×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

Ensuring confidentiality in generative multimodal systems: an overview of modern approaches for practical implementation

Abstract

Ensuring confidentiality in generative multimodal systems: an overview of modern approaches for practical implementation

Ledovskaya Е.V.

Incoming article date: 10.01.2026

The article examines the main aspects of confidentiality in generative multimodal systems, describes the mechanisms and methods of ensuring confidentiality. The analysis of a method for quantifying the level of confidentiality of generative multimodal systems is carried out. STRIDE, TRIKE, OCTAVE, PASTA, and VAST are among the most advanced approaches to building security models. An analysis of all the aforementioned policies, security models, threat models, and security criteria was conducted to develop a model for privacy protection. In the process of threat modeling using the STRIDE methodology for each of the threat categories, it was found out that existing threats arise primarily due to the lack of multifactor authentication, which could protect against attempts by an attacker to obtain information and create bypass accounts in case the main one is blocked. A general approach to assessing the confidentiality of the system is proposed. Each privacy metric meets a set of criteria by which the GMS privacy is assessed.
Introduction
One of the components of the reliability of computer systems is their confidentiality. Confidentiality in generative multimodal systems (GMS) is reduced to ensuring that private or other confidential information is protected, as its unauthorized disclosure can lead to significant material losses.
Aims and objectives
The purpose of the article is to consider the issues of ensuring confidentiality in generative multimodal systems and to review modern approaches for their practical implementation.
The objectives of the article are to explore the theoretical aspects of privacy. Analyze security policies and models, threat models, and security criteria. To investigate each of the component criteria for the security of complex information systems. To carry out the threat modeling process using the STRIDE methodology. To evaluate the specified methodology and perform calculations to assess the confidentiality of the system.
Methods
Mathematical and computer modeling. Statistical analysis. Comparative analysis. Literature analysis. Generalization and systematization of the material.

Keywords: confidentiality, violation of confidentiality, methods of ensuring confidentiality, generative multimodal system, threat model, security model, threat criteria, unauthorized access, STRIDE, security assurance