Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
https://dspace.ncfu.ru/handle/123456789/32185| Название: | Regeneration of Multidimensional Data Arrays in the Course of Degradation of Their Storage Systems Through the Use of High-Speed Secure Communication Channels with Quantum Key Distribution |
| Авторы: | Dichenko, S. Диченко, С. Finko, O. A. Финько, О. А. |
| Ключевые слова: | Critical system degradation;Cryptocode constructs method;Data array fragmentation;Data integrity monitoring;Data storage systems;Industry 4.0;Information security;Multidimensional data arrays |
| Дата публикации: | 2026 |
| Издатель: | Springer Science and Business Media Deutschland GmbH |
| Библиографическое описание: | Kramskoi, N., Kurakin, A., Dichenko, S., Finko, O. Regeneration of Multidimensional Data Arrays in the Course of Degradation of Their Storage Systems Through the Use of High-Speed Secure Communication Channels with Quantum Key Distribution // Lecture Notes in Networks and Systems. - 2026. - 1471 LNNS. - pp. 243 - 250. - DOI: 10.1007/978-3-031-94770-4_20 |
| Источник: | Lecture Notes in Networks and Systems |
| Краткий осмотр (реферат): | The issues of multidimensional structure data protection in multidimensional storage systems of data processing centers of a future (Industry 4.0 paradigm) railway transport infrastructure are considered. Several protection subsystems are considered: the quantum key generation channel protection subsystem, which, in turn, is a supporting one for 1) the subsystem of user data transmission, equipped with high-speed encryption hardware, and 2) the subsystem of data integrity monitoring and data regeneration in fail-safe data storage systems. Thus, two hierarchically nested levels of information protection are considered: 1) external level – provision of confidentiality and integrity monitoring of data transferred between data processing centers, and 2) internal level – cryptographic control over data integrity in their storage systems. To ensure normal operation of the second (internal) level, the author’s method of data integrity monitoring based on the synthesis of so-called cryptocode constructs is chosen. These constructs aggregate the properties of cryptographic information protection methods (hash functions) and redundant coding methods. In the operation of such storage systems, the occupied and free spaces are subject to estimation on a regular basis. In addition, data received for storage are classified according to the measure of their value (priority). As data and/or physical/logical structure of the storage system degrades (failures, faults, intentional harmful attacks), two important functions are jointly fulfilled: 1) regeneration (restoration) of data for which the signs of their integrity violation have been ascertained, 2) when the free memory space shrinks below the critical limit, the data with the lowest value (priority) is erased and the vacated space is filled with higher-priority data. In this case, the level of data redundancy is adaptable to the degree of the storage system degradation. |
| URI (Унифицированный идентификатор ресурса): | https://dspace.ncfu.ru/handle/123456789/32185 |
| Располагается в коллекциях: | Статьи, проиндексированные в SCOPUS, WOS |
Файлы этого ресурса:
| Файл | Размер | Формат | |
|---|---|---|---|
| scopusresults 3714.pdf Доступ ограничен | 127.66 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.