The Technology of Secure Data Processing in Production Systems Based on the Use of Special Microcontrollers

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The technology is proposed to provide secure processing of data in technological systems based on the use of special microprocessors. A variant of the architecture of such a microprocessor is presented, as well as data processing algorithms that allow efficiently solving problems of secure data processing. The basis for the protection of data processing is the use of algorithms based on the sets of residual number systems (RNS). In the operative memory of the microprocessor, not the number, but the sets of its modules, are stored and processed. Therefore, stealing an intruder of a modules set does not allow him to recover the required number. The encryption keys for each microprocessor are formed together with other ones in the framework of a subsystem controlling other microprocessors, as well as the server.

     

     


  • Keywords


    technology, microprocessor, server, algorithm, processed

  • References


      [1] Cherviakov N.I., Babenko M.G., Shabalina M.N. Development of a secure system for distributed data storage and processing in the clouds based on the concept of active security in rns/ PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM) 2017. С. 558-560.

      [2] Liventsov S 2007 Fundamentals of microprocessor technology (Tomsk: Publishing house of Tomsk Polytechnic University) p. 118

      [3] Chervyakov N.I., Lyakhov P.A., Babenko M.G., Lavrinenko A.V., Nazarov A.S., Lavrinenko I.N. The architecture of a fault-tolerant modular neurocomputer based on modular number projections/ Neurocomputing. 2018. Т. 272. С. 96-107.

      [4] Worms N, Ryadnov S, Sahnyuk P, Shaposhnikov A 2003 Modular structure neuroprocessor parallel computing systems (Moscow: FIZMATLIT) p. 288

      [5] Magomedov Sh. Organization of secured data transfer in computers using sign-value notation//ITM Web of Conferences. 2017. Т. 10 DOI: 10.1051/itmconf/20171004004

      [6] Ivanova I A, Nikonov V V, Sumkin K S 2015 Problems of improving security of data transfer in computer systems Russian Journal of Technology 4:92-8

      [7] Aremu I A, Gbolagade K A 2017 Generalized Information Security and Fault Tolerant based on Redundant Residue Number System International Journal of Computer Applications 167/13:43-7

      [8] Mognonov P 2003 Organization of microprocessor systems (ESSTU) p. 174

      [9] Omondi A 2007 Advances in Computer Science and Engineering: Theory and Implementation (London: Imperial College Press) p. 296

      [10] S. G. Magomedov, Popov G.A. Comparative analysis of various methods treatment expert assessments/International Journal of Advanced Computer Science and Applications. 2017. Т. 8. № 5. С. 35-39. DOI: 10.14569/IJACSA.2017.080505


 

View

Download

Article ID: 23319
 
DOI: 10.14419/ijet.v7i4.36.23319




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.