Sergey Krendelev

Learn More
In this article we describe two alternative order-preserving encryption schemes. First scheme is based on arithmetic coding and the second scheme uses sequence of matrices for data encrypting. In the beginning of this paper we briefly describe previous related work published in recent time. Then we propose alternative variants of OPE and consider them in(More)
Cloud computing and, more particularly, cloud databases, is a great technology for remote centralized data managing. However, there are some drawbacks including privacy issues, insider threats and potential database thefts. Full encryption of remote database does solve the problem, but disables many operations that can be held on DBMS side; therefore(More)
In this article we describe a simplified version of Polly Cracker-style fully homomorphic encryption scheme. The main feature of our scheme is an ability to define a strict upper bound of ciphertext size when performing calculations on it for both addition and multiplication. Combined with homomorphic properties of Polly Cracker it's able to reach high(More)
—Outsourced computations and, more particularly, cloud computations, are widespread nowadays. That is why the problem of keeping the data security arises. Multiple fully homomorphic cryptosystems were proposed in order to perform secret computations in untrusted environments. But most of the existent solutions are practically inapplicable as they require(More)
Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we propose solution focused on securing outsourced database content using proprietary developed Order Preserving(More)
—Security of outsourced data is crucial for businesses. To protect and secure outsourced database, as a part of dynamic web resource while maintaining site's work, we propose a solution featuring following key ideas. Firstly, we suggest to encrypt database content granularly with order preserving and homomor-phic encryptions in order to conduct operation(More)
This paper describes implementation and introducing of lock manager to hosting management product as an aspect of scalability the product from single server to multi-server environment. Main goal of the lock manager is controll on access to shared resources. There are also presented a review of existing solutions, which are analyzed by several criteria and(More)
  • 1