Peculiarities of the search algorithms organization based on the samples of the code sequences.

Keywords: data center, information security systems, keywords search, attributive coding, multi-authorization mode, multivariate search, target functions.

Abstract

The analysis of modern approaches used in the construction and optimization of algorithms for searching data blocks in accordance with the given samples of code sequences is carried out. Considerable attention is paid to solving the problem of protecting "sensitive" data and, accordingly, organizing a highly functional information security system. For this purpose, it is proposed to adapt the mathematical model of attributive search by keywords in accordance with the algorithms for lightweight decoding and the implementation of the multi-authorization mode. On the basis of the improved mathematical apparatus, basic approaches have been developed for the development, optimization and evaluation at the numerical level of search algorithms by code sequences of keywords, it provides the possibility of automatic generation of methodological recommendations. The system for evaluating the efficiency and functionality of search algorithms is based on calculating the target functions of the accuracy of the data block allocation in accordance with the incoming request, the query execution time in accordance with the average latency level, and the load on the computing resource of the hardware and software complex of the data center information system.

References

Bhattacharjee, A., Borgohain, S. K., Soni, B., Verma, G., &Gao, X.-Z. (2020). Machine Learning, Image Processing, Network Security and Data Sciences Second International Conference, Mind 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part Ii. Springer Singapore.

Bracciali, A., Clark, J., Pintore, F., Rønne, P. B., &Sala, M. (2020). Financial Cryptography and Data Security Fc 2019 International Workshops, Voting and Wtsc, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Springer International Publishing.

Bonneau, J. (2020). Financial cryptography and data security: 24th international conference, Fc 2020, Kota Kinabalu, Malaysia, February 10-14, 2020: revised selected papers. Springer.

Long, J., Zhang, K., Wang, X., & Dai, H.-N. (2019). Lightweight Distributed Attribute Based Keyword Search System for Internet of Things. Security, Privacy, and Anonymity in Computation, Communication, and Storage Lecture Notes in Computer Science, 253–264. doi: 10.1007/978-3-030-24900-7_21.

Huang, D., Dong, Q., & Zhu, Y. (2020). Comparable Attribute-Based Encryption. Attribute-Based Encryption and Access Control, 19–42. https://doi.org/10.1201/9781351210607-2

Fuzzy identity and attribute based encryption for fine grained access control of encrypted data. (2018). International Journal of Modern Trends in Engineering & Research, 5 (7), 23–26. doi: 10.21884/ijmter.2018.5172.m7iz2.

Qiuxin, W. (2014). A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation. China Communications, 11 (13), 93–100. doi: 10.1109/cc.2014.7022531.

Zhenpeng, L., Xianchao, Z., &Shouhua, Z. (2014). Multi-authority Attribute Based Encryption with Attribute Revocation. 2014 IEEE 17th International Conference on Computational Science and Engineering.doi: 10.1109/cse.2014.343.

Li, Q., Feng, D., & Zhang, L. (2012). An attribute based encryption scheme with fine-grained attribute revocation. 2012 IEEE Global Communications Conference (GLOBECOM).doi: 10.1109/glocom.2012.6503225.

Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing. IEEE Access, 6, 18009–18021. doi: 10.1109/access.2018.2820182.

Rane, D. D., &Ghorpade, V. (2015). Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. 2015 International Conference on Pervasive Computing (ICPC)

Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65 (5), 1566–1577 (2016).

Belguith, S., Kaaniche, N., &Russello, G. (2018). Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications.doi: 10.5220/0006854601350146

Wei, J., Liu, W., Hu, X.: Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst. J.12 (2), 1731–1742 (2018).

Abstract views: 0
PDF Downloads: 0
Published
2021-06-26
How to Cite
Hryhorenko , V. (2021). Peculiarities of the search algorithms organization based on the samples of the code sequences. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (43), 177-182. https://doi.org/10.36910/6775-2524-0560-2021-43-29
Section
Computer science and computer engineering