Результаты исследований: Научные публикации в периодических изданиях › статья в журнале по материалам конференции › Рецензирование
Combining PBFT and Raft for Scalable and Fault-tolerant Distributed Consensus. / Дик, Александр Геннадьевич; Богданов, Александр Владимирович; Щеголева, Надежда Львовна; Киямов, Жасур Уткирович; Хватов, Валерий.
в: Physics of Particles and Nuclei, Том 55, № 3, 2024, стр. 418–420.Результаты исследований: Научные публикации в периодических изданиях › статья в журнале по материалам конференции › Рецензирование
}
TY - JOUR
T1 - Combining PBFT and Raft for Scalable and Fault-tolerant Distributed Consensus
AU - Дик, Александр Геннадьевич
AU - Богданов, Александр Владимирович
AU - Щеголева, Надежда Львовна
AU - Киямов, Жасур Уткирович
AU - Хватов, Валерий
N1 - Conference code: 10
PY - 2024
Y1 - 2024
N2 - Ensuring the confidentiality and protection of personal information in big data is an important aspect in data processing. One of the effective methods to achieve a high level of protection is depersonalization of data. The article presents an overview of modern methods of preserving personal data when conducting various kinds of research, in business analytics, etc.. To reduce the probability of data de-identification, a hashing method based on the use of the Kessak-256 hash function and the addition of a dynamic random string for each dataset element is proposed. This method allows you to significantly increase the time of hacking and the amount of resources required by the attacker. This approach can be used for secure data transmission, exchange and storage
AB - Ensuring the confidentiality and protection of personal information in big data is an important aspect in data processing. One of the effective methods to achieve a high level of protection is depersonalization of data. The article presents an overview of modern methods of preserving personal data when conducting various kinds of research, in business analytics, etc.. To reduce the probability of data de-identification, a hashing method based on the use of the Kessak-256 hash function and the addition of a dynamic random string for each dataset element is proposed. This method allows you to significantly increase the time of hacking and the amount of resources required by the attacker. This approach can be used for secure data transmission, exchange and storage
UR - https://indico.jinr.ru/event/3505/contributions/21826/
U2 - 10.1134/S1063779624030225
DO - 10.1134/S1063779624030225
M3 - Conference article
VL - 55
SP - 418
EP - 420
JO - Physics of Particles and Nuclei
JF - Physics of Particles and Nuclei
SN - 1063-7796
IS - 3
Y2 - 3 July 2023 through 7 July 2023
ER -
ID: 113495249