Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
VERIFICATION OF PRIMARY TRANSPORT DOCUMENTATION USING THE TECHNOLOGY OF LINKED LISTS
Abstract:

The paper highlighted risks and dangers associated with the transition to the electronic form of primary transport documentation and the related possibility of unauthorized changes to the information in the primary workflow. The analysis of the shortcomings of the existing systems of protection against falsification of the client part of the electronic form of primary transport documentation was carried out. The analysis examined various cryptography systems, including the system of queuing and systems of symmetric and asymmetric encryption. In connection with the specifics of the transport industry, implying poor mobile communications and an undeveloped customer infrastructure, the difficulties of introducing traditional workflow protection tools were shown. It was proposed using linked lists (blockchain technology) as a basic document protection. Due to its flexibility, the proposed system can be implemented at several different levels of record keeping and auditing. Information about transactions can be stored both in encrypted and in open form (which removes the problem in cases where the use of a strong cryptographic system is prohibited by law). The concept of using the blockchain system at a basic, advanced and global level was developed. In the latter case, it makes possible external control of the enterprise. As proof of the concept for using linked lists there was built conceptual prototype with use python programming language and its hash() standard library of hashing function. This prototype used linked lists technology for fraud detection inside of OPEN-OASIS format documents and may use hashing algorithms SHA-2 family like sha256, sha384 and sha512. However, for MVP it is recommended using more collision-resistant algorithms, such as SHA-3 (Keccak) family.

Authors:
Keywords
References
  1. Romanenkova, O. N. (2014), "Organization of information flows in the management of logistics in road transport" [Organizacija informacionnyh potokov v upravlenii logistikoj na avtomobil'nom transporte], Economy. Taxes. Law, №5.
  2. Loktionov, A. N. and Ivanen, D. G. (2011), "Problems and features of the collection of information for the assessment of ships" [Problemy i osobennosti sbora informacii dlja ocenki sudov] Property relations in the Russian Federation, №3
  3. Karpova, D. N. (2014), "Cybercrime: a
    global problem and its solution" [Kiberprestupnost': global'naja problema i ee reshenie], Power,№8.
  4. Gragido, W.; Molina, D.; Pirc, J. & Selby, N. (2012), Blackhatonomics: An Inside Look at the Economics of Cybercrime, Newnes.
  5. Champagne, P. & Nakamoto, S. (2014), The book of Satoshi : the collected writings of Bitcoin creator Satoshi Nakamoto, e53 Publishing, LLC.
  6. Ammous, S. (2018), The Bitcoin Standard: The Decentralized Alternative to Central Banking, Wiley.
  7. Antonopoulos, A. M. (2017), Mastering Bitcoin: Programming the Open Blockchain, O’Reilly Media.
Published:
Last download:
18 Feb 2019

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014-2018. Any use of information from the site is possible only under the condition that the source link! ]