchain for virtual cluster on-demand creation in Openstack environments was presented. The article contains an overview of existing solutions for clustering automation in cloud ...
Added: November 26, 2017
Philip V Toukach, Scherbinina S. I., Frank M., Glycobiology 2022 Vol. 32 No. 6 P. 460-468
Population analysis in terms of glycosidic torsion angles is frequently used to reveal preferred conformers of glycans. However, due to high structural diversity and flexibility of carbohydrates, conformational characterization of complex glycans can be a challenging task. Herein we present a conformation module of oligosaccharide fragments occurring in natural glycan structures developed on the platform ...
Added: October 24, 2022