INFORMATION TECHNOLOGY OF THE IDENTIFICATION SUBSYSTEM BASED ON ELECTRONIC KEYS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS
DOI:
https://doi.org/10.20998/2079-0023.2020.01.16Keywords:
identification subsystem, electronic keys, document flow, electronic signature, elliptic curve digital signature algorithm, document identificationAbstract
The paper considers the problem of documents identification in electronic document management systems. The relevance of this topic is justified by the widespread use of electronic document management systems which require reliable identification of transferred documents. The main problems for identifying documents in electronic document management systems are authorship confirmation, confirmation of the document immutability and determining the signing time. A review of the main methods of identification is given, their advantages and disadvantages are identified. After possible identification methods analyzing, it was found that the method based on the electronic keys allows to reliably identify the document, determine the signing time, guaranty the fact of signing and does not require significant amount of resources for sign formation and verification. This distinguishes the method of identification based on electronic keys fundamentally among others. The method is based on the elliptic curve digital signature algorithm. The reliability of the chosen algorithm is based on the problem of the discrete logarithm in the group of points of the elliptic curve. To implement the algorithm public and private keys are used. After generating a key pair, the private key is kept in secret by the user and used to sign documents, the public key is used to identify the user and should be known to all users of the system. The information support of the identification subsystem is provided. A three-level architectural model in which the client level role is performed by the application programming interface is proposed. The technologies for implementing signature algorithms are considered. Identification subsystem software has been developed. This software allows users to create both individual and built-in document signatures, as well as to verify it. The developed identification subsystem was tested using files of different formats and sizes.References
Shanhyn V. F. Zashchita kompyuternoy informatsii. Effektivnyye metody i sredstva. [Protection of computer information. Effective methods and tools]. Moscow: DMK., 2010. 542 p.
Stelmashonok E. V., Vasilieva I. N. Zashchita informatsii v kompyuternykh sistemakh. [Information security in computer systems]. St. Petersburg: Piter Publ., 2017. 163 p.
Kosheva N. A., Maznіchenko N. І., Іdentifіkatsіia koristuvachіv іnformatsіino-komp’iuternikh sistem: analіz і prognozuvannia pіdkhodіv. [Identification of information systems and computer systems: analysis and forecasting]. Kharkiv: Yaroslav Mudryi National Law University Publ., 2013. № 6. pp. 215–223.
Messaoud Benantar Access Control Systems Security, Identity Management and Trust Models. TX: Sringer Publ., 2003. 261 p.
Markov A. S., Tsirlov V. L. Bezopasnos dostupa: podgotovka k CISSP [Security of access: preparation for CISSP] // Cybersecurity issues. 2015. № 2. pp. 60–68.
Fadiushin A. M., Simonov V. L. Sovremennye sistemy identifikatsii lichnosti. [Modern identity identification systems.] // Modern information technologies in education, science and industry (November 2–03, 2018, Moscow). Moscow: Sputnik Publ., 2018. pp. 176–178.
Maksimenko V. N., Voloshina T. S. Analiz sistemy raspoznavaniia lits po algoritmu neironnoi seti. [Analysis of the face recognition system by the neural network algorithm]. // economics and quality of communication systems. 2015. № 4. pp. 31–37.
Gorlov V. N. Algoritmicheskie sredstva identifikatsii cheloveka po fotoportretu na osnove geometricheskikh preobrazovanii. [Algorithmic means of human identification by photo portrait based on geometric transformations]. Collection of articles of the IV international scientific conference (September 20, 2018, Penza). Penza: «Science and education» Publ., 2018. pp. 23–27.
Briukhomitskii Iu. A., Fedorov V. M. Metod tekstonezavisimoi identifikatsi lichnosti po golosu. [Text independent identification method by voice]. // News SFU, 2015. pp. 173–181.
Kalutskii I.V., Matiushin Iu.S., Spevakova S.V. Analiz sovremennykh staticheskikh metodov biometricheskoi identifikatsii. [Analysis of modern static methods of biometric identification] // News of Southwestern State University. 2019. № 1. pp. 84–94.
Likhachev A. E., Pavlovskii E. N., Khazankin G. R. Razrabotka sistemy identifikatsii polzovatelei kompiuternykh setei na osnove analiza ikh povedeniia. [Development of a system for identifying users of computer networks based on an analysis of their behavior]. // Transport business. 2017. 171 p.
Peregudov A. V. Klaviaturnyi pocherk kak dopolnitelnyi sposob identifikatsii polzovatelia. [Keyboard handwriting as an additional way to identify a user]. International scientific-practical conference «Research and modern education» (March 26, 2018 Vladivostok) Vladivostok. 2018. pp. 240–241.
Oleshko I. V., Gorbenko I. D. Sravnitelnyi analiz protokolov strogoi autentifikatsii [Comparative analysis of strong authentication protocols]. // Radio engineering 2018. № 171 pp. 198–209.
Sabanov A. G. Autentifikatsiia pri elektronnom obmene konfidentsialnymi dokumentami. [Authentication in the electronic exchange of confidential documents]. TUSUR reports. 2011. № 2. pp. 267–270.
Makarova I.I. Kompleksnaia informatsionnaia bezopasnost elektronnogo dokumentooborota. [Comprehensive information security of electronic document management]. // Project management and production development: A collection of scientific papers. – Lugansk: Dahl Severodonetsk National Institute Publ., 2004. № 3. pp.100-105.
L. Bass, P. Klements, R. Katsman Arkhitektura programmnogo obespecheniia na praktike [Software architecture in practice] // St. Pitersburg: Addison-Wesley Publ. –2006. 306 p.
Apache Tomcat official site / online documentation / URL: http://tomcat.apache.org (date of application: 12.04.2020).
MySql official site / online documentation / URL: http://mysql.com (date of application: 12.04.2020).
Java official site / online documentation / URL: http://java.com (date of application: 12.04.2020).
Bouncycastle official site / online documentation / URL: http://bouncycastle.org (date of application: 12.04.2020).
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2020 Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information TechnologiesAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).