A model of cryptographic network protection when using distributed big data arrays
DOI:
https://doi.org/10.21533/pen.v9.i3.862Abstract
Big Data arrays are used when analysing the accumulated information and identifying patterns that can be implemented in the form of documents or development strategies, depending on the type of object. The use of the Big Data analysis methodology makes it possible to assert that the formation of clusters for storing and using the obtained information is possible only with an active correlation and interaction between individual arrays. The novelty of the study is determined by the fact that the use of Big Data in the tasks of socio-economic development requires the simultaneous analysis of information from various institutions and establishments. The authors show that Big Data analysis for the purposes of socio-economic development is possible only if access to distributed networks is established. At the same time, network protection should be based on closed cryptographic protocols. The paper shows that the use of protocols of a cryptographic type also makes it possible to verify the received data. The practical significance of the study is determined by the structure of a distributed type network and formation of a model for using Big Data in the tasks of socio-economic development. This will allow in the long term to ensure the establishment of a civil society model and reduce both financial and credibility losses.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.




