A model of cryptographic network protection when using distributed big data arrays

0Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Big Data arrays are used when analysing the accumulated information and identifying patterns that can be implemented in the form of documents or development strategies, depending on the type of object. The use of the Big Data analysis methodology makes it possible to assert that the formation of clusters for storing and using the obtained information is possible only with an active correlation and interaction between individual arrays. The novelty of the study is determined by the fact that the use of Big Data in the tasks of socio-economic development requires the simultaneous analysis of information from various institutions and establishments. The authors show that Big Data analysis for the purposes of socio-economic development is possible only if access to distributed networks is established. At the same time, network protection should be based on closed cryptographic protocols. The paper shows that the use of protocols of a cryptographic type also makes it possible to verify the received data. The practical significance of the study is determined by the structure of a distributed type network and formation of a model for using Big Data in the tasks of socio-economic development. This will allow in the long term to ensure the establishment of a civil society model and reduce both financial and credibility losses.

Cite

CITATION STYLE

APA

Rahim, R. (2021). A model of cryptographic network protection when using distributed big data arrays. Periodicals of Engineering and Natural Sciences, 9(3), 439–456. https://doi.org/10.21533/pen.v9i3.2192

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free