ARTÍCULO
TITULO

Using blockchain technology for data protection

D.V. Baldov    
S.Yu. Petrova    
A.A. Lebedev    

Resumen

At present, the value of information is practically equal to the value of material objects. Modern industries operate with huge data streams, which are subject to increased security and reliability requirements. Likewise, the Nizhny Novgorod State Engineering and Economic University (NGIEU) stores data on diplomas issued to its graduates. Information about each issued diploma is not subject to change or correction.At the university, more than 5,800 people study in the basic professional educational programs of higher education - postgraduate programs, master's programs, bachelor's programs, as well as training programs for mid-level specialists, vocational training programs, additional professional educational programs.The addition of new data on issued diplomas and their reliable storage is required annually. Protection against unauthorized access comes to the fore. It is unacceptable that any information has been changed or deleted. The developed client-server application will allow storing information on the issued diplomas in the university database. And the use of encryption and blockchain technology will adequately protect data from damage or alteration by third parties. Blockchain technology is well suited for solving this problem. This technology, due to its simplicity, will protect the stored data.The article discusses the creation of a client-server application, which certifies each line of the record about the issued diploma with a special record with a hash-sum. Chains are built from rows of data that cannot be corrected or deleted. If there was a substitution of data or their deletion, the system will be able to determine the corrected string and automatically request the corrupted data from other servers. As a result, data loss or damage is completely excluded.The developed application and database made it possible to demonstrate the capabilities of blockchain technology. The technology has a sufficiently large potential for its application in any areas of activity where information protection is required from its modification or deletion. The developed software has shown its effectiveness and will be introduced into the educational process. That can greatly increase the security of information to its change or deletion.

 Artículos similares

       
 
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers

 
Urvashi Sugandh, Swati Nigam, Manju Khari and Sanjay Misra    
Regulatory authorities, consumers, and producers alike are alarmed by the issue of food safety, which is a matter of international concern. The conventional approaches utilized in food quality management demonstrate deficiencies in their capacity to suff... ver más
Revista: Information

 
Seyed Mohammad Hashemi, Seyed Ali Hashemi, Ruxandra Mihaela Botez and Georges Ghazi    
This paper presents a methodology for designing a highly reliable Air Traffic Management and Control (ATMC) methodology using Neural Networks and Peer-to-Peer (P2P) blockchain. A novel data-driven algorithm was designed for Aircraft Trajectory Prediction... ver más
Revista: Aerospace

 
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences

 
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb    
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin... ver más
Revista: Algorithms