METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS


Yergaliyeva B.B. Seitkulov Y.N. Satybaldina D.Z.H.
15 January 2022Little Lion Scientific

Journal of Theoretical and Applied Information Technology
2022#100Issue 1235 - 245 pp.

In this work, we study methods for the secure use of external insecure computers (servers) when solving computationally-complex problems with secret parameters. This problem is one of the important scientific directions in the field of information security of cloud computing. The article presents methods for secure outsourcing of the problem of finding the extremum of a function, as well as one method for finding the value of an analytical (holomorphic) function on a secret argument. Note that our main goal is to demonstrate new methods of secure outsourcing of scientific computing, so we model classes of problems in such a way as to clearly show the essence of these methods.

Big Data , Client-Server Interactions , Cloud Computing , Computationally-Complex Problem , Information Security , Secure Outsourcing

Text of the article Перейти на текст статьи

Gumilyov Eurasian National University, Kazakhstan

Gumilyov Eurasian National University

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026