Redirigiendo al acceso original de articulo en 24 segundos...
ARTÍCULO
TITULO

Security Architectures in Digital Economy Systems

V. O. Piskovski    
A. A. Grusho    
M. I. Zabezhailo    
A. V. Nikolaev    
V. V. Senchilo    
E. E. Timonina    

Resumen

The article considers the task to protect information when an adversary uses methods of collecting valuable information on indirect signs in the information environment available to attackers. It is assumed that all personal data in the considered information space are anonymized. However, these measures are usually not enough. Using information links, it is possible to overcome the depersonalization of data, as well as to recover other valuable information about the activities of participants in the digital economy. To solve the problem of identifying intruders who are extracting information by indirect signs, it is necessary to have a means of registering subjects, organizations and individuals who have accessed certain data, possibly containing indirect signs of valuable information. Registering the facts of an access must be available on a public resource. If necessary, the registration tool should allow authorized users or a commission consisting of such users to obtain organization and person ids that have accessed the data. The purpose of such a log is to provide services for obtaining comprehensive and reliable information about whom, when and to what extent accessed personal or corporate data processed within the digital economy. It is proposed to use the distributed ledger architecture to solve the problem. This architecture allows you to store data on all calls to databases containing indirect information about valuable data. Protected analysis of the distributed ledger allows you to identify users who are trying to recover this information by indirect signs. At present, the technical and theoretical base is ready for the implementation of such solutions. The article lists the main components for such solutions.

 Artículos similares

       
 
Omar Azib Alkhudaydi, Moez Krichen and Ans D. Alghamdi    
With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between Internet of Things (IoT) devices presents a considerable challenge in defendin... ver más
Revista: Information

 
Arash Khajooei, Mohammad (Behdad) Jamshidi and Shahriar B. Shokouhi    
Although the Metaverse is becoming a popular technology in many aspects of our lives, there are some drawbacks to its implementation on clouds, including long latency, security concerns, and centralized infrastructures. Therefore, designing scalable Meta... ver más
Revista: Information

 
Ayesha Hameed, Andrzej Ordys, Jakub Mozaryn and Anna Sibilska-Mroziewicz    
Collaborative robots cooperate with humans to assist them in undertaking simple-to-complex tasks in several fields, including industry, education, agriculture, healthcare services, security, and space exploration. These robots play a vital role in the re... ver más
Revista: Applied Sciences

 
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation

 
Nadera Sultana Tany, Sunish Suresh, Durgesh Nandan Sinha, Chinmay Shinde, Cristina Stolojescu-Crisan and Rahamatullah Khondoker    
Modern autonomous vehicles with an electric/electronic (E/E) architecture represent the next big step in the automation and evolution of smart and self-driving vehicles. This technology is of significant interest nowadays and humans are currently witness... ver más
Revista: Information