ARTÍCULO
TITULO

Using blockchain technology for data protection

D.V. Baldov    
S.Yu. Petrova    
A.A. Lebedev    

Resumen

At present, the value of information is practically equal to the value of material objects. Modern industries operate with huge data streams, which are subject to increased security and reliability requirements. Likewise, the Nizhny Novgorod State Engineering and Economic University (NGIEU) stores data on diplomas issued to its graduates. Information about each issued diploma is not subject to change or correction.At the university, more than 5,800 people study in the basic professional educational programs of higher education - postgraduate programs, master's programs, bachelor's programs, as well as training programs for mid-level specialists, vocational training programs, additional professional educational programs.The addition of new data on issued diplomas and their reliable storage is required annually. Protection against unauthorized access comes to the fore. It is unacceptable that any information has been changed or deleted. The developed client-server application will allow storing information on the issued diplomas in the university database. And the use of encryption and blockchain technology will adequately protect data from damage or alteration by third parties. Blockchain technology is well suited for solving this problem. This technology, due to its simplicity, will protect the stored data.The article discusses the creation of a client-server application, which certifies each line of the record about the issued diploma with a special record with a hash-sum. Chains are built from rows of data that cannot be corrected or deleted. If there was a substitution of data or their deletion, the system will be able to determine the corrected string and automatically request the corrupted data from other servers. As a result, data loss or damage is completely excluded.The developed application and database made it possible to demonstrate the capabilities of blockchain technology. The technology has a sufficiently large potential for its application in any areas of activity where information protection is required from its modification or deletion. The developed software has shown its effectiveness and will be introduced into the educational process. That can greatly increase the security of information to its change or deletion.

 Artículos similares

       
 
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb    
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin... ver más
Revista: Algorithms

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Tri Kushartadi, Aditya Eka Mulyono, Azhari Haris Al Hamdi, Muhammad Afif Rizki, Muhammad Anwar Sadat Faidar, Wirawan Dwi Harsanto, Muhammad Suryanegara and Muhamad Asvial    
The estimated global population for 2050 is 9 billion, which implies an increase in food demand. Agriculture is the primary source of food production worldwide, and improving its efficiency and productivity through an integration with information and com... ver más
Revista: Information

 
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li    
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it... ver más
Revista: Algorithms

 
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba    
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa... ver más
Revista: Information