EFFICIENCY OF THE IMPLEMENTATION OF THE PEER-TO-PEER DISTRIBUTED SYSTEM FOR SECURABLE INFORMATION STORAGE AND PROCESSING (THEOOL PROJECT)
Abstract and keywords
Abstract (English):
methodology of evaluation of efficiency of the implementation at industrial enterprises of “peer-to-peer distributed systems of storage and processing of protected information in enterprise networks” has been proposed. The efficiency evaluation is based on the comparison of the indicators of reliability, fault tolerance, and total cost of ownership of the implementation of corporate information systems within the proposed system and its possible alternatives. The “peer-to-peer distributed system of storage and processing of protected information” is designed for the protection of distributed computing and incapsulation of private networks without restricting possibilities for usable interactions in the process of implementation of Industry 5.0 and Super Smart Society technologies. When these concepts get implemented in an enterprise, manufacture, logistics, and sales are merged into a global geographically and organizationally distributed information system for data exchange, which functions on top of the Internet. The proposed system offers tools for setting up distributed computing, and it ensures an effective response to threats by applying cryptography, unauthorized access protection with the use of biometry and an innovative protocol for information exchange and control of topology powered by distributed ledger technology, while also optimizing the utilization of computing capacity.

Keywords:
Industry 5.0, Super Smart Society, distributed ledger, cybersecurity, performance evaluation, computer simulation, peer-to-peer networks, information security, distributed computing systems.
References

1. Informacionnye tehnologii i upravlenie predpriyatiem / V.V. Baronov, G.N. Kalyanov, Yu.N. Popov, I.N. Titovskiy. - M.: AyTi, 2009. - 328 s.

2. Romanec, Yu.V. Zaschita informacii v komp'yuternyh sistemah i setyah / Yu.V. Romanec, P.A. Timofeev, V.F. Shan'gin. - M: Radio i svyaz', 2001. - 376s.

3. Stel'mashonok, E.V. Zaschita informacii v komp'yuternyh sistemah / E.V. Stel'mashonok, I.N. Vasil'eva. - SPb. : Izd-vo SPbGEU, 2017. - 163 s.

4. Nenashev, A. The economics of introducing the peer-to-peer system of storage and processing of protected information at an enterprise / A. Nenashev, Khryashchev V., // XXI International Conference Complex Systems : Control and Modeling Problems (CSCMP), Samara, 2019. - Pp. 769-772. - DOI:https://doi.org/10.1109/CSCMP45713.2019.8976720.

5. Fedotov, A.M. Informacionnaya bezopasnost' v korporativnoy seti / A.M. Fedotov // Problemy bezopasnosti i chrezvychaynyh situaciy. - 2008. - № 2. - S.88-101

6. The Official Introduction to the ITIL Service Lifecycle. - London: TCO, 2007. - 238s

7. COBIT 5: Biznes-model' po rukovodstvu i upravleniyu IT na predpriyatii. - USA: ISACA, 2012.- 94s.

8. Sokolov, M.N. Problemy bezopasnosti Internet veschey: obzor / M.N. Sokolov, K.A. Smolyaninova, N.A. Yakusheva // Voprosy kiberbezopasnosti. - 2015. - №5 (13). - S. 32-35.

9. Construction and strategies in IoT security system / G. Quandeng, L. Yan, Y. Liu, Y. Li // IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013. - Pp. 1129-1132. - DOI:https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.195.

10. Foster, R.N. Innovation: the attacker's advantage / R.N. Foster. - New York : Summit Books, 1986. - 316p.

11. Future Internet: The Internet of things architecture, possible applications and key challenges / R. Khan, S. Khan, R. Zaheer, & S. Khan // Frontiers of Information Technology (FIT), 2012 10th International Conference on, 2012. - Pp. 257-260. - DOI:https://doi.org/10.1109/FIT.2012.53.

12. Sherer, S. Information systems risks and risk factors: are they mostly about information systems? / S. Sherer, S. Alter // Communications of the AIS. - 2004. - № 14. - Pp. 29-64. - DOI:https://doi.org/10.17705/1CAIS.01402.

13. Classifying information systems risks: what have we learned so far? / M. Wiesche, H. Keskinov, M. Schermann, H. Krcmar // 47th Hawaii International Conference on System Sciences, Wailea, Maui, HI USA, 2013. - Pp. 5013-5022. - DOI:https://doi.org/10.1109/HICSS.2013.130.

14. Isaev, I.V. IT riski i informacionnaya bezopasnost' / I.V. Isaev // Sovremennye naukoemkie tehnologii. - 2014. - № 7-1. - S. 184-184.

15. Ponomarev, A.A. Ocenka i upravlenie riskami informacionnyh sistem / A.A. Ponomarev // Vestnik Udmurtskogo universiteta. Seriya «Ekonomika i pravo». - 2007. - № 6. - S. 155-166.

16. Oficial'nyy sayt TheOoL Project. - URL: https://theool.net/ (data obrascheniya: 12.04.2021).

17. ITIL® Service Operation. - London: TCO, 2011. - 370s.

Login or Create
* Forgot password?