METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS
Yergaliyeva B.B. Seitkulov Y.N. Satybaldina D.Z.H.
15 January 2022Little Lion Scientific
Journal of Theoretical and Applied Information Technology
2022#100Issue 1235 - 245 pp.
In this work, we study methods for the secure use of external insecure computers (servers) when solving computationally-complex problems with secret parameters. This problem is one of the important scientific directions in the field of information security of cloud computing. The article presents methods for secure outsourcing of the problem of finding the extremum of a function, as well as one method for finding the value of an analytical (holomorphic) function on a secret argument. Note that our main goal is to demonstrate new methods of secure outsourcing of scientific computing, so we model classes of problems in such a way as to clearly show the essence of these methods.
Big Data , Client-Server Interactions , Cloud Computing , Computationally-Complex Problem , Information Security , Secure Outsourcing
Text of the article Перейти на текст статьи
Gumilyov Eurasian National University, Kazakhstan
Gumilyov Eurasian National University
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026