Abstract

The purpose of the study is to develop a set of algorithms to increase the level of security of metadata of electronic documents in conditions of destructive influences from authorized users (insiders). Research methods: the principle of chain data recording technology, methods of the theory of algorithms, theoretical provisions for the construction of automated information systems of legally significant electronic document management. The result of the research: a complex of algorithms for cryptographic recursive 2-D control of the integrity of metadata of electronic documents has been developed. Its feature is the following features: 1. localization of modified (with signs of integrity violation) metadata records of electronic documents; 2. identification of authorized users (insiders) who have carried out unauthorized modifications to the metadata of electronic documents; 3. identification of the fact of collusion of trusted parties through the introduction of mutual control of the results of their actions. The proposed solution allows to implement the functions of cryptographic recursive two-dimensional control of the integrity of metadata of electronic documents. At the same time, the use of the technology of chain data recording, at the heart of the presented solution, is due to the peculiarities of the functioning of departmental automated information systems of electronic document management.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.