Abstract

Objective: To develop a draft database model adapted for use in decentralized databases. To describe the protocol stack for interaction between the components of database management systems operating with decentralized resources. To design mechanisms for distributing access rights of access subjects to access objects. Methodology: 1) analysis of the functions of decentralized protocols; 2) system analysis of structures and data processing algorithms; 3) analysis of the principles of decentralized applications and the requirements for decentralized databases; 4) prototyping data building models; 5) classification of threats to information security; 6) experimental methodology, including stress tests and the analysis and summary of the data obtained. Results: A new concept of data organization was considered, which allowed separating data storage models from business process models, thereby enabling the quick adjustment of the application to the company’s requirements. A number of mechanisms are presented that are capable of ensuring the performance of applications operating on the basis of decentralized storages. A method for differentiating access rights to objects by limiting the data scope depending on the role assigned to the user is described. Practical importance: Developments in this area have both theoretical and practical significance due to the popularization of the principles of the so-called “distributed economy” both in the field of government and commerce, and among software designers. Such transformations in the design of data models, the organization of both the development itself, and the internal architecture of the application would solve the problem of excessive centralization of resources and information flows, as well as distribute responsibility for the integrity and relevance of data among the participants in the process. The results obtained can be used for the practical implementation of decentralized storage, as well as for the design of software modules that eliminate vulnerabilities and ensure stable neutralization of threats to information security of decentralized databases.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.