z-logo
open-access-imgOpen Access
Cryptographic Recursive Control of Integrity of Metadata Electronic Documents. Part 2. Complex of Algorithms
Author(s) -
Dmitry Tali,
Oleg Finko
Publication year - 2020
Publication title -
voprosy kiberbezopasnosti
Language(s) - English
Resource type - Journals
ISSN - 2311-3456
DOI - 10.21681/2311-3456-2020-06-32-47
Subject(s) - metadata , computer science , identification (biology) , cryptography , data integrity , information retrieval , collusion , metadata modeling , algorithm , data element , computer security , database , world wide web , botany , economics , biology , microeconomics
The purpose of the study is to develop a set of algorithms to increase the level of security of metadata of electronic documents in conditions of destructive influences from authorized users (insiders). Research methods: the principle of chain data recording technology, methods of the theory of algorithms, theoretical provisions for the construction of automated information systems of legally significant electronic document management. The result of the research: a complex of algorithms for cryptographic recursive 2-D control of the integrity of metadata of electronic documents has been developed. Its feature is the following features: 1. localization of modified (with signs of integrity violation) metadata records of electronic documents; 2. identification of authorized users (insiders) who have carried out unauthorized modifications to the metadata of electronic documents; 3. identification of the fact of collusion of trusted parties through the introduction of mutual control of the results of their actions. The proposed solution allows to implement the functions of cryptographic recursive two-dimensional control of the integrity of metadata of electronic documents. At the same time, the use of the technology of chain data recording, at the heart of the presented solution, is due to the peculiarities of the functioning of departmental automated information systems of electronic document management.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here