Skip to main content
Log in

Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

In this work, the problem of ensuring the auditing of granular transformations in heterogeneous big data processing systems is considered. Distributed ledger technology is proposed for tracking transformations of data fragments. Technological options for solving this problem are compared, and analytical and experimental estimates and recommendations on how to apply the results of the study are given. Unlike other similar works, the application of various types of distributed ledger technology is considered and the requirement for multiplatformity is included for the problem to be solved. The proposed solution is universal and can be used in heterogeneous multiplatform big data processing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.

REFERENCES

  1. Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895–902. https://doi.org/10.3103/S014641161908025X

    Article  Google Scholar 

  2. Poltavtseva, M.A., Evolution of data management systems and their security, 2019 Int. Conf. on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25–29. https://doi.org/10.1109/EnT.2019.00010

  3. Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Aut-om. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903–913. https://doi.org/10.3103/S0146411619080261

    Article  Google Scholar 

  4. Zhang, C., Li, Yi, Sun, W., and Guan, Sh., Blockchain based big data security protection scheme, IEEE 5th Information Technology and Mechatronics Engineering Conf. (ITOEC), Chongqing, China, 2020, IEEE, 2020, pp. 574–578. https://doi.org/10.1109/ITOEC49072.2020.9141914

  5. Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021. https://doi.org/10.3103/S0146411618080175

    Article  Google Scholar 

  6. Aujla, G.S., Chaudhary, R., Kumar, N., Das, A.K., and Rodrigues, J.J.P.C., SecSVA: Secure storage, verification, and auditing of big data in the cloud environment, IEEE Commun. Mag., 2018, vol. 56, no. 1, pp. 78–85. https://doi.org/10.1109/MCOM.2018.1700379

    Article  Google Scholar 

  7. Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, pp. 1111–1116. https://doi.org/10.3103/S0146411618080400

    Article  Google Scholar 

  8. Li, J., Wu, J., Jiang, G., and Srikanthan, T., Blockchain-based public auditing for big data in cloud storage, Inf. Process. Manage., 2020, vol. 57, no. 6, p. 102382. https://doi.org/10.1016/j.ipm.2020.102382

    Article  Google Scholar 

  9. Tariq, N., Asim, M., Al-Obeidat, F., Farooqi, M.Z., Baker, T., Hammoudeh, M., and Ghafir, I., The security of big data in fog-enabled IoT applications including blockchain: A survey, Sensors, 2019, vol. 19, no. 8, p. 1788. https://doi.org/10.3390/s19081788

    Article  Google Scholar 

  10. Zhao, Ya., Yu, Yo., Li, Ya., Han, G., and Du, X., Machine learning based privacy-preserving fair data trading in big data market, Inf. Sci., 2019, vol. 478, pp.449–460. https://doi.org/10.1016/j.ins.2018.11.028

    Article  Google Scholar 

  11. Lavrova, M., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 818–823. https://doi.org/10.1109/ICPHYS.2018.8390812

  12. Patil, S.S. and Puranik, Y.L., Blockchain technology, Int. J. Trend Sci. Res. Dev., 2019, vol. 3, no. 4, pp. 573–574. www.researchgate.net/publication/334123583_Blockchain_Technology.

  13. Popov, S., The Tangle, IOTA, 2021. https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/ 45eae33637ca92f85dd9f. Cited July 25, 2021.

  14. Musungate, B.N., Candan, B., Çabuk, U.C. and Dalkılıç, G., Sidechains: Highlights and Challenges, 2019 Innovations in Intelligent Systems and Applications Conf. (ASYU), Izmir, Turkey, 2019, IEEE, 2019, pp. 1–5. https://doi.org/10.1109/ASYU48272.2019.8946384

  15. Hoxha, L., Hashgraph the future of decentralized technology and the end of blockchain, Eur. J. Formal Sci. Eng., 2018, vol. 2, no. 1, pp. 86–89. https://doi.org/10.26417/ejef.v2i2.p86-89

    Article  Google Scholar 

  16. El Ioini, N. and Pahl, C., Review of distributed ledger technologies, On the Move to Meaningful Internet Systems. OTM 2018 Conf., Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., and Meersman, R., Eds., Lecture Notes in Computer Science, vol. 11230, Cham: Springer, 2018, pp. 277–288.  https://doi.org/10.1007/978-3-030-02671-4_16

  17. Dworkin, M., SHA-3 Standard: Permutation-based hash and extendable-output functions, Gaithersburg, Md.: National Institute of Standards and Technology, 2015. https://doi.org/10.6028/NIST.FIPS.202

    Book  Google Scholar 

  18. Aumasson, J.P. and Meier, W., Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi, Rump Session of Cryptographic Hardware and Embedded Systems-CHES, 2009, p. 67.

    Google Scholar 

  19. Sklavos, N. and Kitsos, P., BLAKE HASH function family on FPGA: From the fastest to the smallest, 2010 IEEE Computer Society Annu. Symp. on VLSI, Lixouri, Greece, 2010, IEEE, 2010, pp. 139–142.  https://doi.org/10.1109/ISVLSI.2010.115

  20. Hedera: Official Documentation. https://www.hedera.com/learning/what-is-hashgraph-consensus. Cited July 25, 2021.

  21. Baird, L., The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance, Technical Report SWORLDS-TR-2016, Swirlds, 2016.

Download references

ACKNOWLEDGMENTS

Project results are achieved using the resources of supercomputer center of Peter the Great St.Petersburg Polytechnic University—SCC Polytechnichesky (www.spbstu.ru).

Funding

The research is funded by the Ministry of Science and Higher Education of the Russian Federation under the strategic academic leadership program “Priority 2030” (agreement 075-15-2021-1333 dated November 30, 2021).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. A. Poltavtseva.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by M. Talacheva

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtseva, M.A., Torgov, V.A. Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems. Aut. Control Comp. Sci. 56, 874–882 (2022). https://doi.org/10.3103/S0146411622080193

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411622080193

Keywords:

Navigation