Estimation of efficiency of production and infrastructure subsystems
Macrosystem dynamics
MATHEMATICAL MODELING
A.V. Solovyev, A.Yu. Danilenko, G.P. Akimova, D.S. Bogdanov, M.A. Pashkin, E.V. Pashkina, A.A. Podrabinovich, I.V. Tumanova Mathematical models for assessing the integrity of digital data transfer in a digital economy
System analysis in medicine and biology
A.V. Solovyev, A.Yu. Danilenko, G.P. Akimova, D.S. Bogdanov, M.A. Pashkin, E.V. Pashkina, A.A. Podrabinovich, I.V. Tumanova Mathematical models for assessing the integrity of digital data transfer in a digital economy

Abstract.

This article describes mathematical models for assessing the integrity of digital data when they are transmitted between economic entities of the digital economy, including through open telecommunications networks. The paper provides a brief overview of the means and methods of ensuring data protection in telecommunications networks. The classification of the problem of ensuring the preservation of digital data as an optimal control problem under parametric perturbations in an unstable environment has been made. A formal formulation of the task of ensuring the safety of digital data during transmission over telecommunication networks has been completed. It is shown that to ensure the safety of digital data transmission in open telecommunications networks, it is possible to use distributed registry technologies. The possible areas of application of the solution of the problem of preserving digital data during transmission are outlined.

Keywords:

digital economy, safety, big data, distributed registries, personal data, electronic documents, optimal control, parametric perturbations

PP. 65-74.

DOI: 10.14357/20790279190207

References

1. Program “Digital Economy of the Russian Federation”. APPROVED by the order of the Government of the Russian Federation at July 28, 2017. № 1632-r. M.:2017 – 88 p.
2. Melanie Swan. Blockchain: Blueprint for a New Economy. – O’Reilly Media, Inc., 2015. – 152 p.
3. Shan’gin V.F. Zastshita informacii v kompyuternyh systemah I setyah [Information security in computer systems and networks] Moscow: DMK Press, 2012.-592p.
4. IPSec – protocol zastshity setevogo trafika na IPurovne [protocol for network traffic protection at the IP level] [Electronic resource] – iXBT.com – Access mode: http://www.ixbt.com/comm/ipsecure. shtml (03.04.2019).
5. Rescorla Eric. SSL and TLS: Designing and Building Secure Systems. – 1-st. – Addison-Wesley Professional, October 27, 2000. – Т. 1. – 528 p.
6. Dierks T., Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246, August. 2008
7. Freier A., Karlton P., Kocher P. The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101, August 2011.
8. Stephen C. Williams. Analysis of the SSH Key Exchange Protocol, 2017.
9. Solovyev A.V., Bakanova N.B. Problemy dolgovremennoy sohrannosti bolshih dannih [Problems of long-term preservation of big data] // Informacionniye tehnologii I vychislitel’niye systemy [Information technology and computing systems], №2, 2019 (in print).
10. Akimova G.P., Danilenko A.Yu., Pashkina E.V., Pashkin M.A., Solovyev A.V., Tarkhanov I.A. Primeneiye tehnologii blockchain v informacionnih systemah. Chast’ 3. Cifrovaya ekonomika I sohrannost’ elektronnih dokumentov [The use of blockchain technology in information systems. Part 3. The digital economy and the preservation of electronic documents] // Systemy visokoy dostupnosti [High Availability Systems]. 2018. T. 14. № 1. P. 13–19.
11. Danilenko A.Yu., Akimova G.P. Osobennosti primeneniya tehnologii blockchain [Features of blockchain technology] // Materialy 27 nauchno- tehnicheskoy konferencii “Metody i tehnicheskiye sredstva obespecheniya bezopasnosti informacii” [Materials of the 27th Scientific and Technical Conference Methods and Technical Means for Information Security] 24-27 september 2018. S-Pb: Izdatelstvo politehnicheskogo universiteta [Publishing house of the Polytechnic University]. 2018. P. 73–75.
12. Valduries P. Parallel Database Systems: Open Problems and New Issues. Distributed and Parallel Databases, April 1993, 1(2), pp. 137-165.
13. Haber S.; Stornetta W. S. (1991). «How to timestamp a digital document». Journal of Cryptology. 3 (2).
14. Anderson L., Holz R., Ponomarev A., Rimba P., & Weber I. (2016). New kids on the block: an analysis of modern blockchains (2016).
15. OpenPeppol. Transport Infrastructure ICT Services- Components. Trust Network Certificate Policy. [Electronic resource] Version: 2.00. 07.07.2014. Access mode: https://github.com/OpenPEPPOL/ documentation/blob/master/TransportInfrastructure/ ICT-Transport-Trust_Network_Certificate_ Policy-2.00.pdf
16. Solovyev A.V., Tarkhanov I.A. Elektronniye dokumenty i zadacha obespecheniya sohrannosti pri obmene dannymi v cifrovoy ekonomike [Electronic Documents and the Security Challenge of Data Interchange in the Digital Economy] // Trudy Instituta systemnogo analiza RAN [Proceedings of the Institute for System Analysis of the Russian Academy of Sciences (ISA RAS)], Tom 68, issue 1, M.: 2018. P.42-53.
17. Akimova G.P., Solovyev A.V., Tarkhanov I.A. Reliability Assessment Method for Geographically Distributed Information Systems // The IEEE 12th International Conference on Application of Information and Communication Technologies / AICT 2018 (17-19 Oct. 2018, Almaty, Kazakhstan), IEEE, 2018, P.188-191.

2024-74-1
2023-73-4
2023-73-3
2023-73-2

© ФИЦ ИУ РАН 2008-2018. Создание сайта "РосИнтернет технологии".