Vše

Co hledáte?

Vše
Projekty
Výsledky výzkumu
Subjekty

Rychlé hledání

  • Projekty podpořené TA ČR
  • Významné projekty
  • Projekty s nejvyšší státní podporou
  • Aktuálně běžící projekty

Chytré vyhledávání

  • Takto najdu konkrétní +slovo
  • Takto z výsledků -slovo zcela vynechám
  • “Takto můžu najít celou frázi”

RESEARCH OF POTENTIAL DATA LEAKS IN INFORMATION AND COMMUNICATION SYSTEMS ДОСЛІДЖЕННЯ ПОТЕНЦІЙНИХ ВИТОКІВ ДАНИХ В ІНФОРМАЦІЙНИХ І КОМУНІКАЦІЙНИХ СИСТЕМАХ

Identifikátory výsledku

  • Kód výsledku v IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F22%3A00362719" target="_blank" >RIV/68407700:21230/22:00362719 - isvavai.cz</a>

  • Výsledek na webu

    <a href="https://doi.org/10.32620/reks.2022.4.05" target="_blank" >https://doi.org/10.32620/reks.2022.4.05</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.32620/reks.2022.4.05" target="_blank" >10.32620/reks.2022.4.05</a>

Alternativní jazyky

  • Jazyk výsledku

    angličtina

  • Název v původním jazyce

    RESEARCH OF POTENTIAL DATA LEAKS IN INFORMATION AND COMMUNICATION SYSTEMS ДОСЛІДЖЕННЯ ПОТЕНЦІЙНИХ ВИТОКІВ ДАНИХ В ІНФОРМАЦІЙНИХ І КОМУНІКАЦІЙНИХ СИСТЕМАХ

  • Popis výsledku v původním jazyce

    This article discusses the problem of ensuring the protection of user data in information systems. It is shown that classic information systems are represented by stationary and mobile communication devices focused on data exchange with digital space. The fundamental principles of user data exchange in the digital space are considered. It has been established that leading technology IT corporations collect data from user communication devices. It is shown that the organization of data collection is carried out by redirecting the DNS traffic of the communication device to the DNS servers of IT corporations, followed by its encryption using the DoH protocol. This makes it impossible for authorized services and departments of national states to control the users’ DNS traffic and ensures the monopoly position of IT corporations in the global digital market for collecting and analyzing user data. It is shown that the collection of user data is carried out with the aim of further monetization and influencing decisions made by users. DNS traffic of devices for communication with the digital space of the Internet is fixed. An audit of the recorded DNS traffic was performed, and as a result, specialized Internet resources were identified to be responsible for collecting and processing user data. It has been proved that the identified specialized Internet resources belong to IT corporations. Methods of identification of communication devices in digital space were considered. It is shown that the identification of communication devices is based on the collection of a unique set of data from each communication device. Based on each unique data set, a digital fingerprint of the communication device is formed, which is used for its further identification in the digital space. These approaches allow organizing protection against user data collection in information systems. Software and hardware implementations for protection against data collection from communication devices are proposed. It has been experimentally established that the combined use of the proposed software and hardware models provides the most effective protection against data collection from communication devices and does not affect the functionality of information systems.

  • Název v anglickém jazyce

    RESEARCH OF POTENTIAL DATA LEAKS IN INFORMATION AND COMMUNICATION SYSTEMS ДОСЛІДЖЕННЯ ПОТЕНЦІЙНИХ ВИТОКІВ ДАНИХ В ІНФОРМАЦІЙНИХ І КОМУНІКАЦІЙНИХ СИСТЕМАХ

  • Popis výsledku anglicky

    This article discusses the problem of ensuring the protection of user data in information systems. It is shown that classic information systems are represented by stationary and mobile communication devices focused on data exchange with digital space. The fundamental principles of user data exchange in the digital space are considered. It has been established that leading technology IT corporations collect data from user communication devices. It is shown that the organization of data collection is carried out by redirecting the DNS traffic of the communication device to the DNS servers of IT corporations, followed by its encryption using the DoH protocol. This makes it impossible for authorized services and departments of national states to control the users’ DNS traffic and ensures the monopoly position of IT corporations in the global digital market for collecting and analyzing user data. It is shown that the collection of user data is carried out with the aim of further monetization and influencing decisions made by users. DNS traffic of devices for communication with the digital space of the Internet is fixed. An audit of the recorded DNS traffic was performed, and as a result, specialized Internet resources were identified to be responsible for collecting and processing user data. It has been proved that the identified specialized Internet resources belong to IT corporations. Methods of identification of communication devices in digital space were considered. It is shown that the identification of communication devices is based on the collection of a unique set of data from each communication device. Based on each unique data set, a digital fingerprint of the communication device is formed, which is used for its further identification in the digital space. These approaches allow organizing protection against user data collection in information systems. Software and hardware implementations for protection against data collection from communication devices are proposed. It has been experimentally established that the combined use of the proposed software and hardware models provides the most effective protection against data collection from communication devices and does not affect the functionality of information systems.

Klasifikace

  • Druh

    J<sub>SC</sub> - Článek v periodiku v databázi SCOPUS

  • CEP obor

  • OECD FORD obor

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Návaznosti výsledku

  • Projekt

  • Návaznosti

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Ostatní

  • Rok uplatnění

    2022

  • Kód důvěrnosti údajů

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Údaje specifické pro druh výsledku

  • Název periodika

    Radioelectronic and Computer Systems

  • ISSN

    1814-4225

  • e-ISSN

  • Svazek periodika

    2022

  • Číslo periodika v rámci svazku

    4

  • Stát vydavatele periodika

    UA - Ukrajina

  • Počet stran výsledku

    21

  • Strana od-do

    64-84

  • Kód UT WoS článku

  • EID výsledku v databázi Scopus

    2-s2.0-85146916282