Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/32185| Title: | Regeneration of Multidimensional Data Arrays in the Course of Degradation of Their Storage Systems Through the Use of High-Speed Secure Communication Channels with Quantum Key Distribution |
| Authors: | Dichenko, S. Диченко, С. Finko, O. A. Финько, О. А. |
| Keywords: | Critical system degradation;Cryptocode constructs method;Data array fragmentation;Data integrity monitoring;Data storage systems;Industry 4.0;Information security;Multidimensional data arrays |
| Issue Date: | 2026 |
| Publisher: | Springer Science and Business Media Deutschland GmbH |
| Citation: | Kramskoi, N., Kurakin, A., Dichenko, S., Finko, O. Regeneration of Multidimensional Data Arrays in the Course of Degradation of Their Storage Systems Through the Use of High-Speed Secure Communication Channels with Quantum Key Distribution // Lecture Notes in Networks and Systems. - 2026. - 1471 LNNS. - pp. 243 - 250. - DOI: 10.1007/978-3-031-94770-4_20 |
| Series/Report no.: | Lecture Notes in Networks and Systems |
| Abstract: | The issues of multidimensional structure data protection in multidimensional storage systems of data processing centers of a future (Industry 4.0 paradigm) railway transport infrastructure are considered. Several protection subsystems are considered: the quantum key generation channel protection subsystem, which, in turn, is a supporting one for 1) the subsystem of user data transmission, equipped with high-speed encryption hardware, and 2) the subsystem of data integrity monitoring and data regeneration in fail-safe data storage systems. Thus, two hierarchically nested levels of information protection are considered: 1) external level – provision of confidentiality and integrity monitoring of data transferred between data processing centers, and 2) internal level – cryptographic control over data integrity in their storage systems. To ensure normal operation of the second (internal) level, the author’s method of data integrity monitoring based on the synthesis of so-called cryptocode constructs is chosen. These constructs aggregate the properties of cryptographic information protection methods (hash functions) and redundant coding methods. In the operation of such storage systems, the occupied and free spaces are subject to estimation on a regular basis. In addition, data received for storage are classified according to the measure of their value (priority). As data and/or physical/logical structure of the storage system degrades (failures, faults, intentional harmful attacks), two important functions are jointly fulfilled: 1) regeneration (restoration) of data for which the signs of their integrity violation have been ascertained, 2) when the free memory space shrinks below the critical limit, the data with the lowest value (priority) is erased and the vacated space is filled with higher-priority data. In this case, the level of data redundancy is adaptable to the degree of the storage system degradation. |
| URI: | https://dspace.ncfu.ru/handle/123456789/32185 |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3714.pdf Restricted Access | 127.66 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.