INFORMATION TECHNOLOGY OF THE IDENTIFICATION SUBSYSTEM BASED ON ELECTRONIC KEYS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS

Authors

DOI:

https://doi.org/10.20998/2079-0023.2020.01.16

Keywords:

identification subsystem, electronic keys, document flow, electronic signature, elliptic curve digital signature algorithm, document identification

Abstract

The paper considers the problem of documents identification in electronic document management systems. The relevance of this topic is justified by the widespread use of electronic document management systems which require reliable identification of transferred documents. The main problems for identifying documents in electronic document management systems are authorship confirmation, confirmation of the document immutability and determining the signing time. A review of the main methods of identification is given, their advantages and disadvantages are identified. After possible identification methods analyzing, it was found that the method based on the electronic keys allows to reliably identify the document, determine the signing time, guaranty the fact of signing and does not require significant amount of resources for sign formation and verification. This distinguishes the method of identification based on electronic keys fundamentally among others. The method is based on the elliptic curve digital signature algorithm. The reliability of the chosen algorithm is based on the problem of the discrete logarithm in the group of points of the elliptic curve. To implement the algorithm public and private keys are used. After generating a key pair, the private key is kept in secret by the user and used to sign documents, the public key is used to identify the user and should be known to all users of the system. The information support of the identification subsystem is provided. A three-level architectural model in which the client level role is performed by the application programming interface is proposed. The technologies for implementing signature algorithms are considered. Identification subsystem software has been developed. This software allows users to create both individual and built-in document signatures, as well as to verify it. The developed identification subsystem was tested using files of different formats and sizes.

Author Biographies

Yehor Leonidovich Baturin, National Technical University “Kharkiv Polytechnic Institute”

bachelor, National Technical University “Kharkiv Polytechnic Institute”, student; Kharkiv, Ukraine

Valeriy Yuriyovich Volovshchykov, National Technical University “Kharkiv Polytechnic Institute”

Candidate of Technical Sciences, Docent, National Technical University “Kharkiv Polytechnic Institute”, Associate Professor of the Department of Software Engineering and Management Information Technologies; Kharkiv, Ukraine

Vladlen Felixovitch Shapo, National University “Odessa Maritime Academy

Candidate of Technical Sciences, Docent, National University “Odessa Maritime Academy”, Associate Professor of the Theory of Automatic Control and Computing Machinery Department; Odessa, Ukraine

References

Shanhyn V. F. Zashchita kompyuternoy informatsii. Effektivnyye metody i sredstva. [Protection of computer information. Effective methods and tools]. Moscow: DMK., 2010. 542 p.

Stelmashonok E. V., Vasilieva I. N. Zashchita informatsii v kompyuternykh sistemakh. [Information security in computer systems]. St. Petersburg: Piter Publ., 2017. 163 p.

Kosheva N. A., Maznіchenko N. І., Іdentifіkatsіia koristuvachіv іnformatsіino-komp’iuternikh sistem: analіz і prognozuvannia pіdkhodіv. [Identification of information systems and computer systems: analysis and forecasting]. Kharkiv: Yaroslav Mudryi National Law University Publ., 2013. № 6. pp. 215–223.

Messaoud Benantar Access Control Systems Security, Identity Management and Trust Models. TX: Sringer Publ., 2003. 261 p.

Markov A. S., Tsirlov V. L. Bezopasnos dostupa: podgotovka k CISSP [Security of access: preparation for CISSP] // Cybersecurity issues. 2015. № 2. pp. 60–68.

Fadiushin A. M., Simonov V. L. Sovremennye sistemy identifikatsii lichnosti. [Modern identity identification systems.] // Modern information technologies in education, science and industry (November 2–03, 2018, Moscow). Moscow: Sputnik Publ., 2018. pp. 176–178.

Maksimenko V. N., Voloshina T. S. Analiz sistemy raspoznavaniia lits po algoritmu neironnoi seti. [Analysis of the face recognition system by the neural network algorithm]. // economics and quality of communication systems. 2015. № 4. pp. 31–37.

Gorlov V. N. Algoritmicheskie sredstva identifikatsii cheloveka po fotoportretu na osnove geometricheskikh preobrazovanii. [Algorithmic means of human identification by photo portrait based on geometric transformations]. Collection of articles of the IV international scientific conference (September 20, 2018, Penza). Penza: «Science and education» Publ., 2018. pp. 23–27.

Briukhomitskii Iu. A., Fedorov V. M. Metod tekstonezavisimoi identifikatsi lichnosti po golosu. [Text independent identification method by voice]. // News SFU, 2015. pp. 173–181.

Kalutskii I.V., Matiushin Iu.S., Spevakova S.V. Analiz sovremennykh staticheskikh metodov biometricheskoi identifikatsii. [Analysis of modern static methods of biometric identification] // News of Southwestern State University. 2019. № 1. pp. 84–94.

Likhachev A. E., Pavlovskii E. N., Khazankin G. R. Razrabotka sistemy identifikatsii polzovatelei kompiuternykh setei na osnove analiza ikh povedeniia. [Development of a system for identifying users of computer networks based on an analysis of their behavior]. // Transport business. 2017. 171 p.

Peregudov A. V. Klaviaturnyi pocherk kak dopolnitelnyi sposob identifikatsii polzovatelia. [Keyboard handwriting as an additional way to identify a user]. International scientific-practical conference «Research and modern education» (March 26, 2018 Vladivostok) Vladivostok. 2018. pp. 240–241.

Oleshko I. V., Gorbenko I. D. Sravnitelnyi analiz protokolov strogoi autentifikatsii [Comparative analysis of strong authentication protocols]. // Radio engineering 2018. № 171 pp. 198–209.

Sabanov A. G. Autentifikatsiia pri elektronnom obmene konfidentsialnymi dokumentami. [Authentication in the electronic exchange of confidential documents]. TUSUR reports. 2011. № 2. pp. 267–270.

Makarova I.I. Kompleksnaia informatsionnaia bezopasnost elektronnogo dokumentooborota. [Comprehensive information security of electronic document management]. // Project management and production development: A collection of scientific papers. – Lugansk: Dahl Severodonetsk National Institute Publ., 2004. № 3. pp.100-105.

L. Bass, P. Klements, R. Katsman Arkhitektura programmnogo obespecheniia na praktike [Software architecture in practice] // St. Pitersburg: Addison-Wesley Publ. –2006. 306 p.

Apache Tomcat official site / online documentation / URL: http://tomcat.apache.org (date of application: 12.04.2020).

MySql official site / online documentation / URL: http://mysql.com (date of application: 12.04.2020).

Java official site / online documentation / URL: http://java.com (date of application: 12.04.2020).

Bouncycastle official site / online documentation / URL: http://bouncycastle.org (date of application: 12.04.2020).

How to Cite

Baturin, Y. L., Volovshchykov, V. Y., & Shapo, V. F. (2020). INFORMATION TECHNOLOGY OF THE IDENTIFICATION SUBSYSTEM BASED ON ELECTRONIC KEYS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS. Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, (1 (3), 89–96. https://doi.org/10.20998/2079-0023.2020.01.16

Issue

Section

INFORMATION TECHNOLOGY