doi: 10.17586/2226-1494-2019-19-5-892-900


BLOCKCHAIN-BASED TECHNOLOGY FOR SECURITY PROCESSING OF PERSONAL DATA

I. S. Kozin


Read the full article  ';
Article in Russian

For citation:

Kozin I.S. Blockchain-based technology for security processing of personal data. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2019, vol. 19, no. 5, pp. 892–900 (in Russian). doi: 10.17586/2226-1494-2019-19-5-892-900



Abstract

The paper presents the developed approach of creating a decentralization personal data information system, based on the blockchain technology. The approach includes proposals for overall system architecture specification, data storage procedure, users’ fee, consensus mechanism, and system implementation and enhancement. Data storage is provided with the use of personal users’ devices and information cryptographic protection facilities. The users’ fee mechanism is based on the social credit system, employed in China, which ensures the selection of the most trustworthy personal data subjects able to play the role of consensus nodes. Consensus procedure includes automated risk analysis of unreliable data processing. A neural network theory and fuzzy set theory are proposed as the mathematical tools of risk analysis. The use of an artificial neural network provides flexibility of the system as a whole in terms of the growing number of users. The proposed approach application for decentralization information system design will provide for improvement of availability, integrity and confidentiality of data through decentralized processing and application of well-studied cryptographic protection methods


Keywords: information security, personal data, blockchain, decentralization, consensus mechanism, social credit

References
1. Gibadullin R., Perukhin М., Zinnatov A., Gainullin R. Implementation of the replication mechanism in Postgre SQL DBMS. Bulletin of the Technological University, 2017, vol. 20, no. 24, pp. 100–101. (in Russian)
2. Lazareva N.B. Analysis of data monitoring replication of MySQL DBMS. Uchenye zametki TOGU, 2017, vol. 8, no. 3, pp. 220–222. (in Russian)
3. Kirnosov V.Yu., Kurzhangulov N.M. Comparative analysis of data replication mechanisms in various DBMS. Funamental’nye i prikladnye issledovaniya v sovremennom mire, 2017, no. 18-1, pp. 84–91. (in Russian)
4. Mylnikov V.A., Yelina T.N. Increase the efficiency and reliability of the cloud infrastructure based on a distributed file system. Actual Problems of Natural Science: Proc. 3rd All-Russian Conf. Ivanovo, Russia, 2018, pp. 266–268.
(in Russian)
5. Kozin I. Method of development of security information and event management computeraided systemof regional information system. Proc. Regional Informatics and Information Security. The Issue No 3, 2017, pp. 284–290.
(in Russian)
6. Kozin I. Method of development of an automated information security control system for distributed applications. Information and Space, 2018, no. 3, pp. 80–88. (in Russian)
7. Bezzateev S.V., Voloshina N.V., Sankin P.S. Safety analysis methodology of complex systems taking into account the threats to information security. Information and Control Systems, 2014, no. 3, pp. 78–83. (in Russian)
8. Bezzateev S.V., Voloshina N.V. Masking compression based on weighted image structure model. Information and Control Systems, 2017, no. 6, pp. 88–95. (in Russian). doi: 10.15217/issn1684-8853.2017.6.88
9. Rinchinov A.B. The prospects of social credit system project in China, Hangzhou experience. Proc. annual scientific сonf.«Socio-Political Situation in China before 19th Congress of the CPC». Moscow, Center on Political Research and Prognoses Institute of the Far Eastern Studies, 2017, pp. 348–357. (in Russian)
10. Ulezlo D.S., Kadan A.M. Machine learning methods in solving information security problems. Proc. 3rd International Conference Intelligent Technologies for Information Processing and Management (ITIPM’2015). Vol. 1. Ufa, USATU, 2015, pp. 41–44. (in Russian)
11. Kozin I.S. Providing personal data protection in an information system based on user behavior analytics. Information and Control Systems, 2018, no. 3, pp. 69–78. (in Russian). doi: 10.15217/issn1684-8853.2018.3.69
12. Kolmogorov A.N. On the representation of continuous functions of many variables by superposition of continuous functions of one variable and addition. Dokl. Akad. Nauk SSSR, 1957, vol. 114, no. 5, pp. 953–956. (in Russian)
13. Rumelhart D.E., Hinton G.E., Williams R.J. Learning representations by back-propagating errors. Nature, 1986, vol. 323, pp. 533–536. doi: 10.1038/323533a0
14. Hertz J., Krogh A., Palmer R. Introduction to the theory of neural computation. Redwood City, Addison Wesley, 1991, 327 p.
 


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика