<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Modeling of systems and processes</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Modeling of systems and processes</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Моделирование систем и процессов</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2219-0767</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">45973</article-id>
   <article-id pub-id-type="doi">10.12737/2219-0767-2021-14-3-82-89</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Технические науки</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject></subject>
    </subj-group>
    <subj-group>
     <subject>Технические науки</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Efficiency of the implementation of the peer-to-peer distributed system for securable information storage and processing (TheOOL Project)</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Эффективность внедрения одноранговой распределенной системы хранения и обработки защищаемой информации (TheOoL Project)</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Хрящев</surname>
       <given-names>Виктор Владимирович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Hryaschev</surname>
       <given-names>V. V.</given-names>
      </name>
     </name-alternatives>
     <email>hryastchev@mail.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Ненашев</surname>
       <given-names>Алексей Владимирович </given-names>
      </name>
      <name xml:lang="en">
       <surname>Nenashev</surname>
       <given-names>Aleksey Vladimirovich </given-names>
      </name>
     </name-alternatives>
     <email>alexvlnenashev@gmail.com</email>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Самарский государственный технический университет</institution>
     <city>Самара</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Samara State Technical University</institution>
     <city>Samara</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Самарский государственный технический университет; ООО «ТХЕООЛ»</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Samara State Technical University;  THEOOL, LLC</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <volume>14</volume>
   <issue>3</issue>
   <fpage>82</fpage>
   <lpage>89</lpage>
   <history>
    <date date-type="received" iso-8601-date="2021-05-17T00:00:00+03:00">
     <day>17</day>
     <month>05</month>
     <year>2021</year>
    </date>
   </history>
   <self-uri xlink:href="https://naukaru.ru/en/nauka/article/45973/view">https://naukaru.ru/en/nauka/article/45973/view</self-uri>
   <abstract xml:lang="ru">
    <p>В процессе внедрения Industry 5.0 и Super Smart Society на предприятии, производство, логистика и продажи объединяются в распределенную информационную систему для обмена данными. В статье предлагается методика оценки эффективности внедрения на промышленных предприятиях &quot;Одноранговой распределенной системы хранения и обработки защищенной информации в корпоративных сетях&quot;. Оценка эффективности осуществляется на основе сравнения показателей надежности, отказоустойчивости и совокупной стоимости владения. Система предлагает инструменты для настройки распределенных вычислений и обеспечивает эффективное реагирование на угрозы путем применения криптография, защита от несанкционированного доступа с использованием биометрии и инновационный протокол обмена информацией и управление топологией на основе технологии распределенного реестра, а также оптимизация использования вычислительных мощностей.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>methodology of evaluation of efficiency of the implementation at industrial enterprises of “peer-to-peer distributed systems of storage and processing of protected information in enterprise networks” has been proposed. The efficiency evaluation is based on the comparison of the indicators of reliability, fault tolerance, and total cost of ownership of the implementation of corporate information systems within the proposed system and its possible alternatives. The “peer-to-peer distributed system of storage and processing of protected information” is designed for the protection of distributed computing and incapsulation of private networks without restricting possibilities for usable interactions in the process of implementation of Industry 5.0 and Super Smart Society technologies. When these concepts get implemented in an enterprise, manufacture, logistics, and sales are merged into a global geographically and organizationally distributed information system for data exchange, which functions on top of the Internet. The proposed system offers tools for setting up distributed computing, and it ensures an effective response to threats by applying cryptography, unauthorized access protection with the use of biometry and an innovative protocol for information exchange and control of topology powered by distributed ledger technology, while also optimizing the utilization of computing capacity.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>Industry 5.0</kwd>
    <kwd>Super Smart Society</kwd>
    <kwd>кибербезопасность</kwd>
    <kwd>распределенные информационные системы</kwd>
    <kwd>оценка эффективности.</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>Industry 5.0</kwd>
    <kwd>Super Smart Society</kwd>
    <kwd>distributed ledger</kwd>
    <kwd>cybersecurity</kwd>
    <kwd>performance evaluation</kwd>
    <kwd>computer simulation</kwd>
    <kwd>peer-to-peer networks</kwd>
    <kwd>information security</kwd>
    <kwd>distributed computing systems.</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Информационные технологии и управление предприятием / В.В. Баронов, Г.Н. Калянов, Ю.Н. Попов, И.Н. Титовский. - М.: АйТи, 2009. - 328 с.</mixed-citation>
     <mixed-citation xml:lang="en">Informacionnye tehnologii i upravlenie predpriyatiem / V.V. Baronov, G.N. Kalyanov, Yu.N. Popov, I.N. Titovskiy. - M.: AyTi, 2009. - 328 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Романец, Ю.В. Защита информации в компьютерных системах и сетях / Ю.В. Романец, П.А. Тимофеев, В.Ф. Шаньгин. - М: Радио и связь, 2001. - 376с.</mixed-citation>
     <mixed-citation xml:lang="en">Romanec, Yu.V. Zaschita informacii v komp'yuternyh sistemah i setyah / Yu.V. Romanec, P.A. Timofeev, V.F. Shan'gin. - M: Radio i svyaz', 2001. - 376s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Стельмашонок, Е.В. Защита информации в компьютерных системах / Е.В. Стельмашонок, И.Н. Васильева. - СПб. : Изд-во СПбГЭУ, 2017. - 163 с.</mixed-citation>
     <mixed-citation xml:lang="en">Stel'mashonok, E.V. Zaschita informacii v komp'yuternyh sistemah / E.V. Stel'mashonok, I.N. Vasil'eva. - SPb. : Izd-vo SPbGEU, 2017. - 163 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Nenashev, A. The economics of introducing the peer-to-peer system of storage and processing of protected information at an enterprise / A. Nenashev, Khryashchev V., // XXI International Conference Complex Systems : Control and Modeling Problems (CSCMP), Samara, 2019. - Pp. 769-772. - DOI: 10.1109/CSCMP45713.2019.8976720.</mixed-citation>
     <mixed-citation xml:lang="en">Nenashev, A. The economics of introducing the peer-to-peer system of storage and processing of protected information at an enterprise / A. Nenashev, Khryashchev V., // XXI International Conference Complex Systems : Control and Modeling Problems (CSCMP), Samara, 2019. - Pp. 769-772. - DOI: 10.1109/CSCMP45713.2019.8976720.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Федотов, А.М. Информационная безопасность в корпоративной сети / А.М. Федотов // Проблемы безопасности и чрезвычайных ситуаций. - 2008. - № 2. - С.88-101</mixed-citation>
     <mixed-citation xml:lang="en">Fedotov, A.M. Informacionnaya bezopasnost' v korporativnoy seti / A.M. Fedotov // Problemy bezopasnosti i chrezvychaynyh situaciy. - 2008. - № 2. - S.88-101</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The Official Introduction to the ITIL Service Lifecycle. - London: TCO, 2007. - 238с</mixed-citation>
     <mixed-citation xml:lang="en">The Official Introduction to the ITIL Service Lifecycle. - London: TCO, 2007. - 238s</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">COBIT 5: Бизнес-модель по руководству и управлению ИТ на предприятии. - USA: ISACA, 2012.- 94с.</mixed-citation>
     <mixed-citation xml:lang="en">COBIT 5: Biznes-model' po rukovodstvu i upravleniyu IT na predpriyatii. - USA: ISACA, 2012.- 94s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Соколов, М.Н. Проблемы безопасности Интернет вещей: обзор / М.Н. Соколов, К.А. Смолянинова, Н.А. Якушева // Вопросы кибербезопасности. - 2015. - №5 (13). - С. 32-35.</mixed-citation>
     <mixed-citation xml:lang="en">Sokolov, M.N. Problemy bezopasnosti Internet veschey: obzor / M.N. Sokolov, K.A. Smolyaninova, N.A. Yakusheva // Voprosy kiberbezopasnosti. - 2015. - №5 (13). - S. 32-35.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Construction and strategies in IoT security system / G. Quandeng, L. Yan, Y. Liu, Y. Li // IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013. - Pp. 1129-1132. - DOI: 10.1109/GreenCom-iThings-CPSCom.2013.195.</mixed-citation>
     <mixed-citation xml:lang="en">Construction and strategies in IoT security system / G. Quandeng, L. Yan, Y. Liu, Y. Li // IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013. - Pp. 1129-1132. - DOI: 10.1109/GreenCom-iThings-CPSCom.2013.195.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Foster, R.N. Innovation: the attacker's advantage / R.N. Foster. -  New York : Summit Books, 1986. - 316p.</mixed-citation>
     <mixed-citation xml:lang="en">Foster, R.N. Innovation: the attacker's advantage / R.N. Foster. -  New York : Summit Books, 1986. - 316p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Future Internet: The Internet of things architecture, possible applications and key challenges / R. Khan, S. Khan, R. Zaheer, &amp; S. Khan // Frontiers of Information Technology (FIT), 2012 10th International Conference on, 2012. - Pp. 257-260. - DOI: 10.1109/FIT.2012.53.</mixed-citation>
     <mixed-citation xml:lang="en">Future Internet: The Internet of things architecture, possible applications and key challenges / R. Khan, S. Khan, R. Zaheer, &amp; S. Khan // Frontiers of Information Technology (FIT), 2012 10th International Conference on, 2012. - Pp. 257-260. - DOI: 10.1109/FIT.2012.53.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sherer, S. Information systems risks and risk factors: are they mostly about information systems? / S. Sherer, S. Alter // Communications of the AIS. - 2004. - № 14. - Pp. 29-64. - DOI: 10.17705/1CAIS.01402.</mixed-citation>
     <mixed-citation xml:lang="en">Sherer, S. Information systems risks and risk factors: are they mostly about information systems? / S. Sherer, S. Alter // Communications of the AIS. - 2004. - № 14. - Pp. 29-64. - DOI: 10.17705/1CAIS.01402.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Classifying information systems risks: what have we learned so far? / M. Wiesche, H. Keskinov, M. Schermann,  H. Krcmar // 47th Hawaii International Conference on System Sciences, Wailea, Maui, HI USA, 2013. - Pp. 5013-5022. - DOI: 10.1109/HICSS.2013.130.</mixed-citation>
     <mixed-citation xml:lang="en">Classifying information systems risks: what have we learned so far? / M. Wiesche, H. Keskinov, M. Schermann,  H. Krcmar // 47th Hawaii International Conference on System Sciences, Wailea, Maui, HI USA, 2013. - Pp. 5013-5022. - DOI: 10.1109/HICSS.2013.130.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Исаев, И.В. ИТ риски и информационная безопасность / И.В. Исаев // Современные наукоемкие технологии. - 2014. - № 7-1. - С. 184-184.</mixed-citation>
     <mixed-citation xml:lang="en">Isaev, I.V. IT riski i informacionnaya bezopasnost' / I.V. Isaev // Sovremennye naukoemkie tehnologii. - 2014. - № 7-1. - S. 184-184.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Пономарев, А.А. Оценка и управление рисками информационных систем / А.А. Пономарев // Вестник Удмуртского университета. Серия «Экономика и право». - 2007. - № 6. - С. 155-166.</mixed-citation>
     <mixed-citation xml:lang="en">Ponomarev, A.A. Ocenka i upravlenie riskami informacionnyh sistem / A.A. Ponomarev // Vestnik Udmurtskogo universiteta. Seriya «Ekonomika i pravo». - 2007. - № 6. - S. 155-166.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Официальный сайт TheOoL Project. - URL: https://theool.net/ (дата обращения: 12.04.2021).</mixed-citation>
     <mixed-citation xml:lang="en">Oficial'nyy sayt TheOoL Project. - URL: https://theool.net/ (data obrascheniya: 12.04.2021).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">ITIL® Service Operation. - London: TCO, 2011. - 370 с.</mixed-citation>
     <mixed-citation xml:lang="en">ITIL® Service Operation. - London: TCO, 2011. - 370s.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
