<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of a Control System for Computations in BOINC with Homomorphic Encryption in Residue Number System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mikhail Babenko, Nikolay Kucherov</string-name>
          <email>mgbabenko@ncfu.ru, nkucherov@ncfu.ru</email>
          <email>nkucherov@ncfu.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrei Tchernykh∗</string-name>
          <email>chernykh@cicese.mx</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Chervyakov, Elena Nepretimova and Irina Vashchenko</string-name>
          <email>ncherviakov@ncfu.ru, nev1973@mail.ru, irishechka.26@mail.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CICESE Research Center</institution>
          ,
          <addr-line>Ensenada, B.C., Mexico, 22860</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>North Caucasian Federal University</institution>
          ,
          <addr-line>Stavropol, Russia, 355000</addr-line>
        </aff>
      </contrib-group>
      <fpage>77</fpage>
      <lpage>84</lpage>
      <abstract>
        <p>In this paper, we propose approaches to constructing reliable schemes using the Residue Number System (RNS) for the BOINC volunteer computing systems. We show that application of RNS to homomorphic ciphers allows to build completely homomorphic information security system that not only ensure security but possibility to process encrypted data without its decryption. We present an algorithm for localizing and correcting errors for moduli of a special type.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>BOINC type systems allows obtaining significant functional and economic advantages [BCT+17, IG15, SJJT86].
On the other hand, volunteer computing systems require special attention to security, since, they lead to risks of
confidentiality, integrity and correctness of the obtained results [ASS+14, TBC+17]. Homomorphic ciphers are
used to ensure the security of information [CBT+17, Gen10]. Users can send information to BOINC servers that
is not the result of the requested calculations [TSTB16]. For instance, they could send results with an error or
a set of random bits [KPT+13].</p>
      <p>Here, we consider two main problems: uncompleted tasks, and deliberately distorting results.
1. The problem of an uncompleted task. After the data for processing is sent to one of the participants, he could
not be able to return results, due to software failures, participant’s refusal, natural cataclysm, etc [TSAT15].</p>
      <p>The BOINC systems try to solve this problem by setting a deadline for participant task execution.
2. The problem of deliberately distorting results by users can lead to the failure of all computations performed
by other participants, and need for recalculations, which could requires significant additional time. The
BOINC system solves this problem by using at least 5 replicas (by default)[IG15, TPBS14]. In each project,
this value can be either increased or decreased. The result, adopted by the quorum of client programs, is
considered to be correct or incorrect. Incorrect answers are usually rejected [KPT+16].</p>
      <p>To protect the system from the information distortion, we propose to apply RNS for detection and correction
of errors. RNS improves performance, reliability, security, since, computations are not performed over original
large numbers, but over small projections of large numbers [QPV02, SJJT86].</p>
      <p>Operations on projections can be executed in parallel and independently. Encryption schemes constructed by
using RNS allow building asymptotically optimal security systems, both from a practical and theoretical point
of view [GTN11].</p>
      <p>Homomorphic encryption can be naturally used in cloud computing. RNS creates several pieces of data, and
operations over individual pieces are homomorphic with respect to: addition, subtraction and multiplication.</p>
      <p>These properties of RNS can be used to develop a homomorphic encryption function. In homomorphic
encryption schemes, we consider two types of security: data security and moduli security.</p>
      <p>In the volunteer computing systems like BOINC, when we use redundant RNS to ensure the reliability of
information, the probability of distortion of one or several projections of the result is high.</p>
      <p>In order to provide verification of the result, we propose a model, in which the Boing server does not trust
any user. We develop a simplified mechanism of result verification with a given probability of the correctness.
2
2.1</p>
      <p>RNS homomorphic ciphers and their properties</p>
      <p>Method of conversion from positional number system to RNS
There exist several methods for conversion between positional number system and RNS. Methods based on the
principle of sequential summation of bit modular products are not efficient [Gen10].</p>
      <p>To convert the numbers from positional number system to RNS, we propose to use the method of recursive
doubling, the parallel summation of bit modular products described in the following way [CBD+16, CBKG15]:
ai2i + ai+12i+1
pj = |·|p+j , 0 ≤ i ≤ k, i.e. αi ≡
k
X ai2i p+j
i=0
+
pj
where ki = |Pi−1|pi – for all i from 1 to n are the constants of the system, xi – digits in the RNS representation.</p>
      <p>pi
The value of each sum is in the interval [0, 1). The final result of the sum is defined after the summation and is the
where αi – is the least non negative residue |pj |, αi ∈ {0, 1} in case of binary number system.</p>
      <p>For a further parallelization this method uses the associativity of addition. The details of this parallel method
is described in [Gen10].
2.2</p>
      <p>Method of conversion from RNS to positional number system
For an efficient implementation of decryption algorithms we use the approximate method from [CBD+16]. The
idea of the approximate method of comparison of modular numbers is based on a quotient from division of the
value of a number by the dynamic range of RNS, Chinese reminder theorem (CRT), which relates the positional
number X with its representation with residues (x1, x2, . . . , xn), where xi – is the least non negative residue,
from division by modules from RNS moduli set (p1, p2, . . . , pn), with the following expression
n
where P = Q pi, pi – RNS moduli set, Pi−1 – multiplicative inversion of Pi with respect to pi, and Pi = pPi .</p>
      <p>i=1
If we divide (2) by the constant P , then we obtain an approximate value</p>
      <p>X =
n
X P
i=1 pi</p>
      <p>Pi−1 xi</p>
      <p>P
X
P</p>
      <p>n
= X
i=1</p>
      <p>Pi−1
pi
pi xi
1
=
n
X kixi
i=1
1
(1)
(2)
(3)</p>
      <p>It is worth to note that RNS moduli set has the form p1 = 2a − c and p2 = 2a + c, where c is impair, and
SQ = 2a+1. Considering that SQ is a power of 2, to convert a number from RNS to binary number system it is
not necessary to compute residues from division by large numbers used in methods such as CRT and nCRT.</p>
      <p>Since lim 2aa++11 = 2 , the size of coefficients is asymptotically twice smaller than in methods that allow to
a→∞
compute X with lower complexity than CRT, nCRT and aCRT.</p>
      <p>Algorithm for error detection, localization and correction for moduli set of the
form n2l − 3, 2l − 1, 2l + 1, 2l + 3o
Taking into account the works on constructing a reliable, secure and distributed storage system in the clouds
with erasure codes, Byzantine protocol etc. with parameters (2, 4), we develop the error correction code with a
moduli set of a special form that allows to detect and correct errors using error syndrome.</p>
      <p>We can extend the applicability of the error detection, localization and correction with error syndrome using
moduli set of the form 2l − 3, 2l − 1, 2l + 1, 2l + 3 for cloud computing.</p>
      <p>1. Calculate the value of X, using moduli set 2l − 1, 2l + 1 : SQ23 = 2l − 1 + 2l + 1 = 2l+1. Constants of
1 1
Diagonal function: k2 = − 2l−1 2 l + 1 = 2l + 1, k3 = − 2l+1 2 l + 1 = 2l − 1.</p>
      <p>D23 (X) = |k2x2 + k3x3|2 l + 1 = 2l (x2 + x3) + x2 − x3 l2+1 .</p>
      <p>X =
22l − 9 D14 (X) + 2l + 3 x1 2l − 3 x4
2l+1
Using the equation from the paper [Moh16], we find the value X.</p>
      <sec id="sec-1-1">
        <title>2. If an error occurs in x2, then</title>
        <p>As the gcd 2l − 1, 2l+1 = 1, Eqn. (10) can be written as
|X − x2|2l−1 6= 0.
2l+1X − 2l+1x2 2l−1 6= 0.</p>
      </sec>
      <sec id="sec-1-2">
        <title>Substitute Eqn. (6) in Eqn. (8), then</title>
        <p>As the 2l 2l−1 = 1 Eqn. (11) can be written as
22l − 9 D14 (X) + 2l + 3 x1 + 2l − 3 x4 − 2l+1x2 2l−1 6= 0.
s2 = |8D14 (X) − 4x1 + 2x4 + 2x2|2l−1 6= 0.</p>
      </sec>
      <sec id="sec-1-3">
        <title>3. If an error occurs in x3, then</title>
        <p>
          As the gcd 2l + 1, 2l+1 = 1, Eqn. (
          <xref ref-type="bibr" rid="ref6">13</xref>
          ) can be written as
|X − x3|2l+1 6= 0.
2l+1X − 2l+1x3 2l+1 6= 0.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>Substitute Eqn. (6) in Eqn. (14), then</title>
        <p>
          As the 2l 2l+1 = −1 Eqn. (
          <xref ref-type="bibr" rid="ref12 ref4">15</xref>
          ) can be written as
22l − 9 D14 (X) + 2l + 3 x1 + 2l − 3 x4 − 2l+1x3 2l+1 6= 0.
s3 = |8D14 (X) − 2x1 + 4x4 − 2x3|2l+1 6= 0.
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>4. If an error occurs in x4, then</title>
        <p>|X − x4|2l+3 6= 0.</p>
        <p>
          As the gcd 2l + 3, 2l+1 = 1, Eqn. (
          <xref ref-type="bibr" rid="ref10 ref2 ref5">17</xref>
          ) can be written as
        </p>
      </sec>
      <sec id="sec-1-6">
        <title>Substitute Eqn. (5) in Eqn. (18), then</title>
        <p>The use of error correction codes in the RNS with the given parameters can detect two or correct one error.
We study the data obtained from the cloud using the Eqn. (5) and (6) we find the error syndrome.</p>
        <p>
          1. If an error occurs in x1, then
As the gcd 2l − 3, 2l+1 = 1, then the condition Eqn. (7) is equivalent to:
2l+1X − 2l+1x1 2l−3 6= 0.
(7)
(8)
(9)
(10)
(11)
(12)
(
          <xref ref-type="bibr" rid="ref6">13</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref11">14</xref>
          )
(
          <xref ref-type="bibr" rid="ref12 ref4">15</xref>
          )
(
          <xref ref-type="bibr" rid="ref13 ref3">16</xref>
          )
(
          <xref ref-type="bibr" rid="ref10 ref2 ref5">17</xref>
          )
(18)
(19)
2l+1X − 2l+1x4 2l+3 6= 0.
As the 2l 2l+3 = −3 Eqn. (8) can be written as
s4 = |8D23 (X) − 2x2 + 4x3 − 6x4|2l+3 6= 0.
(20)
        </p>
        <p>
          Using the Eqn. (9), (12), (
          <xref ref-type="bibr" rid="ref13 ref3">16</xref>
          ) and (20) calculate the value of the error syndromes s1, s2, s3, s4. If si 6= 0, we
assume that si = 1, for all i = (1, 4) . Using Table 1, you can calculate the position of error. After excluding
error true value can be restored
        </p>
        <p>
          Example 1. Let X = 92 → (
          <xref ref-type="bibr" rid="ref13 ref3">1, 2, 7, 16</xref>
          ), RNS is defined by moduli set
24 − 3, 24 − 1, 24 + 1, 24 + 3 .
        </p>
        <p>
          1. If error vector is E → (1, 0, 0, 0), then X0 → (
          <xref ref-type="bibr" rid="ref13 ref3">2, 2, 7, 16</xref>
          ). If the error vector is given by: E → (1, 0, 0, 0),
then X0 = X + E → (
          <xref ref-type="bibr" rid="ref13 ref3">2, 2, 7, 16</xref>
          ).
        </p>
        <p>Compute diagonal function values:</p>
        <p>D23 (X0) = |16(2 + 7) + 2 − 7|32 = |16 − 5|32 = 11.</p>
        <p>Because n = 4, then r3 = 24+1+1 = 3, consequently:</p>
        <p>3</p>
        <p>D14 (X0) = |11(16(2 + 16) + 2 − 16)|32 = |11 · 18|32 = 6.</p>
      </sec>
      <sec id="sec-1-7">
        <title>Compute error syndrome value:</title>
        <p>s1 = |8 · 11 + 4 · 2 + 2 · 7 − 6 · 2|13 = 7, since 7 6= 0, it follows that s1 = 1.
s2 = |8 · 6 − 4 · 2 + 2 · 16 + 2 · 2|15 = 1.
s3 = |8 · 6 − 2 · 2 + 4 · 16 − 2 · 7|17 = 9, since 9 6= 0, it follows that s3 = 1.
s4 = |8 · 11 − 2 · 2 − 4 · 7 + 6 · 16|19 = 0.</p>
        <p>Since s1 = s2 = s3 = 1 and s4 = 0, then the case 3 of Table 1, and therefore an error occurred in the x1,
therefore, the true value of X is reduced using the Eqn. (5).</p>
        <p>X =</p>
        <p>D14 (X0) = |11(16(1 + 16) + 1 − 16)|32 = 11.</p>
      </sec>
      <sec id="sec-1-8">
        <title>Compute error syndrome value:</title>
        <p>s1 = |8 · 28 + 4 · 3 + 2 · 7 − 6 · 1|13 = 10, since 10 6= 0, it follows that s1 = 1.
s2 = |8 · 11 − 4 · 1 + 2 · 16 + 2 · 3|15 = 1 since 2 6= 0, it follows that s2 = 1.
s3 = |8 · 11 − 2 · 1 + 4 · 16 − 2 · 7|17 = 0.
s4 = |8 · 28 − 2 · 3 − 4 · 7 + 6 · 16|19 = 1.</p>
        <p>Since s1 = s2 = s4 = 1 and s3 = 0, then the case 4 of Table 1, and therefore an error occurred in the x2,
therefore, the true value of X is reduced using the Eqn. (6).</p>
        <p>
          X =
True value: X = 92.
3. If error vector is E → (0, 0, 1, 0), then we obtain X0 = X + E → (
          <xref ref-type="bibr" rid="ref13 ref3">1, 2, 8, 16</xref>
          ).
        </p>
        <p>Compute diagonal function values:</p>
        <p>D23 (X0) = |16(2 + 8) + 2 − 8|32 = |32 − 6|32 = 26.</p>
        <p>
          True value: X = 92.
4. If error vector is E → (0, 0, 0, 1), then we obtain X0 = X + E → (
          <xref ref-type="bibr" rid="ref10 ref2 ref5">1, 2, 7, 17</xref>
          ).
        </p>
        <p>Compute diagonal function values:</p>
      </sec>
      <sec id="sec-1-9">
        <title>Compute error syndrome value:</title>
        <p>s1 = |8 · 11 + 4 · 2 + 2 · 7 − 6 · 1|13 = 0.
s2 = |8 · 16 − 4 · 1 + 2 · 17 + 2 · 2|15 = 12 since 12 6= 0, it follows that s2 = 1.
s3 = |8 · 16 − 2 · 1 + 4 · 17 − 2 · 7|17 = 10 since 10 6= 0, it follows that s3 = 1.
s4 = |8 · 11 − 2 · 2 − 4 · 7 + 6 · 17|19 = 6 since 6 6= 0, it follows that s4 = 1.</p>
        <p>Since s2 = s3 = s4 = 1 and s1 = 0, then the case 2 of Table 1, and therefore an error occurred in the x4,
therefore, the true value of X is reduced using the Eqn. (5).</p>
        <p>X =</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Conclusion</title>
      <p>In this paper, we propose approaches to construct reliable schemes for BOINC type volunteer computing systems
using Residue Number System, and a scheme for controlling computations. We show how an application of RNS
allows to build completely homomorphic information security systems. We present a new algorithm for localizing
and correcting errors for moduli of a special type.</p>
      <p>Acknowledgment. The work is partially supported by CONACYT (Consejo Nacional de Ciencia y Tecnolog´ıa,
M´exico), grant No. 178415. Part of the work was supported State task No. 2.6035.2017 and Russian
Federation President Grant SP-1215.2016.5. We gratefully acknowledge Evgeny Ivashko for valuable discussions and
comments.
[DIP93]</p>
      <p>Mahadevan Gomathisankaran, Akhilesh Tyagi, and Kamesh Namuduri. HORNS: A homomorphic
encryption scheme for cloud computing using residue number system. In Information Sciences and
Systems (CISS), 2011 45th Annual Conference on, pages 1–5. IEEE, 2011.</p>
      <p>Evgeny Ivashko and Alexander Golovin. Partition algorithm for association rules mining in BOINC–
based enterprise desktop grid. In International Conference on Parallel Computing Technologies, pages
268–272. Springer, 2015.
[KPT+13] Dzmitry Kliazovich, Johnatan E Pecero, Andrei Tchernykh, Pascal Bouvry, Samee U Khan, and
Albert Y Zomaya. CA-DAG: communication-aware directed acyclic graphs for modeling cloud
computing applications. In Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on,
pages 277–284. IEEE, 2013.
[KPT+16] Dzmitry Kliazovich, Johnatan E Pecero, Andrei Tchernykh, Pascal Bouvry, Samee U Khan, and
Albert Y Zomaya. CA-DAG: modeling communication-aware applications for scheduling in cloud
computing. Journal of Grid Computing, 14(1):23–39, 2016.
[SJJT86]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [ASS+14]
          <string-name>
            <given-names>Sameer</given-names>
            <surname>Hasan</surname>
          </string-name>
          <string-name>
            <surname>Albakri</surname>
          </string-name>
          , Bharanidharan Shanmugam, Ganthan Narayana Samy, Norbik Bashah Idris, and
          <string-name>
            <given-names>Azuan</given-names>
            <surname>Ahmed</surname>
          </string-name>
          .
          <article-title>Security risk assessment framework for cloud computing environments</article-title>
          .
          <source>Security and Communication Networks</source>
          ,
          <volume>7</volume>
          (
          <issue>11</issue>
          ):
          <fpage>2114</fpage>
          -
          <lpage>2124</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [BCT+17]
          <string-name>
            <surname>Mikhail</surname>
            <given-names>Babenko</given-names>
          </string-name>
          , Nikolay Chervyakov, Andrei Tchernykh, Nikolay Kucherov, Maria Shabalina, Irina Vashchenko, Gleb Radchenko, and
          <string-name>
            <given-names>Daniil</given-names>
            <surname>Murga</surname>
          </string-name>
          .
          <article-title>Unfairness correction in P2P grids based on residue number system of a special form</article-title>
          .
          <source>1st International Workshop on Uncertainty in Cloud Computing, in conjunction with 28th International Conference on Database and Expert Systems Applications (DEXA17)</source>
          , pages
          <fpage>147</fpage>
          -
          <lpage>151</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [CBD+16]
          <string-name>
            <given-names>Nikolay</given-names>
            <surname>Ivanovich</surname>
          </string-name>
          <string-name>
            <surname>Chervyakov</surname>
          </string-name>
          ,
          <article-title>Mikhail Grigor'evich Babenko, Maxim Anatolievich Deryabin, Anton Sergeevich Nazarov, and Maria Nikolaevna Shabalina. Computation of positional characteristics of numbers in RNS based on approximate method</article-title>
          .
          <source>In NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW)</source>
          ,
          <year>2016</year>
          IEEE, pages
          <fpage>177</fpage>
          -
          <lpage>179</lpage>
          . IEEE,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [CBKG15]
          <article-title>Nikolay Ivanovich Chervyakov, Mikhail Grigorevich Babenko, Nikolay Nikolaevich Kucherov, and Anastasiia Igorevna Garianina. The effective neural network implementation of the secret sharing scheme with the use of matrix projections on FPGA</article-title>
          .
          <source>In International Conference in Swarm Intelligence</source>
          , pages
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [CBT+17]
          <string-name>
            <surname>Nikolay</surname>
            <given-names>Chervyakov</given-names>
          </string-name>
          , Mikhail Babenko, Andrei Tchernykh, Nikolay Kucherov, Vanessa MirandaLo´pez, and
          <string-name>
            <surname>Jorge M. Cort</surname>
          </string-name>
          <article-title>´es-Mendoza. AR-RRNS: Configurable reliable distributed data storage systems for internet of things to ensure security</article-title>
          .
          <source>Future Generation Computer Systems</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [PI13]
          <article-title>[QPV02] PV Ananda Mohan</article-title>
          .
          <article-title>RNS to binary conversion using diagonal function and pirlo and impedovo monotonic function</article-title>
          .
          <source>Circuits, Systems, and Signal Processing</source>
          ,
          <volume>35</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1063</fpage>
          -
          <lpage>1076</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Giuseppe</given-names>
            <surname>Pirlo</surname>
          </string-name>
          and
          <string-name>
            <given-names>Donato</given-names>
            <surname>Impedovo</surname>
          </string-name>
          .
          <article-title>Verification of static signatures by optical flow analysis</article-title>
          .
          <source>IEEE Transactions on Human-Machine Systems</source>
          ,
          <volume>43</volume>
          (
          <issue>5</issue>
          ):
          <fpage>499</fpage>
          -
          <lpage>505</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>Micha¨el Quisquater, Bart Preneel, and Joos Vandewalle. On the security of the threshold scheme based on the Chinese remainder theorem</article-title>
          .
          <source>In International Workshop on Public Key Cryptography</source>
          , pages
          <fpage>199</fpage>
          -
          <lpage>210</lpage>
          . Springer,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Michael A Soderstrand</surname>
            ,
            <given-names>W Kenneth</given-names>
          </string-name>
          <string-name>
            <surname>Jenkins</surname>
          </string-name>
          ,
          <article-title>Graham A Jullien,</article-title>
          and
          <string-name>
            <surname>Fred</surname>
          </string-name>
          J Taylor.
          <article-title>Residue number system arithmetic: modern applications in digital signal processing</article-title>
          . IEEE press,
          <year>1986</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [TBC+17]
          <string-name>
            <surname>Andrei</surname>
            <given-names>Tchernykh</given-names>
          </string-name>
          , Mikhail Babenko, Nikolay Chervyakov, Jorge M.
          <article-title>Cort´es-</article-title>
          <string-name>
            <surname>Mendoza</surname>
            , Nikolay Kucherov, Vanessa Miranda-L´opez, Maxim Deryabin, Inna Dvoryaninova, and
            <given-names>Gleb</given-names>
          </string-name>
          <string-name>
            <surname>Radchenko</surname>
          </string-name>
          .
          <article-title>Towards mitigating uncertainty of data security breaches and collusion in cloud computing</article-title>
          .
          <source>1st International Workshop on Uncertainty in Cloud Computing, in conjunction with 28th International Conference on Database and Expert Systems Applications (DEXA17)</source>
          , pages
          <fpage>137</fpage>
          -
          <lpage>141</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [TPBS14]
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Tchernykh</surname>
          </string-name>
          , Johnatan E Pecero, Aritz Barrondo, and
          <string-name>
            <given-names>Elisa</given-names>
            <surname>Schaeffer</surname>
          </string-name>
          .
          <article-title>Adaptive energy efficient scheduling in Peer-to-Peer desktop grids</article-title>
          .
          <source>Future Generation Computer Systems</source>
          ,
          <volume>36</volume>
          :
          <fpage>209</fpage>
          -
          <lpage>220</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [TSAT15]
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Tchernykh</surname>
          </string-name>
          , Uwe Schwiegelsohn, Vassil Alexandrov, and
          <string-name>
            <surname>El-ghazali Talbi</surname>
          </string-name>
          .
          <article-title>Towards understanding uncertainty in cloud computing resource provisioning</article-title>
          .
          <source>Procedia Computer Science</source>
          ,
          <volume>51</volume>
          :
          <fpage>1772</fpage>
          -
          <lpage>1781</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [TSTB16]
          <string-name>
            <given-names>Andrei</given-names>
            <surname>Tchernykh</surname>
          </string-name>
          , Uwe Schwiegelsohn,
          <string-name>
            <surname>El-ghazali Talbi</surname>
            , and
            <given-names>Mikhail</given-names>
          </string-name>
          <string-name>
            <surname>Babenko</surname>
          </string-name>
          .
          <article-title>Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability</article-title>
          .
          <source>Journal of Computational Science</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>