from 01.01.2001 until now
UDC 004.056
the paper analyzes the existing basic methods of data integrity control, suggests criteria for their effectiveness and a model for choosing the optimal method for implementing data integrity control procedures, taking into account the specifics of the functioning of an automated system. The applicability of the proposed model for choosing the optimal integrity control method for a specific system is evaluated. It is emphasized that ensuring the integrity of information in modern automated systems is becoming one of the most critical tasks, the solution of which directly affects the functions related to maintaining the reliability of the information system and data security. The high dynamics of the increase in the volume of processed data of various structures, the increasing complexity of the infrastructure of the supporting part of the information system and the increasing equipment of intruders make the problem of integrity control relevant. The current methods of solving this problem, including checksum mechanisms, electronic signatures, and hierarchical integrity control methods, are effective, but they face limitations related to limited resources, complexity in implementation in automated systems, and vulnerability to modern types of attacks. The following description is intended to determine the optimal method of information integrity control, to build its model, taking into account the specifics of the functioning of the automated system
data integrity control, mathematical modeling, hash functions, electronic signature, hash tree, Merkle tree, redundancy, resources
1. Dichenko S.A. Kontrol` i obespechenie celostnosti informacii v sistemax xraneniya danny`x // Naukoemkie texnologii v kosmicheskix issledovaniyax Zemli. 2019. T. 11. № 1. S. 49–57.
2. Pushkarev A.V., Novikov S.N. Analiz podxodov obespecheniya celostnosti informacii // Intere`kspo Geo-Sibir`. 2019. №1. DOI:https://doi.org/10.33764/2618-981X-2019-6-1-122-127
3. Lanina A.A., Levina A.B., Metody` povy`sheniya celostnosti informacii v sistemax xraneniya danny`x za schet kombinacii sindromnogo i veroyatnostnogo dekodirovaniya // Bezopasnost` informacionny`x texnologij. 2025. T. 32. № 3. S. 44–56.
4. Rodin S.V. Modelirovanie sistem zashhity` informacii v informacionny`x sistemax vnevedomstvennoj oxrany`: avtoref. dis. kand. texn. nauk. Voronezh: Voronezhskij institut MVD Rossii, 2009.
5. Matematicheskaya model` lokal`noj politiki bezopasnosti s uchetom strukturny`x osobennostej avtomatizirovannoj informacionnoj sistemy` informacionnogo centra / V.I. Sumin, A.V. Dushkin, S.V. Rodin, M.A. Zhukova // Matematicheskie metody` i informacionno-texnicheskie sredstva: materialy` IX Vserossijskoj nauchno-prakticheskoj konferencii / Redkollegiya: I.N. Starostenko otvetstvenny`j redaktor, S.A. Vy`zulin, E.V. Mixajlenko, Yu.N. Sopil`nyak. Krasnodar, 2013. S. 305–307.
6. Balyabin, A. A. Metodika kontrolya i vosstanovleniya celostnosti vy`chislitel`ny`x processov v informacionny`x sistemax na osnove priobretaemogo kiberimmuniteta / A. A. Balyabin // I-methods. – 2022. – T. 14, № 2. – EDN SWEJLB.
7. Issledovanie ob``ema vvodimoj izby`tochnosti dlya obespecheniya celostnosti danny`x na osnove preobrazovanij v kompleksnoj ploskosti / A. A. Luchko, R. V. Fadeev, I. O. Povchun [i dr.] // Izvestiya Tul`skogo gosudarstvennogo universiteta. Texnicheskie nauki. – 2023. – № 11. – S. 218-223. – DOIhttps://doi.org/10.24412/2071-6168-2023-11-218-219. – EDN FPXWAH.
8. Maalla M.A., Bezzateev S.V. Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes // Nauchno-texnicheskij vestnik informacionny`x texnologij, mexaniki i optiki. 2022. №3. doi:https://doi.org/10.17586/2226-1494-2022-22-3-538-546
9. Dichenko S.A., Fin`ko O.A. Obobshhenny`j sposob primeneniya xe`sh-funkcii dlya kontrolya celostnosti danny`x // Naukoemkie texnologii v kosmicheskix issledovaniyax Zemli. 2020. T. 12. № 6. S. 48–59. DOI:https://doi.org/10.36724/2409-5419-2020-12-6-48-59. 3.
10. Popov, A.V. Model` funkcionirovaniya zashhishhaemoj korporativnoj informacionnoj sistemy` / A. V. Popov, O. N. Choporov, Yu. P. Preobrazhenskij // Modelirovanie, optimizaciya i informacionny`e texnologii. – 2022. – T. 10, № 4(39). – S. 11-12. – DOIhttps://doi.org/10.26102/2310-6018/2022.39.4.005. – EDN SECPRS.
11. Tali D.I., Fin`ko O.A. Kriptograficheskij rekursivny`j kontrol` celostnosti metadanny`x e`lektronny`x dokumentov. Chast` 4. Ocenka zashhishhennosti // Voprosy` kiberbezopasnosti. 2021. №2 (42). DOI:https://doi.org/10.21681/2311-3456-2020-05-2-18
12. Kvach A.I. Razrabotka algoritma obrabotki bol`shix potokov danny`x s ispol`zovaniem dvoichnogo dereva Merkla – Patriciya / A.I. Kvach, E.M. Portnov, V.V. Kokin, A.M. Bain // Perspektivy` nauki. 2022. № 10 (157). S. 18–22.
13. Fisun V. V. Metodika ocenki zashhishhennosti v intellektual`noj sisteme upravleniya informacionnoj bezopasnost`yu ob``ektov kriticheskoj informacionnoj infrastruktury` // NAU. 2022. №77 DOI:https://doi.org/10.31618/nas.2413-5291.2022.1.77.575
14. Ocenka e`ffektivnosti kontrolya i vosstanovleniya celostnosti danny`x v informacionny`x sistemax razlichnogo naznacheniya / O. P. Shemetov, D. M. Simonenko, R. V. Fadeev, P. A. Novikov // Izvestiya Tul`skogo gosudarstvennogo universiteta. Texnicheskie nauki. – 2022. – № 10. – S. 224-230. – DOIhttps://doi.org/10.24412/2071-6168-2022-10-224-230. – EDN XHOAAY.
15. Korolev, I.D. Modelirovanie processov funkcionirovaniya avtomatizirovanny`x sistem pri provedenii meropriyatij po ocenke zashhishhennosti / I. D. Korolev, D. I. Markin, E. S. Litvinov // Modelirovanie, optimizaciya i informacionny`e texnologii. – 2021. – T. 9, № 4(35). – DOIhttps://doi.org/10.26102/2310-6018/2021.35.4.010. – EDN RMDJVX.
16. Komarova A.V., Menshhikov A.A., Korobejnikov A.G. Analiz i sravnenie algoritmov e`lektronnoj podpisi GOST R 34.10-1994, GOST R 34.10-2001 i GOST R 34.10-2012. // Voprosy` kiberbezopasnosti. 2017. № 1 (19). S. 51–56.



