•  
  •  
 

Scientific Journal of Samarkand University

Abstract

The ever-growing information flow in modern society, the diversity of information technologies, the complexity of tasks solved on a computer, have set many tasks for users of these technologies. Currently, due to the numerous data streams, the need to process this data in a short period is also growing. Due to the large number of data streams for their storage and processing in the shortest possible time it is required to create automated systems. This research paper presents algorithms for solving the problem of increasing data flow by forming a distributed database. Based on this, methods for optimizing the storage and processing of data in computer networks are presented. A distributed registry and cryptographically sensitive data processed by blockchain technology are considered. In the general case, blockchain is a multifunctional and multi-level information technology designed to reliably record various procedures and operations carried out on the network, a technology for reliable distributed storage of records of all ever completed transactions. The blockchain is a chain of data blocks, the volume of which is constantly growing as new blocks are added with records of the most recent transactions.

First Page

98

Last Page

103

References

[1] A. Dorri, M. Steger, S. S. Kanhere and R. Jurdak, Blockchain: A distributed solution to automotive security and privacy, IEEE Communications Magazine , 55 (2017), 119–125.

[2] J. A. Garay, A. Kiayias and N. Leonardos, The bitcoin backbone protocol: Analysis and applications, in EUROCRYPT (2), 9057 (2015), 281–310.

[3] Mayank R., Danilo G., Katina K. SoK of Used Cryptography in Blockchain. Department of Information Security and Communication Technologies, Norwegian University of Science and Technology. P 54. 2019.

[4] Wang L., Shen X., Li J., Shao J., Yang Y. Cryptographic primitives in blokcheyns. Journal of Network and Computer Applications, vol. 127, P. 43 – 58, 2019.

[5] A. S. Elmaghraby and M. M. Losavio, Cyber security challenges in smart cities: Safety, security and privacy, Journal of Advanced Research , 5 (2014), 491–497.

[6] Akhatov A.R., Nazarov F. M. Methods of Implementation of Blockchain Technologies on the basis of Cryptographic protection for the Data processing System with Constraint and Lagging into Electronic Document Management. Herald of Computer and Information technologies. vol.10. P. 3–13. Moscow.2019.

[7] Pierre-Yves Piriou., Jean-Francois Dumas. Simulation of stochastic blockchain models. Chatou, France. P.[1-8]. 2018.

[8] Duffield E., Schinzel H., Gutierrez F., Transaction locking and masternode consensus: A mechanism for mitigating double spending attacks. CryptoPapers.info, 2014, [Online; accessed 3-Jun-2019].

[9] Pedro Franco. The Blokcheyn. Understanding Bitinformation: Cryptography, Engineering and Economics. John Wiley & Sons, 2014. 288 p.

[10] Коблиц. Н. Курс теории чисел и криптографии - М., Научное издателство ТВП, 2001 г., 260 cтр.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.