<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Development of a Control System for Computations in BOINC with Homomorphic Encryption in Residue Number System</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mikhail</forename><surname>Babenko</surname></persName>
							<email>mgbabenko@ncfu.ru</email>
						</author>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Kucherov</surname></persName>
							<email>nkucherov@ncfu.ru</email>
						</author>
						<author>
							<persName><forename type="first">Andrei</forename><surname>Tchernykh</surname></persName>
							<email>chernykh@cicese.mx</email>
						</author>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Chervyakov</surname></persName>
							<email>ncherviakov@ncfu.ru</email>
						</author>
						<author>
							<persName><forename type="first">Elena</forename><surname>Nepretimova</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Irina</forename><surname>Vashchenko</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasian Federal University Stavropol</orgName>
								<address>
									<postCode>355000</postCode>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">CICESE Research Center Ensenada</orgName>
								<address>
									<addrLine>B.C</addrLine>
									<postCode>22860</postCode>
									<settlement>Mexico</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">North Caucasian Federal University Stavropol</orgName>
								<address>
									<postCode>355000</postCode>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Development of a Control System for Computations in BOINC with Homomorphic Encryption in Residue Number System</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CFB9DDD16DDAD2D379AEDCCBBD12467D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper, we propose approaches to constructing reliable schemes using the Residue Number System (RNS) for the BOINC volunteer computing systems. We show that application of RNS to homomorphic ciphers allows to build completely homomorphic information security system that not only ensure security but possibility to process encrypted data without its decryption. We present an algorithm for localizing and correcting errors for moduli of a special type.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>BOINC type systems allows obtaining significant functional and economic advantages [BCT + 17, IG15, SJJT86]. On the other hand, volunteer computing systems require special attention to security, since, they lead to risks of confidentiality, integrity and correctness of the obtained results [ASS + 14, TBC + 17]. Homomorphic ciphers are used to ensure the security of information [CBT + 17, Gen10]. Users can send information to BOINC servers that is not the result of the requested calculations <ref type="bibr" target="#b17">[TSTB16]</ref>. For instance, they could send results with an error or a set of random bits [KPT + 13].</p><p>Here, we consider two main problems: uncompleted tasks, and deliberately distorting results.</p><p>1. The problem of an uncompleted task. After the data for processing is sent to one of the participants, he could not be able to return results, due to software failures, participant's refusal, natural cataclysm, etc <ref type="bibr" target="#b16">[TSAT15]</ref>.</p><p>The BOINC systems try to solve this problem by setting a deadline for participant task execution.</p><p>2. The problem of deliberately distorting results by users can lead to the failure of all computations performed by other participants, and need for recalculations, which could requires significant additional time. The BOINC system solves this problem by using at least 5 replicas (by default) <ref type="bibr" target="#b8">[IG15,</ref><ref type="bibr" target="#b15">TPBS14]</ref>. In each project, this value can be either increased or decreased. The result, adopted by the quorum of client programs, is considered to be correct or incorrect. Incorrect answers are usually rejected [KPT + 16].</p><p>To protect the system from the information distortion, we propose to apply RNS for detection and correction of errors. RNS improves performance, reliability, security, since, computations are not performed over original large numbers, but over small projections of large numbers <ref type="bibr" target="#b13">[QPV02,</ref><ref type="bibr" target="#b14">SJJT86]</ref>.</p><p>Operations on projections can be executed in parallel and independently. Encryption schemes constructed by using RNS allow building asymptotically optimal security systems, both from a practical and theoretical point of view <ref type="bibr" target="#b7">[GTN11]</ref>.</p><p>Homomorphic encryption can be naturally used in cloud computing. RNS creates several pieces of data, and operations over individual pieces are homomorphic with respect to: addition, subtraction and multiplication.</p><p>These properties of RNS can be used to develop a homomorphic encryption function. In homomorphic encryption schemes, we consider two types of security: data security and moduli security.</p><p>In the volunteer computing systems like BOINC, when we use redundant RNS to ensure the reliability of information, the probability of distortion of one or several projections of the result is high.</p><p>In order to provide verification of the result, we propose a model, in which the Boing server does not trust any user. We develop a simplified mechanism of result verification with a given probability of the correctness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">RNS homomorphic ciphers and their properties</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Method of conversion from positional number system to RNS</head><p>There exist several methods for conversion between positional number system and RNS. Methods based on the principle of sequential summation of bit modular products are not efficient <ref type="bibr" target="#b6">[Gen10]</ref>.</p><p>To convert the numbers from positional number system to RNS, we propose to use the method of recursive doubling, the parallel summation of bit modular products described in the following way [CBD + 16, CBKG15]:</p><formula xml:id="formula_0">a i 2 i + a i+1 2 i+1 pj = |•| + pj , 0 ≤ i ≤ k, i.e. α i ≡ k i=0 a i 2 i + pj + pj<label>(1)</label></formula><p>where α i -is the least non negative residue |p j |, α i ∈ {0, 1} in case of binary number system. For a further parallelization this method uses the associativity of addition. The details of this parallel method is described in <ref type="bibr" target="#b6">[Gen10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Method of conversion from RNS to positional number system</head><p>For an efficient implementation of decryption algorithms we use the approximate method from [CBD + 16]. The idea of the approximate method of comparison of modular numbers is based on a quotient from division of the value of a number by the dynamic range of RNS, Chinese reminder theorem (CRT), which relates the positional number X with its representation with residues (x 1 , x 2 , . . . , x n ), where x i -is the least non negative residue, from division by modules from RNS moduli set (p 1 , p 2 , . . . , p n ), with the following expression</p><formula xml:id="formula_1">X = n i=1 P p i P −1 i x i P<label>(2)</label></formula><p>where P = n i=1 p i , p i -RNS moduli set, P −1 i -multiplicative inversion of P i with respect to p i , and P i = P pi . If we divide (2) by the constant P , then we obtain an approximate value</p><formula xml:id="formula_2">X P = n i=1 P −1 i pi p i x i 1 = n i=1 k i x i 1<label>(3)</label></formula><p>where</p><formula xml:id="formula_3">k i = |P −1 i | p i pi</formula><p>-for all i from 1 to n are the constants of the system, x i -digits in the RNS representation. The value of each sum is in the interval [0, 1). The final result of the sum is defined after the summation and is the fractional part of the sum. The fractional part also can be represented as X mod 1, because X = X +X mod 1. The number of digits in the fractional part is defined by the maximum possible difference between adjacent numbers [CBD + 16].</p><p>Here, we briefly review the concept of diagonal function <ref type="bibr" target="#b5">[DIP93]</ref>. First, for a given moduli set {p 1 , p 2 , . . . , p n },</p><p>where the moduli m i are mutually prime, we define a parameter "Sum of Quotients (SQ)", where SQ = n i=1 P i , for all P i = P/p i . Then, we also define constants ki = − 1 pi SQ for i = 1, 2, . . . , n. The diagonal function corresponding to a given number X with residues (x 1 , x 2 , . . . , x n ) is defined as:</p><formula xml:id="formula_4">D (X) = n i=1 ki x i SQ .</formula><p>Note that D (X) is a monotonic function. Two numbers X and Y can be compared based on the D (X) and D (Y ) values. However, if they are equal, we need to compare the coordinates (residues corresponding to modulus) of X with respect to Y in order to determine whether X &gt; Y or X = Y or X &lt; Y . Pirlo and Impedovo <ref type="bibr" target="#b12">[PI13]</ref> have observed that diagonal function does not support RNS to binary conversion. Mohan <ref type="bibr" target="#b11">[Moh16]</ref> shows that it is possible to perform RNS to binary conversion using diagonal function by equations:</p><formula xml:id="formula_5">X = P • D (X) + n i=1 x i P i SQ .<label>(4)</label></formula><p>It is worth to note that RNS moduli set has the form p 1 = 2 a − c and p 2 = 2 a + c, where c is impair, and SQ = 2 a+1 . Considering that SQ is a power of 2, to convert a number from RNS to binary number system it is not necessary to compute residues from division by large numbers used in methods such as CRT and nCRT.</p><p>Since lim a→∞ 2a+1 a+1 = 2 , the size of coefficients is asymptotically twice smaller than in methods that allow to compute X with lower complexity than CRT, nCRT and aCRT.</p><p>3 Algorithm for error detection, localization and correction for moduli set of the form</p><formula xml:id="formula_6">2 l − 3, 2 l − 1, 2 l + 1, 2 l + 3</formula><p>Taking into account the works on constructing a reliable, secure and distributed storage system in the clouds with erasure codes, Byzantine protocol etc. with parameters (2, 4), we develop the error correction code with a moduli set of a special form that allows to detect and correct errors using error syndrome. We can extend the applicability of the error detection, localization and correction with error syndrome using moduli set of the form 2 l − 3, 2 l − 1, 2 l + 1, 2 l + 3 for cloud computing.</p><p>1. Calculate the value of X, using moduli set 2 l − 1, 2 l + 1 : SQ 23 = 2 l − 1 + 2 l + 1 = 2 l+1 . Constants of Diagonal function:</p><formula xml:id="formula_7">k 2 = − 1 2 l −1 2 l + 1 = 2 l + 1, k 3 = − 1 2 l +1 2 l + 1 = 2 l − 1. D 23 (X) = |k 2 x 2 + k 3 x 3 | 2 l + 1 = 2 l (x 2 + x 3 ) + x 2 − x 3 l+1 2 .</formula><p>Using the equation from the paper <ref type="bibr" target="#b11">[Moh16]</ref>, we find the value X.</p><formula xml:id="formula_8">X = 2 2l − 1 D 23 (X) + 2 l + 1 x 2 2 l − 1 x 3 2 l+1 .<label>(5)</label></formula><p>2. Calculate the value of X, using moduli set {2 l − 3, 2 l + 3}: SQ 14 = 2 l − 3 + 2 l + 3 = 2 L+1 . Constants of Diagonal function:</p><formula xml:id="formula_9">k 1 = − 1 2 l −3 2 l + 1 = − 2 l +1 3 2 l + 1, k 4 = − 1 2 l +1 2 l + 1 = − 2 l −1 3 2</formula><p>l + 1. Then, the diagonal function value is:</p><formula xml:id="formula_10">D 14 (X) = |k 1 x 1 + k 4 x 4 | 2 l + 1 = r 3 (2 l (x 1 + x 4 ) + x 1 − x 4 l+1 2 where r 3 = 1 3 2 l+1 = 2 l+2 +1 3 , if n -odd 2 l+1 +1 3</formula><p>, if n -even. Using the equation from the work [8], we find the value of X.</p><formula xml:id="formula_11">X = 2 2l − 9 D 14 (X) + 2 l + 3 x 1 2 l − 3 x 4 2 l+1 . (<label>6</label></formula><formula xml:id="formula_12">)</formula><p>The use of error correction codes in the RNS with the given parameters can detect two or correct one error. We study the data obtained from the cloud using the Eqn. ( <ref type="formula" target="#formula_8">5</ref>) and (6) we find the error syndrome.</p><p>1. If an error occurs in x 1 , then</p><formula xml:id="formula_13">|X − x 1 | 2 l −3 = 0. (7)</formula><p>As the gcd 2 l − 3, 2 l+1 = 1, then the condition Eqn. ( <ref type="formula">7</ref>) is equivalent to:</p><formula xml:id="formula_14">2 l+1 X − 2 l+1 x 1 2 l −3 = 0. (<label>8</label></formula><formula xml:id="formula_15">)</formula><p>Substitute Eqn. (5) in Eqn. (8), then</p><formula xml:id="formula_16">2 2l − 1 D 23 (X) + 2 l + 1 x 2 + 2 l − 1 x 3 − 2 l+1 x 1 2 l −3 = 0.</formula><p>As the 2 l 2 l −3 = 3 Eqn. (8) can be written as</p><formula xml:id="formula_17">s 1 = |8D 23 (X) + 4x 2 + 2x 3 − 6x 1 | 2 l −3 = 0. (9) 2. If an error occurs in x 2 , then |X − x 2 | 2 l −1 = 0. (<label>10</label></formula><formula xml:id="formula_18">)</formula><p>As the gcd 2 l − 1, 2 l+1 = 1, Eqn. (10) can be written as</p><formula xml:id="formula_19">2 l+1 X − 2 l+1 x 2 2 l −1 = 0.</formula><p>Substitute Eqn. (6) in Eqn. (8), then</p><formula xml:id="formula_20">2 2l − 9 D 14 (X) + 2 l + 3 x 1 + 2 l − 3 x 4 − 2 l+1 x 2 2 l −1 = 0. (<label>11</label></formula><formula xml:id="formula_21">)</formula><p>As the 2 l 2 l −1 = 1 Eqn. ( <ref type="formula" target="#formula_20">11</ref>) can be written as</p><formula xml:id="formula_22">s 2 = |8D 14 (X) − 4x 1 + 2x 4 + 2x 2 | 2 l −1 = 0. (<label>12</label></formula><formula xml:id="formula_23">)</formula><p>3. If an error occurs in x 3 , then</p><formula xml:id="formula_24">|X − x 3 | 2 l +1 = 0. (<label>13</label></formula><formula xml:id="formula_25">)</formula><p>As the gcd 2 l + 1, 2 l+1 = 1, Eqn. (13) can be written as</p><formula xml:id="formula_26">2 l+1 X − 2 l+1 x 3 2 l +1 = 0. (<label>14</label></formula><formula xml:id="formula_27">)</formula><p>Substitute Eqn. (6) in Eqn. ( <ref type="formula" target="#formula_26">14</ref>), then</p><formula xml:id="formula_28">2 2l − 9 D 14 (X) + 2 l + 3 x 1 + 2 l − 3 x 4 − 2 l+1 x 3 2 l +1 = 0. (<label>15</label></formula><formula xml:id="formula_29">)</formula><p>As the 2 l 2 l +1 = −1 Eqn. ( <ref type="formula" target="#formula_28">15</ref>) can be written as</p><formula xml:id="formula_30">s 3 = |8D 14 (X) − 2x 1 + 4x 4 − 2x 3 | 2 l +1 = 0. (<label>16</label></formula><formula xml:id="formula_31">)</formula><p>4. If an error occurs in x 4 , then</p><formula xml:id="formula_32">|X − x 4 | 2 l +3 = 0. (<label>17</label></formula><formula xml:id="formula_33">)</formula><p>As the gcd 2 l + 3, 2 l+1 = 1, Eqn. (17) can be written as</p><formula xml:id="formula_34">2 l+1 X − 2 l+1 x 4 2 l +3 = 0. (<label>18</label></formula><formula xml:id="formula_35">)</formula><p>Substitute Eqn. (5) in Eqn. (18), then </p><formula xml:id="formula_36">2 2l − 1 D 23 (X) + 2 l + 1 x 2 + 2 l − 1 x 3 − 2 l+1 x 4 2 l +3 = 0. (<label>19</label></formula><formula xml:id="formula_37">)</formula><formula xml:id="formula_38">s 4 = |8D 23 (X) − 2x 2 + 4x 3 − 6x 4 | 2 l +3 = 0.<label>(20)</label></formula><p>Using the Eqn. ( <ref type="formula">9</ref>), ( <ref type="formula" target="#formula_22">12</ref>), ( <ref type="formula" target="#formula_30">16</ref>) and (20) calculate the value of the error syndromes s 1 , s 2 , s 3 , s 4 . If s i = 0, we assume that s i = 1, for all i = (1, 4) . Using Table <ref type="table" target="#tab_0">1</ref>, you can calculate the position of error. After excluding error true value can be restored Example 1. Let X = 92 → (1, 2, 7, 16), RNS is defined by moduli set 2 4 − 3, 2 4 − 1, 2 4 + 1, 2 4 + 3 .</p><p>1. If error vector is E → (1, 0, 0, 0), then X → (2, 2, 7, 16). If the error vector is given by: E → (1, 0, 0, 0), then X = X + E → (2, 2, 7, 16).</p><p>Compute diagonal function values:</p><formula xml:id="formula_39">D 23 (X ) = |16(2 + 7) + 2 − 7| 32 = |16 − 5| 32 = 11.</formula><p>Because n = 4, then r 3 = 2 4+1 +1 3 = 3, consequently:</p><formula xml:id="formula_40">D 14 (X ) = |11(16(2 + 16) + 2 − 16)| 32 = |11 • 18| 32 = 6.</formula><p>Compute error syndrome value:</p><formula xml:id="formula_41">s 1 = |8 • 11 + 4 • 2 + 2 • 7 − 6 • 2| 13 = 7, since 7 = 0, it follows that s 1 = 1. s 2 = |8 • 6 − 4 • 2 + 2 • 16 + 2 • 2| 15 = 1. s 3 = |8 • 6 − 2 • 2 + 4 • 16 − 2 • 7| 17 = 9, since 9 = 0, it follows that s 3 = 1. s 4 = |8 • 11 − 2 • 2 − 4 • 7 + 6 • 16| 19 = 0.</formula><p>Since s 1 = s 2 = s 3 = 1 and s 4 = 0, then the case 3 of Table <ref type="table" target="#tab_0">1</ref>, and therefore an error occurred in the x 1 , therefore, the true value of X is reduced using the Eqn. (5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>X =</head><p>(2 8 − 1)</p><formula xml:id="formula_42">• 11 + (2 4 + 1) • 2 + (2 4 − 1) • 7 2 5 = 92.</formula><p>True value: X = 92. 2. If error vector is E → (0, 1, 0, 0), then we obtain X = X + E → (1, 3, 7, 16).</p><p>Compute diagonal function values:</p><formula xml:id="formula_43">D 23 (X ) = |16(3 + 7) + 3 − 7| 32 = |32 − 4| 32 = 28.</formula><p>Because n = 4, then r 3 = 2 4+1 +1 3 = 11, consequently:</p><formula xml:id="formula_44">D 14 (X ) = |11(16(1 + 16) + 1 − 16)| 32 = 11.</formula><p>Compute error syndrome value:</p><formula xml:id="formula_45">s 1 = |8 • 28 + 4 • 3 + 2 • 7 − 6 • 1| 13 = 10, since 10 = 0, it follows that s 1 = 1. s 2 = |8 • 11 − 4 • 1 + 2 • 16 + 2 • 3| 15 = 1 since 2 = 0, it follows that s 2 = 1. s 3 = |8 • 11 − 2 • 1 + 4 • 16 − 2 • 7| 17 = 0. s 4 = |8 • 28 − 2 • 3 − 4 • 7 + 6 • 16| 19 = 1.</formula><p>Since s 1 = s 2 = s 4 = 1 and s 3 = 0, then the case 4 of Table <ref type="table" target="#tab_0">1</ref>, and therefore an error occurred in the x 2 , therefore, the true value of X is reduced using the Eqn. (6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>X =</head><p>(2 8 − 9)</p><formula xml:id="formula_46">• 11 + (2 4 + 3) • 1 + (2 4 − 3) • 16 2 5 = 92.</formula><p>True value: X = 92. 3. If error vector is E → (0, 0, 1, 0), then we obtain X = X + E → (1, 2, 8, 16).</p><p>Compute diagonal function values:</p><formula xml:id="formula_47">D 23 (X ) = |16(2 + 8) + 2 − 8| 32 = |32 − 6| 32 = 26.</formula><p>Because n = 4, then r 3 = 2 4+1 +1 3 = 11, consequently:</p><formula xml:id="formula_48">D 14 (X ) = |11(16(1 + 16) + 1 − 16)| 32 = 11.</formula><p>Compute error syndrome value:</p><formula xml:id="formula_49">s 1 = |8 • 26 + 4 • 2 + 2 • 8 − 6 • 1| 13 = 5, since 5 = 0, it follows that s 1 = 1. s 2 = |8 • 11 − 4 • 1 + 2 • 16 + 2 • 2| 15 = 0. s 3 = |8 • 11 − 2 • 1 + 4 • 16 − 2 • 8| 17 = 15 since 15 = 0, it follows that s 3 = 1. s 4 = |8 • 26 − 2 • 2 − 4 • 8 + 6 • 16| 19 = 8 since 8 = 0, it follows that s 4 = 1.</formula><p>Since s 1 = s 3 = s 4 = 1 and s 2 = 0, then the case 5 of Table <ref type="table" target="#tab_0">1</ref>, and therefore an error occurred in the x 3 , therefore, the true value of X is reduced using the Eqn. (6).</p><formula xml:id="formula_50">X = (2 8 − 9) • 11 + (2 4 + 3) • 1 + (2 4 − 3) • 16 2 5 = 92.</formula><p>True value: X = 92. 4. If error vector is E → (0, 0, 0, 1), then we obtain X = X + E → (1, 2, 7, 17).</p><p>Compute diagonal function values:</p><formula xml:id="formula_51">D 23 (X ) = |16(2 + 7) + 2 − 7| 32 = |16 − 5| 32 = 11.</formula><p>Because n = 4, then r 3 = 2 4+1 +1 3 = 11, consequently:</p><formula xml:id="formula_52">D 14 (X ) = |11(16(1 + 17) + 1 − 17)| 32 = 16.</formula><p>Compute error syndrome value:</p><formula xml:id="formula_53">s 1 = |8 • 11 + 4 • 2 + 2 • 7 − 6 • 1| 13 = 0. s 2 = |8 • 16 − 4 • 1 + 2 • 17 + 2 • 2| 15 = 12 since 12 = 0, it follows that s 2 = 1. s 3 = |8 • 16 − 2 • 1 + 4 • 17 − 2 • 7| 17 = 10 since 10 = 0, it follows that s 3 = 1. s 4 = |8 • 11 − 2 • 2 − 4 • 7 + 6 • 17| 19 = 6 since 6 = 0, it follows that s 4 = 1.</formula><p>Since s 2 = s 3 = s 4 = 1 and s 1 = 0, then the case 2 of Table <ref type="table" target="#tab_0">1</ref>, and therefore an error occurred in the x 4 , therefore, the true value of X is reduced using the Eqn. (5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>X =</head><p>(2 8 − 1) • 11 + (2 4 + 1) • 2 + (2 4 − 1) • 7 2 5 = 92.</p><p>True value: X = 92. Analyzing the values of error syndromes from the Table <ref type="table" target="#tab_0">1</ref> we can note that in order to determine which parts should be used to obtain a true value it is sufficient to know either the syndromes {s 1 , s 4 } or {s 2 , s 3 } . In terms of computational complexity of computing {s 1 , s 4 } are better. Thus using {s 1 , s 4 }, we determine which parts should be taken to obtain the true value. The results are shown in the Table <ref type="table" target="#tab_1">2</ref>. Its worth noting that in Table <ref type="table" target="#tab_1">2</ref> in case 4 to control the result of computations it is required to use the value of hash function MD5, which ensure the correctness of the data with probability 2 −32 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>In this paper, we propose approaches to construct reliable schemes for BOINC type volunteer computing systems using Residue Number System, and a scheme for controlling computations. We show how an application of RNS allows to build completely homomorphic information security systems. We present a new algorithm for localizing and correcting errors for moduli of a special type.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Determination of error from error syndrome value No s 1 s 2 s 3 s 4 Error</figDesc><table><row><cell>Value X</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Determination of error from error syndrome value No s 1 s 4 Correct chuncks Value X</figDesc><table><row><cell>1</cell><cell>0</cell><cell>0</cell><cell>x 2 , x 3</cell><cell>Eqn. (5)</cell></row><row><cell>2</cell><cell>0</cell><cell>1</cell><cell>x 2 , x 3</cell><cell>Eqn. (5)</cell></row><row><cell>3</cell><cell>1</cell><cell>0</cell><cell>x 2 , x 3</cell><cell>Eqn. (5)</cell></row><row><cell>4</cell><cell>1</cell><cell>1</cell><cell>x 1 , x 4</cell><cell>Eqn. (6)</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgment. The work is partially supported by CONACYT (Consejo Nacional de Ciencia y Tecnología, México), grant No. 178415. Part of the work was supported State task No. 2.6035.2017 and Russian Federation President Grant SP-1215.2016.5. We gratefully acknowledge Evgeny Ivashko for valuable discussions and comments.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Security risk assessment framework for cloud computing environments</title>
		<author>
			<persName><forename type="first">Bharanidharan</forename><surname>Ass + ; Sameer Hasan Albakri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ganthan</forename><surname>Shanmugam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Norbik</forename><surname>Narayana Samy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Azuan</forename><surname>Bashah Idris</surname></persName>
		</author>
		<author>
			<persName><surname>Ahmed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="2114" to="2124" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Unfairness correction in P2P grids based on residue number system of a special form</title>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Bct + ; Mikhail Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Chervyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><surname>Kucherov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Irina</forename><surname>Shabalina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gleb</forename><surname>Vashchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniil</forename><surname>Radchenko</surname></persName>
		</author>
		<author>
			<persName><surname>Murga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">conjunction with 28th International Conference on Database and Expert Systems Applications (DEXA17)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="147" to="151" />
		</imprint>
	</monogr>
	<note>1st International Workshop on Uncertainty in Cloud Computing</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Computation of positional characteristics of numbers in RNS based on approximate method</title>
		<author>
			<persName><forename type="first">Ivanovich</forename><surname>Cbd + ; Nikolay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikhail</forename><surname>Chervyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maxim</forename><surname>Grigor'evich Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anton</forename><surname>Anatolievich Deryabin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><forename type="middle">Nikolaevna</forename><surname>Sergeevich Nazarov</surname></persName>
		</author>
		<author>
			<persName><surname>Shabalina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="177" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The effective neural network implementation of the secret sharing scheme with the use of matrix projections on FPGA</title>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Ivanovich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chervyakov</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Mikhail</forename><forename type="middle">Grigorevich</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Nikolaevich Kucherov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anastasiia Igorevna</forename><surname>Garianina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference in Swarm Intelligence</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="3" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">AR-RRNS: Configurable reliable distributed data storage systems for internet of things to ensure security</title>
		<author>
			<persName><surname>Cbt + ; Nikolay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikhail</forename><surname>Chervyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vanessa</forename><surname>Kucherov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jorge</forename><forename type="middle">M</forename><surname>Miranda-López</surname></persName>
		</author>
		<author>
			<persName><surname>Cortés-Mendoza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A new technique for fast number comparison in the residue number system</title>
		<author>
			<persName><forename type="first">Giovanni</forename><surname>Dimauro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sebastiano</forename><surname>Impedovo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giuseppe</forename><surname>Pirlo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on computers</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="608" to="612" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Computing arbitrary functions of encrypted data</title>
		<author>
			<persName><forename type="first">Craig</forename><surname>Gentry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="97" to="105" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">HORNS: A homomorphic encryption scheme for cloud computing using residue number system</title>
		<author>
			<persName><forename type="first">Mahadevan</forename><surname>Gomathisankaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Akhilesh</forename><surname>Tyagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kamesh</forename><surname>Namuduri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Sciences and Systems (CISS), 2011 45th Annual Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Partition algorithm for association rules mining in BOINCbased enterprise desktop grid</title>
		<author>
			<persName><forename type="first">Evgeny</forename><surname>Ivashko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Golovin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Parallel Computing Technologies</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="268" to="272" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">CA-DAG: communication-aware directed acyclic graphs for modeling cloud computing applications</title>
		<author>
			<persName><surname>Kpt + ; Dzmitry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Johnatan</forename><forename type="middle">E</forename><surname>Kliazovich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Pecero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pascal</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><surname>Bouvry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Albert</forename><forename type="middle">Y</forename><surname>Samee U Khan</surname></persName>
		</author>
		<author>
			<persName><surname>Zomaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="277" to="284" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">CA-DAG: modeling communication-aware applications for scheduling in cloud computing</title>
		<author>
			<persName><surname>Kpt + ; Dzmitry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Johnatan</forename><forename type="middle">E</forename><surname>Kliazovich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Pecero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pascal</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><surname>Bouvry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Albert</forename><forename type="middle">Y</forename><surname>Samee U Khan</surname></persName>
		</author>
		<author>
			<persName><surname>Zomaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Grid Computing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="23" to="39" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">RNS to binary conversion using diagonal function and pirlo and impedovo monotonic function</title>
		<author>
			<persName><forename type="first">Mohan</forename><surname>Pv Ananda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Circuits, Systems, and Signal Processing</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1063" to="1076" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Verification of static signatures by optical flow analysis</title>
		<author>
			<persName><forename type="first">Giuseppe</forename><surname>Pirlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Donato</forename><surname>Impedovo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Human-Machine Systems</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="499" to="505" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On the security of the threshold scheme based on the Chinese remainder theorem</title>
		<author>
			<persName><forename type="first">Michaël</forename><surname>Quisquater</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bart</forename><surname>Preneel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joos</forename><surname>Vandewalle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on Public Key Cryptography</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="199" to="210" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Towards mitigating uncertainty of data security breaches and collusion in cloud computing</title>
		<author>
			<persName><forename type="first">Kenneth</forename><surname>Michael A Soderstrand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Graham</forename><forename type="middle">A</forename><surname>Jenkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fred</forename><forename type="middle">J</forename><surname>Jullien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikhail</forename><surname>Taylor ; Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jorge</forename><forename type="middle">M</forename><surname>Chervyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nikolay</forename><surname>Cortés-Mendoza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vanessa</forename><surname>Kucherov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maxim</forename><surname>Miranda-López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Inna</forename><surname>Deryabin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gleb</forename><surname>Dvoryaninova</surname></persName>
		</author>
		<author>
			<persName><surname>Radchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">conjunction with 28th International Conference on Database and Expert Systems Applications (DEXA17)</title>
				<imprint>
			<date type="published" when="1986">1986. 2017</date>
			<biblScope unit="page" from="137" to="141" />
		</imprint>
	</monogr>
	<note>1st International Workshop on Uncertainty in Cloud Computing</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Adaptive energy efficient scheduling in Peer-to-Peer desktop grids</title>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Johnatan</forename><forename type="middle">E</forename><surname>Pecero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Aritz</forename><surname>Barrondo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Schaeffer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="209" to="220" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Towards understanding uncertainty in cloud computing resource provisioning</title>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Uwe</forename><surname>Schwiegelsohn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexandrov</forename><surname>Vassil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">El-Ghazali</forename><surname>Talbi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="1772" to="1781" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability</title>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Tchernykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Uwe</forename><surname>Schwiegelsohn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikhail</forename><surname>El-Ghazali Talbi</surname></persName>
		</author>
		<author>
			<persName><surname>Babenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational Science</title>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
