=Paper=
{{Paper
|id=Vol-2603/short15
|storemode=property
|title=Blockchains in Spatial Data Security
|pdfUrl=https://ceur-ws.org/Vol-2603/short15.pdf
|volume=Vol-2603
|authors=Sergey Shaytura,Alina Minitaeva,Valentina Feoktistova,Konstantin Ordov
}}
==Blockchains in Spatial Data Security==
Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) Blockchains in Spatial Data Security Shaytura Sergey Vladimirovich Feoktistova Valentina Michaylovna Russian University of Transport (MIIT) Russian State University of Tourism and Service Moscow, Russian Federation Moscow, Russian Federation swshaytura@gmail.com vfeoktistova@gmail.com Minitaeva Alina Mazhitovna Ordov Konstantin Vasilievich Bauman Moscow State Technical University Plekhanov Russian University of Economics Moscow, Russian Federation Moscow, Russian Federation aminitaeva@mail.ru post@ic-center.ru Abstract— Blockchain is a technology that allows you to store software verification technologies [10, 11, 12]; information in distributed databases. This technology allows you to view the transaction history of all participants in the system. methods of taking into account the human factor in Usually blockchain technology is associated with the creation and operation of information systems [13, 14, 15, cryptocurrencies, but such unique qualities of blockchain as 16]; transparency, decentralization, anonymity, equality and security allow to apply this technology in other areas as well. The article cryptographic methods of data protection[17, 18, 19, studies the principles of using blockchain technology in various 20, 21]. spatial tasks as logistics systems, cadastral activities, tracking the Blocked chains (blockchain) are open to all participants, so movement of people, goods and things via the Internet based on the ledger is available to all members. There are no centralized global positioning. In logistics tasks, producing goods, they form administrators, as it is a peer-to-peer network. All members a security token that follows the thing until the moment of verify and approve each transaction entered into the blockchain delivery. In cadastral activity, a token, which takes into account the characteristics of the plot and its owners, connects with every by consensus. However, there are validators that can view plot of land. In public transport, all movements can be controlled transactions and validate them. The two key characteristics of and paid for using blockchains. Blockchain technology blockchain are trust and invariability. As in a business where completely excludes the loss of things and people. transactions are based on trust, so members work on trust. Invariability is the possibility to prevent a transaction record, Keywords— blockchain, spatial technologies, cryptographic modification or deleting. When a member commits a methods, geoinformation technologies, geospatial innovation transaction, it has a date and time stamp and is accompanied by information, Bitcoin, cryptocurrency a computer-generated key using the members ' private key. Each subsequent transaction is similarly labeled and a new I. INTRODUCTION key is created that includes the earlier key. Thus, any hacking Blockchain technology is based on three principles: attempt will require unraveling the transaction password with a distribution, openness, security [1]. All users of the blockchain key, which is an impossible task. Even if it happened, the form a network in which each user stores a full copy of the hacked register would be different from other copies and after data. All users in the network are equal, and in case of failure the consensus; a consensus copy would delete and replace the of the computer of several users, data will not be lost. The data process. What would happen if the change were genuine? in the blockchain is open to everyone. Each user can track data There is a possibility of "branching" and temporary creation of changes at any time. Only the owners of the data can change two networks from one. A fork can occur in two ways; if two the data, and a private key can confirm the changes. They use validators find a new block at almost the same time or if there cryptographic methods for informational security in the are changes to the block validation rules. A soft fork occurs if blockchain. The article analyzes the possibilities of using this the new rules are backwards compatible. A hard fork occurs if technology in various spatial problems. new software is introduced that is incompatible with earlier software. II. MATERIALS AND METHODS They should understand that the ledger is, in fact, a There are many ways of user data security [2, 3, 4, 5]. transaction database. A blockchain makes sense if the ledger is They highlight follows: common and many people, who may not know each other and do not necessarily trust each other, can make the transaction data copy technology, secure networking that provides record. The solution in such a situation is to route such the necessary trust in the software [6, 7, 8, 9]; 70 transactions through a trusted intermediary known to everyone, Naturally, this storage model generates its own problems, but this increases the cost and processing time. which they often prefer not to mention. First, a complete copy of all data, including the history of all changes, creates a large In Blockchain, a peer-to-peer network, in which demand for memory resources. They are required to store all authorization and validity of transactions is achieved through a these copies on the nodes involved in data processing. Keeping process of negotiation between members, replaces such an a history of changes means that resource requirements will intermediary. The ideal option for Blockchain is a multi-rank increase rapidly as the system develops. Further, the spread of network that works without intermediaries, where the members changes across all nodes significantly increases both the time of the network do not know each other enough to trust, and of the transaction and its cost (in the sense of computation). It never the less the network requires openness and does not is also natural that there may be activities for which the open depend on capacity. However, if there is a need for centralized storage of information in a distributed network may be management, privacy, fast capacity and high scalability, then a unacceptable (e.g., activities related to trade secrets or the normal distributed database seems to have a sense. storage of personal information). There are two types of the Blockchain, which are Public One of the most well-known models of application of this one and Private one. The most notable implementation of the technology is cryptocurrencies. In this case, the data blocks Public Blockchain is the Bitcoin network. Here, the possible contain transactions describing the transfers of certain code member to whom the system assigns the private key must open sequences (digital coins) from one owner to another (Fig. 1). the wallet. Now a member can interact with others on the network, paying with bitcoins for goods, services, data, Cryptocurrencies attract much attention, the word “bitcoin” documents, etc.in the distant future, banks will go the way of has become almost nominal. At the same time, we should note Blockchain. that the word “currency” (digital or not) will almost always be naturally associated with state regulation. It is not clear how Another use of Blockchain is to track trading transactions, many such “currencies” the state will allow to have, etc. In where the Blockchain is used to record transactions, acting as a other words, this undoubtedly important and interesting project notary and a personal data storage. (cryptocurrencies) obscures a bit other uses of the distributed Public Blockchain has two drawbacks. The first is the register, which (it is important from a practical point of view) verification process, which can take a long time as there are do not require state regulation at all. And we should note here many users. The second is the block size, which can't be too that it should be typical for projects using databases. large, so only the transaction data can be transfered, not the Distributed databases are another way to use blockchains. transaction object, such as documents. On the other hand, Please do not revise any of the current designations. Hasq is institutions such as government departments, industries, and a technology and a service based on it for maintaining companies can create and manage a private blockchains. distributed databases, implemented in the form of a Private Blockchain avoids these problems by limiting the decentralized system of servers [22]. number of users. Membership in the Private Blockchain is by invitation. Although others can see transactions they can't participate in. Administrators can easily change the rules governing private Blockchain and they could allow transaction rollback. Institutions appoint validators who are trusted by the institutions. Transaction costs are lower than in Public Blockchains and faulty nodes can be quickly detected and repaired. Blockchain is the name of a distributed database, which is a sequential chain of blocks built according to certain rules that contain any information. Each block contains a timestamp and a link to the previous block. The blocks are linked chronologically and cryptographically. Cryptographic linking involves supporting rules for including new blocks in the chain and tracking attempts to modify existing blocks. This approach is also called a distributed registry, referring to the fact that there is no centralized body (structure, regulator) that could dispose of such a chain of blocks at its own discretion. Accordingly, blockchain as a database has no centralized control. This database is open to any member of the network and the members ' own computers store it. The complete history of data changes is stored in the system and Fig. 1. The concept of transactions in the bitcoin chain protected from changes by cryptographic mechanisms. Returning to the registry model, it seems to be as an electronically signed registry that is stored in a large number of copies in different locations. 71 • ensuring optimal functioning of internal and external information flows; • improving the efficiency of the enterprise management system, ensuring internal stability and high quality of meeting market needs; • contributing to the creation of optimal stocks of material and information resources; • ensuring high flexibility of the enterprise; • reducing the duration of logistics cycles. The information logistics system should control the flow of of material and equipment to the warehouse, that is, the system should rapidly monitor supplies and sales with the information flows. Management methods in logistics systems significantly differ with wide control of not only flows and stationary objects, but also mobile objects [25]. Accounting the spatial data relationship is very important for information and logic Fig 2.Hash chain of Hasq. systems, as the expense and replenishment of resources is carried out in real space and time, which leads to the need to A database consists of a list of records that link together in take into account the real spatial and logical relationships that a special way, using a hash function. Each entry has the exist in the process of transportation and delivery. following text fields separated by spaces: N, S, K, G, O, D, where N is an index number of a certain S. S (token) is the The life cycle [26] of the logistic delivery of goods passes result of computing the hash function (hash) from digital data the stages of production, configuration, shipment, acceptance of random character, S represents a string of hexadecimal and sale. When stages change, they conduct transactions in digits. Key (K), Generator (G) and Owner (O) are hashes, banking operations. In this case, for conducting these which they use for linking records. The number of G fields can transactions it is expedient to use blockchains. Producing be random but fixed within one database. D is optional data goods, they generate a token and transfer it to the next owner of text field. Hash function links all fields. These links are the goods, and enter the produced action into the database. The presented on Fig. 2. system structure includes clients, GIS service, a distributed database and a blockchain. III. GIS-SERVICES BASED ON BLOCKCHAINS IN THE LOGISTICS SYSTEM IV. USING OF BLOCKCHAINS IN CADASTRAL ACTIVITIES Information logistics system is a complex integrated system In the case of working out cadastral plans, there is no trust that organizes accounting, control, planning, purchase, supply between the participators and there is a need for openness. The and distribution of material and equipment. The main purpose weakest link is the cadastral office, where data can be lost or of the information logistics system is to plan resource they can conduct false transactions that cannot be detected requirements and control their availability in warehouses. This immediately [27]. system should monitor the availability of resources and warn Let's examine the registration procedure of cadastral about control standards excess. Information logistics system records which is based on blockchain. Various interested should also inform the decision-maker about possible suppliers parties communicate with each other on request. The of resources and find the best solution for the supply and sale. blockchain digitizes and places all information about the Information flows of the logistics system in the process of their property (current owner, cadastral map). There is a contract movement pass through different levels of the organization that ensures that certain rules regulate the digitized space. They structure and they are transformed at these levels [23, 24]. use the application as an interface to facilitate all transactions. Primary information flows transform into material and The purchase and sale contract is processed into a hash code information flows, material and information products and and placed in the blockchain. Banks, real estate agents, land resources. It means that the process of information logistics buyers can confirm the authenticity of this purchase agreement creates additional material and information resources. The and other documents through their unique digital signature overall objective of information logistics at the enterprise is to (hash of the blockchain). ensure the competitiveness of the enterprise and its sustainable development. The algorithm for using the blockchain is following. First, the public key interface informs all interested parties. Second, Particular tasks of information logistics include: they create a protocol that links as buyer to seller, as real estate, • ensuring optimal use of limited material and payment, bank, smart contract and registry. Third, they use information resources; specially improved smartphones that can process digital signatures, personal computers and other gadgets to interact 72 with the phone through some form of authentication. All this A blockchain is a chain of data blocks where each block can work within the framework of the blockchain. links to the previous one. New blocks always add strictly to the end of the chain [40, 41, 42]. In Moscow, they intend to extensively use blockchain technology in the city management, in particular, in the spheres All users form a distributed database, each computer stores of housing and communal services, health care, cadastral a complete copy of all blocks. It is impossible to destroy the registration, subsidying and state purchase contracts [27]. data in such a database, because you have to destroy all the computers located in different places. Each user strengthens V. BLOCKCHAIN AND INTERNET OF THINGS this network. In a distributed network database, there are no moderators, supervisors, managers, organizers, as all users are Another important area where they can effectively use equal. They can use the cryptography, which increases the data blockchain together with geospatial technologies is the Internet security, to transfer data. of things [28, 29, 30]. Today, the Internet of things creates an image to be a complex network of people and objects that transmit data to each other [31, 32]. Some questions about it VIII. CONCLUSION appear. What kind of data are there? How are they verified, The use of blockchain technology allows fully controlling how are things and people protected from illegal access and the spatial movement of produced goods, and in combination processes? For example, can a car with an anti-theft alarm with spatial positioning technology eliminates possible thefts. system be stolen? So far, there is not any anti-theft alarm Blockchain will help to reduce the cost of controlling the system, which guarantees it. The use of blockchain technology distribution of products, increase the level of trust between the can solve this problem. If the chain contains the anti-theft data, participants of the exchange in logistics transportations. tone person cannot change them, since all transactions in the blockchain are stored in all previous and subsequent data. Blockchain and smart contracts can be the basis of a managed, transactional Internet, where machines observe rules and REFERENCES follow algorithms, provide the kinds of verification usually [1] E.A. Khrisanova, “Development of methods for protecting a distributed associated with a third party. Business process management geoinformation database” [“Razrabotka metodiki zashchity can engage in the internal process of each object and act as web raspredelennoi geoinformatsionnoi bazy dannykh”], Slavic forum [Slavyanskii forum], no. 3 (17), pp. 163 – 167, 2017. on one side of the transaction or the other. Smart contracts extend the ability to manage business processes outside the [2] Probabilistic Modeling in System Engineering / By ed. A. Kostogryzov – London: IntechOpen, 2018. 278 p. DOI: 10.5772/intechopen.71396. walls of the organization and can become intermediaries [3] Markov A.S., Fadin A.A., Tsirlov V.L. Multilevel Metamodel for between two business partners. Heuristic Search of Vulnerabilities in the Software Source Code, International Journal of Control Theory and Applications, 2016, vol. 9, VI. BLOCKCHAIN AND GEOSPATIAL DATA No 30, pp. 313-320. [4] Zegzhda, P., Zegzhda, D., Pavlenko, E., Dremov, A. Detecting Android Imagine a traveler in a public transport system who uses a application malicious behaviors based on the analysis of control flows smart mobile with tokens. When a person takes a bus, the and data flows (2017) ACM International Conference Proceeding Series, crypto-spatial layer marks the getting on and getting off point pp. 280-286. DOI: 10.1145/3136825.3140583 and automatically charges from the traveler's spatial wallet and [5] Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Y. Ensuring credits to the transport company's spatial wallet. There is no Secure Data Input/Output Operations for SGX ENCLAVE (2018) Automatic Control and Computer Sciences, 52 (8), pp. 1036-1041. need to use cards or recharge cards. Debits and credits are DOI: 10.3103/S0146411618080321 counted instantly and the transaction automatically accords [6] D. Maevsky, V. Kharchenko, M. Kolisnyk, and E. Maevskaya, with the blockchain [25, 29, 33, 34, 35]. “Software reliability models and assessment techniques review: Classification issues”, 2017 9th IEEE International Conference on They can monitor movements and transfer of goods and Intelligent Data Acquisition and Advanced Computing Systems: automatically calculate and debit the cost of shipping. Data can Technology and Applications (IDAACS), IEEE, pp. 894–899, 2017. include satellite data, maps, land plot data, 3D visualization DOI: 10.1109/IDAACS.2017.8095216 data, etc. In this way, they can easily estimate and distribute [7] E.G.Vorobiev, S.A. Petrenko, I.V. Kovaleva, and I.K. Abrosimov, spatial data of satellites, drones, and even terrain “Organization of the entrusted calculations in crucial objects of measurements. They can integrate data security through tokens. informatization under uncertainty”, Proceedings of 2017 20th IEEE International Conference on Soft Computing and Measurements, SCM, no. 20, pp. 299 – 300, 2017. DOI: 10.1109/SCM.2017.7970566. VII. DISCUSSION OF RESULTS [8] Markov A., Barabanov A., Tsirlov V. Models for Testing Modifiable Systems. In Book: Probabilistic Modeling in System Engineering, by ed. Human activity continuously connects with the flow of A.Kostogryzov. IntechOpen, 2018, Chapter 7, pp. 147-168. DOI: data, documents and money. It is very difficult to control this 10.5772/intechopen.75126. process. Employees of banks, shops very often tend to abuse [9] Markov A., Barabanov A., Tsirlov V. Periodic Monitoring and Recovery their official status. of Resources in Information Systems. In Book: Probabilistic Modeling in System Engineering, by ed. A.Kostogryzov. IntechOpen, 2018, Blockchain is a technology of reliable distributed data Chapter 10, pp. 213-231. DOI: 10.5772/intechopen.75232. storage and the data can be of any types of human activity [10] Petrenko, A.S., Petrenko, S.A., Makoveichuk, K.A., Chetyrbok, P.V.: products [36, 37, 38]. Protection Model of PCS of Subway from Attacks Type «Wanna cry», «Petya» and «Bad rabbit» IoT. In: Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic 73 Engineering (ElConRus 2018). IEEE, pp. 945 – 949 (2018). DOI: [27] S.A. Pavlov, “Perfection of technology of formation of territorial zones 10.1109/EIConRus.2018.8317245. of objects of technogenic safety at introduction of the state ground [11] M. Edwards, R. Larson, B. Green, A. Rashid, and A. Baron, “Panning cadastre” [Sovershenstvovanie tekhnologii formirovaniya territorialnykh for gold: Automatically analysing online social engineering attack zon obieektov tekhnogennoi bezopasnosti pri vvedenii surfaces”, Computers & Security, vol. 69, pp. 18–34, 2017. gosudarstvennogo zemelnogo kadastra] Slavic forum [Slavyanskii forum], no. 3 (17), pp. 144 – 149, 2017. [12] V.N. Ivanova, A.L. Poltarykhin, A. Szromnik, and O. Anichkina, “Economic policy for country’s digitalization: a case [28] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, A.V. Antonenkova, and study”, Entrepreneurship and Sustainability Issues, no. 7(1), pp. 649- N.A. Zhenova, “Performance evaluation of the electronic commerce 661, 2019. systems”, Espacios, vol. 38, no. 62, p.11, 2017. [13] B.I. Skorodumov, O.B. Skorodumova, and L.F. Matronina “Research of [29] S.V. Shaitura, A.M. Minitaeva, K.V. Ordov, and V.V. Shaparenko, Human Factors in Information Security”, Modern Applied Science, vol. “Virtual enterprises in a spatial economy”, International Journal of 9, no. 5, pp. 287–294. 2015. Recent Technology and Engineering (IJRTE), vol. 7, no. 6, pp. 719 – 724, 2019. [14] K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “Advanced social engineering attacks” Journal of Information Security and Applications, [30] S.V. Shaitura, K.V. Ordov, I.G. Lesnichaya, Yu.D. Romanova, and S.S. vol. 22, pp. 113–122, 2015. Khachaturova “Services and mechanisms of competitive intelligence on the internet”, Espacios, vol. 39, no. 45, p. 24, 2018. [15] F. Mouton, L. Leenen, and H.S. Venter, “Social engineering attack examples, templates and scenarios”, Computers & Security, ] vol. 59, [31] J.Y. Astier, I.Y. Zhukov, O.N. Murashov, “Smart Building Management pp. 186–209, 2016. Systems and Internet of Things. IT Security”, [S.l.], vol. 24, no. 3, pp. 18−29, july 2017. ISSN 2074-7136. [16] Nader Sohrabi Safa, Rossouw von Solms, and Lynn Futcher, “Human aspects of information security in organisations”, Computer Fraud & [32] Malte Burkert, Heiko Krumm, and Christoph Fiehe, “Technical Security, no. 2, pp. 15–18, 2016. management system for dependable Building Automation Systems”, 2015 IEEE 20th Conference on Emerging Technologies & Factory [17] S.V. Belim, and N.F. Bogachenko, “Distribution of Cryptographic Keys Automation (ETFA), pp. 1 - 8, 2015. DOI: in Systems with a Hierarchy of Objects”, Automatic Control and 10.1109/ETFA.2015.7301656 Computer Sciences, vol. 50, no. 8, pp. 777–786, 2016. [33] Zhaohui Wu, Jianwei Yin, Shuiguang Deng, Jian Wu, Ying Li, and [18] A. Barabanov, and A. Markov, “Modern Trends in The Regulatory Liang Chen, “Modern Service Industry and Crossover Services: Framework of the Information Security Compliance Assessment in Development and Trends in China”, IEEE Transactions on Services Russia Based on Common Criteria”, Proceedings of the 8th International Computing, vol. 9, no. 5, pp. 664-671, 2016. DOI: Conference on Security of Information and Networks (Sochi, Russian 10.1109/TSC.2015.2418765 Federation, September 08-10, 2015). SIN '15. ACM New York, NY, USA, 2015, pp. 30-33. DOI: 10.1145/2799979.2799980. [34] Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara “Low Power Wide Area Networks: An Overview”, IEEE Communications Surveys & [19] A. Markov, D. Luchin, Y. Rautkin, and V. Tsirlov, “Evolution of a Tutorials, vol. 19, no. 2, pp. 855-873, 2017. DOI: Radio Telecommunication Hardware-Software Certification Paradigm in 10.1109/COMST.2017.2652320 Accordance with Information Security Requirements”, Proceedings of the 11th International Siberian Conference on Control and [35] Keyi Zhang, and Alan Marchiori, “Crowdsourcing low-power wide- Communications (Omsk, Russia, May 21-23, 2015). SIBCON-2015. area IoT networks”, 2017 IEEE International Conference on Pervasive IEEE, 1-4. DOI: 10.1109/SIBCON.2015.7147139. Computing and Communications (PerCom), pp. 41-49, 2017. DOI: 10.1109/PERCOM.2017.7917849 [20] V. Yemelyanov, N. Yemelyanova and A. Nedelkin, “Neural network for decision support to determine the operating mode of lined equipment”, [36] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable Paper presented at the MATEC Web of Conferences, p.224, 2018. SCADA in view of acquiring multi-protocol smart grid devices”, 2016 doi:10.1051/matecconf/201822404005 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 182 – [21] A. Boiko, V. Shendryk, and O. Boiko, “Information systems for supply 187, 2016. DOI: 10.1109/AEEICB.2016.7538269 chain management: uncertainties, risks and cyber security”, Procedia Computer Science, vol. 149, pp. 65 – 70, 2019. DOI: [37] Saveen A. Abeyratne, and Radmehr P. Monfared, “Blockchain ready 10.1016/j.procs.2019.01.108. manufacturing supply chain using distributed ledger”, International Journal of Research in Engineering and Technology, no. 05 (09), pp. 1– [22] G. G. Trubach, “Environment development for monitoring commodity 10, 2016. and transport flows based on blockchain technologies” [“Razrabotka sredy monitoringa tovarno-transportnykh potokov na osnove [38] A. B. Ayed, “A conceptual secure blockchain-based electronic voting tekhnologii blokchein”], Collection of works of the 74th scientific system”, International Journal of Network Security & Its Applications, conference of students and postgraduates of the Belarusian state vol. 9, no. 3, 2017. University: in 3 parts [Sbornik rabot 74-i nauchnoi konferentsii [39] R.Hanifatunnisa, and B. Rahardjo, “Blockchain based e-voting recording studentov i aspirantov Beloruskogo gosudarstvennogo universiteta: v 3 system design (2018)”, Proceeding of 2017 11th International chastyakh], pp. 96-99, 2017. Conference on Telecommunication Systems Services and Applications, [23] V. Tatarinov, and A. Kirsanov, “Enhancement of monitoring systems for TSSA 2017, pp. 1-6, January 2018. the transport of dangerous goods by road”, 2019 IOP Conf. Ser.: Mater. [40] D. Kirilova, N. Maslov, T. Astakhova, “Prospects for the introduction of Sci. Eng. 492 012017 blockchain technology into a modern system of education”, [24] V.YA. Tsvetkov, “Logistics information distributed systems” International Journal of Open Information Technologies, vol. 6, no. 8, [“Logistika informatsionnykh raspredelennykh sistem”], Prospects of 2018. science and education [Perspektivy nauki i obrazovaniya], no. (4)22, pp. [41] F. Caldieraro, J. Z. Zhang, M. Jr. Cunha, and J. D. Shulman, “Strategic 18 -22, 2016. Information Transmission in Peer-to-Peer Lending Markets”, Journal of [25] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, T.A. Vintova, A.M. Marketing, vol. 82, no. 2, pp. 42- 63, March 2018 Minitaeva, and V.M. Feoktistova, “Geoinformation services in a spatial [42] W. Liu and L-Q Xia, “An Evolutionary Behavior Forecasting Model for economy”, International Journal of Civil Engineering and Technology, Online Lenders and Borrowers in Peer-to-Peer Lending.” AsiaPacific vol. 9, no. 22, pp. 829-841, 2018. Journal of Operational Research, vol. 34, no. 01, 2017. [26] V.V. Dik, and S.V. Shaitura, “Life cycle of information systems” [ZHiznennyi tsikl informatsionnykh sistem], Vestnik MGTU MIREA, no. 3 (4), pp. 116 – 129, 2014. 74