=Paper= {{Paper |id=Vol-2603/short15 |storemode=property |title=Blockchains in Spatial Data Security |pdfUrl=https://ceur-ws.org/Vol-2603/short15.pdf |volume=Vol-2603 |authors=Sergey Shaytura,Alina Minitaeva,Valentina Feoktistova,Konstantin Ordov }} ==Blockchains in Spatial Data Security== https://ceur-ws.org/Vol-2603/short15.pdf
          Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)



                       Blockchains in Spatial Data Security

              Shaytura Sergey Vladimirovich                                                    Feoktistova Valentina Michaylovna
           Russian University of Transport (MIIT)                                        Russian State University of Tourism and Service
                Moscow, Russian Federation                                                        Moscow, Russian Federation
                  swshaytura@gmail.com                                                              vfeoktistova@gmail.com


                Minitaeva Alina Mazhitovna                                                         Ordov Konstantin Vasilievich
        Bauman Moscow State Technical University                                            Plekhanov Russian University of Economics
              Moscow, Russian Federation                                                           Moscow, Russian Federation
                 aminitaeva@mail.ru                                                                    post@ic-center.ru


    Abstract— Blockchain is a technology that allows you to store                        software verification technologies [10, 11, 12];
information in distributed databases. This technology allows you
to view the transaction history of all participants in the system.                      methods of taking into account the human factor in
Usually     blockchain       technology     is    associated      with         the creation and operation of information systems [13, 14, 15,
cryptocurrencies, but such unique qualities of blockchain as                   16];
transparency, decentralization, anonymity, equality and security
allow to apply this technology in other areas as well. The article                     cryptographic methods of data protection[17, 18, 19,
studies the principles of using blockchain technology in various               20, 21].
spatial tasks as logistics systems, cadastral activities, tracking the             Blocked chains (blockchain) are open to all participants, so
movement of people, goods and things via the Internet based on                 the ledger is available to all members. There are no centralized
global positioning. In logistics tasks, producing goods, they form             administrators, as it is a peer-to-peer network. All members
a security token that follows the thing until the moment of
                                                                               verify and approve each transaction entered into the blockchain
delivery. In cadastral activity, a token, which takes into account
the characteristics of the plot and its owners, connects with every
                                                                               by consensus. However, there are validators that can view
plot of land. In public transport, all movements can be controlled             transactions and validate them. The two key characteristics of
and paid for using blockchains. Blockchain technology                          blockchain are trust and invariability. As in a business where
completely excludes the loss of things and people.                             transactions are based on trust, so members work on trust.
                                                                               Invariability is the possibility to prevent a transaction record,
    Keywords— blockchain, spatial technologies, cryptographic                  modification or deleting. When a member commits a
methods, geoinformation technologies,  geospatial innovation                   transaction, it has a date and time stamp and is accompanied by
information, Bitcoin, cryptocurrency                                           a computer-generated key using the members ' private key.
                                                                                   Each subsequent transaction is similarly labeled and a new
                         I.    INTRODUCTION                                    key is created that includes the earlier key. Thus, any hacking
    Blockchain technology is based on three principles:                        attempt will require unraveling the transaction password with a
distribution, openness, security [1]. All users of the blockchain              key, which is an impossible task. Even if it happened, the
form a network in which each user stores a full copy of the                    hacked register would be different from other copies and after
data. All users in the network are equal, and in case of failure               the consensus; a consensus copy would delete and replace the
of the computer of several users, data will not be lost. The data              process. What would happen if the change were genuine?
in the blockchain is open to everyone. Each user can track data                There is a possibility of "branching" and temporary creation of
changes at any time. Only the owners of the data can change                    two networks from one. A fork can occur in two ways; if two
the data, and a private key can confirm the changes. They use                  validators find a new block at almost the same time or if there
cryptographic methods for informational security in the                        are changes to the block validation rules. A soft fork occurs if
blockchain. The article analyzes the possibilities of using this               the new rules are backwards compatible. A hard fork occurs if
technology in various spatial problems.                                        new software is introduced that is incompatible with earlier
                                                                               software.
                 II.    MATERIALS AND METHODS                                      They should understand that the ledger is, in fact, a
   There are many ways of user data security [2, 3, 4, 5].                     transaction database. A blockchain makes sense if the ledger is
They highlight follows:                                                        common and many people, who may not know each other and
                                                                               do not necessarily trust each other, can make the transaction
        data copy technology, secure networking that provides                 record. The solution in such a situation is to route such
the necessary trust in the software [6, 7, 8, 9];




                                                                                                                                                   70
transactions through a trusted intermediary known to everyone,           Naturally, this storage model generates its own problems,
but this increases the cost and processing time.                     which they often prefer not to mention. First, a complete copy
                                                                     of all data, including the history of all changes, creates a large
    In Blockchain, a peer-to-peer network, in which                  demand for memory resources. They are required to store all
authorization and validity of transactions is achieved through a     these copies on the nodes involved in data processing. Keeping
process of negotiation between members, replaces such an             a history of changes means that resource requirements will
intermediary. The ideal option for Blockchain is a multi-rank        increase rapidly as the system develops. Further, the spread of
network that works without intermediaries, where the members         changes across all nodes significantly increases both the time
of the network do not know each other enough to trust, and           of the transaction and its cost (in the sense of computation). It
never the less the network requires openness and does not            is also natural that there may be activities for which the open
depend on capacity. However, if there is a need for centralized      storage of information in a distributed network may be
management, privacy, fast capacity and high scalability, then a      unacceptable (e.g., activities related to trade secrets or the
normal distributed database seems to have a sense.                   storage of personal information).
   There are two types of the Blockchain, which are Public               One of the most well-known models of application of this
one and Private one. The most notable implementation of the          technology is cryptocurrencies. In this case, the data blocks
Public Blockchain is the Bitcoin network. Here, the possible         contain transactions describing the transfers of certain code
member to whom the system assigns the private key must open          sequences (digital coins) from one owner to another (Fig. 1).
the wallet. Now a member can interact with others on the
network, paying with bitcoins for goods, services, data,                 Cryptocurrencies attract much attention, the word “bitcoin”
documents, etc.in the distant future, banks will go the way of       has become almost nominal. At the same time, we should note
Blockchain.                                                          that the word “currency” (digital or not) will almost always be
                                                                     naturally associated with state regulation. It is not clear how
   Another use of Blockchain is to track trading transactions,       many such “currencies” the state will allow to have, etc. In
where the Blockchain is used to record transactions, acting as a     other words, this undoubtedly important and interesting project
notary and a personal data storage.                                  (cryptocurrencies) obscures a bit other uses of the distributed
    Public Blockchain has two drawbacks. The first is the            register, which (it is important from a practical point of view)
verification process, which can take a long time as there are        do not require state regulation at all. And we should note here
many users. The second is the block size, which can't be too         that it should be typical for projects using databases.
large, so only the transaction data can be transfered, not the       Distributed databases are another way to use blockchains.
transaction object, such as documents. On the other hand,                Please do not revise any of the current designations. Hasq is
institutions such as government departments, industries, and         a technology and a service based on it for maintaining
companies can create and manage a private blockchains.               distributed databases, implemented in the form of a
Private Blockchain avoids these problems by limiting the             decentralized system of servers [22].
number of users. Membership in the Private Blockchain is by
invitation. Although others can see transactions they can't
participate in. Administrators can easily change the rules
governing private Blockchain and they could allow transaction
rollback. Institutions appoint validators who are trusted by the
institutions. Transaction costs are lower than in Public
Blockchains and faulty nodes can be quickly detected and
repaired.
   Blockchain is the name of a distributed database, which is a
sequential chain of blocks built according to certain rules that
contain any information. Each block contains a timestamp and
a link to the previous block. The blocks are linked
chronologically and cryptographically. Cryptographic linking
involves supporting rules for including new blocks in the chain
and tracking attempts to modify existing blocks.
    This approach is also called a distributed registry, referring
to the fact that there is no centralized body (structure,
regulator) that could dispose of such a chain of blocks at its
own discretion. Accordingly, blockchain as a database has no
centralized control. This database is open to any member of the
network and the members ' own computers store it. The
complete history of data changes is stored in the system and               Fig. 1. The concept of transactions in the bitcoin chain
protected from changes by cryptographic mechanisms.
Returning to the registry model, it seems to be as an
electronically signed registry that is stored in a large number of
copies in different locations.




                                                                                                                                      71
                                                                     •        ensuring optimal functioning of internal and external
                                                                     information flows;
                                                                     •        improving the efficiency of the enterprise
                                                                     management system, ensuring internal stability and high
                                                                     quality of meeting market needs;
                                                                     •        contributing to the creation of optimal stocks of
                                                                     material and information resources;
                                                                     •        ensuring high flexibility of the enterprise;
                                                                     •        reducing the duration of logistics cycles.
                                                                         The information logistics system should control the flow of
                                                                     of material and equipment to the warehouse, that is, the system
                                                                     should rapidly monitor supplies and sales with the information
                                                                     flows. Management methods in logistics systems significantly
                                                                     differ with wide control of not only flows and stationary
                                                                     objects, but also mobile objects [25]. Accounting the spatial
                                                                     data relationship is very important for information and logic
                    Fig 2.Hash chain of Hasq.
                                                                     systems, as the expense and replenishment of resources is
                                                                     carried out in real space and time, which leads to the need to
    A database consists of a list of records that link together in   take into account the real spatial and logical relationships that
a special way, using a hash function. Each entry has the             exist in the process of transportation and delivery.
following text fields separated by spaces: N, S, K, G, O, D,
where N is an index number of a certain S. S (token) is the              The life cycle [26] of the logistic delivery of goods passes
result of computing the hash function (hash) from digital data       the stages of production, configuration, shipment, acceptance
of random character, S represents a string of hexadecimal            and sale. When stages change, they conduct transactions in
digits. Key (K), Generator (G) and Owner (O) are hashes,             banking operations. In this case, for conducting these
which they use for linking records. The number of G fields can       transactions it is expedient to use blockchains. Producing
be random but fixed within one database. D is optional data          goods, they generate a token and transfer it to the next owner of
text field. Hash function links all fields. These links are          the goods, and enter the produced action into the database. The
presented on Fig. 2.                                                 system structure includes clients, GIS service, a distributed
                                                                     database and a blockchain.
     III.   GIS-SERVICES BASED ON BLOCKCHAINS IN THE
                    LOGISTICS SYSTEM                                    IV. USING OF BLOCKCHAINS IN CADASTRAL ACTIVITIES
    Information logistics system is a complex integrated system          In the case of working out cadastral plans, there is no trust
that organizes accounting, control, planning, purchase, supply       between the participators and there is a need for openness. The
and distribution of material and equipment. The main purpose         weakest link is the cadastral office, where data can be lost or
of the information logistics system is to plan resource              they can conduct false transactions that cannot be detected
requirements and control their availability in warehouses. This      immediately [27].
system should monitor the availability of resources and warn             Let's examine the registration procedure of cadastral
about control standards excess. Information logistics system         records which is based on blockchain. Various interested
should also inform the decision-maker about possible suppliers       parties communicate with each other on request. The
of resources and find the best solution for the supply and sale.     blockchain digitizes and places all information about the
Information flows of the logistics system in the process of their    property (current owner, cadastral map). There is a contract
movement pass through different levels of the organization           that ensures that certain rules regulate the digitized space. They
structure and they are transformed at these levels [23, 24].         use the application as an interface to facilitate all transactions.
Primary information flows transform into material and                The purchase and sale contract is processed into a hash code
information flows, material and information products and             and placed in the blockchain. Banks, real estate agents, land
resources. It means that the process of information logistics        buyers can confirm the authenticity of this purchase agreement
creates additional material and information resources. The           and other documents through their unique digital signature
overall objective of information logistics at the enterprise is to   (hash of the blockchain).
ensure the competitiveness of the enterprise and its sustainable
development.                                                             The algorithm for using the blockchain is following. First,
                                                                     the public key interface informs all interested parties. Second,
   Particular tasks of information logistics include:                they create a protocol that links as buyer to seller, as real estate,
•        ensuring optimal use of limited material and                payment, bank, smart contract and registry. Third, they use
information resources;                                               specially improved smartphones that can process digital
                                                                     signatures, personal computers and other gadgets to interact




                                                                                                                                       72
with the phone through some form of authentication. All this             A blockchain is a chain of data blocks where each block
can work within the framework of the blockchain.                     links to the previous one. New blocks always add strictly to the
                                                                     end of the chain [40, 41, 42].
    In Moscow, they intend to extensively use blockchain
technology in the city management, in particular, in the spheres         All users form a distributed database, each computer stores
of housing and communal services, health care, cadastral             a complete copy of all blocks. It is impossible to destroy the
registration, subsidying and state purchase contracts [27].          data in such a database, because you have to destroy all the
                                                                     computers located in different places. Each user strengthens
         V.     BLOCKCHAIN AND INTERNET OF THINGS                    this network. In a distributed network database, there are no
                                                                     moderators, supervisors, managers, organizers, as all users are
    Another important area where they can effectively use            equal. They can use the cryptography, which increases the data
blockchain together with geospatial technologies is the Internet     security, to transfer data.
of things [28, 29, 30]. Today, the Internet of things creates an
image to be a complex network of people and objects that
transmit data to each other [31, 32]. Some questions about it                                 VIII. CONCLUSION
appear. What kind of data are there? How are they verified,              The use of blockchain technology allows fully controlling
how are things and people protected from illegal access and          the spatial movement of produced goods, and in combination
processes? For example, can a car with an anti-theft alarm           with spatial positioning technology eliminates possible thefts.
system be stolen? So far, there is not any anti-theft alarm          Blockchain will help to reduce the cost of controlling the
system, which guarantees it. The use of blockchain technology        distribution of products, increase the level of trust between the
can solve this problem. If the chain contains the anti-theft data,   participants of the exchange in logistics transportations.
tone person cannot change them, since all transactions in the
blockchain are stored in all previous and subsequent data.
Blockchain and smart contracts can be the basis of a managed,
transactional Internet, where machines observe rules and                                           REFERENCES
follow algorithms, provide the kinds of verification usually         [1]  E.A. Khrisanova, “Development of methods for protecting a distributed
associated with a third party. Business process management                geoinformation     database”      [“Razrabotka     metodiki  zashchity
can engage in the internal process of each object and act as web          raspredelennoi geoinformatsionnoi bazy dannykh”], Slavic forum
                                                                          [Slavyanskii forum], no. 3 (17), pp. 163 – 167, 2017.
on one side of the transaction or the other. Smart contracts
extend the ability to manage business processes outside the          [2] Probabilistic Modeling in System Engineering / By ed. A. Kostogryzov
                                                                          – London: IntechOpen, 2018. 278 p. DOI: 10.5772/intechopen.71396.
walls of the organization and can become intermediaries
                                                                     [3] Markov A.S., Fadin A.A., Tsirlov V.L. Multilevel Metamodel for
between two business partners.                                            Heuristic Search of Vulnerabilities in the Software Source Code,
                                                                          International Journal of Control Theory and Applications, 2016, vol. 9,
          VI.   BLOCKCHAIN AND GEOSPATIAL DATA                            No 30, pp. 313-320.
                                                                     [4] Zegzhda, P., Zegzhda, D., Pavlenko, E., Dremov, A. Detecting Android
   Imagine a traveler in a public transport system who uses a             application malicious behaviors based on the analysis of control flows
smart mobile with tokens. When a person takes a bus, the                  and data flows (2017) ACM International Conference Proceeding Series,
crypto-spatial layer marks the getting on and getting off point           pp. 280-286. DOI: 10.1145/3136825.3140583
and automatically charges from the traveler's spatial wallet and     [5] Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Y. Ensuring
credits to the transport company's spatial wallet. There is no            Secure Data Input/Output Operations for SGX ENCLAVE (2018)
                                                                          Automatic Control and Computer Sciences, 52 (8), pp. 1036-1041.
need to use cards or recharge cards. Debits and credits are               DOI: 10.3103/S0146411618080321
counted instantly and the transaction automatically accords          [6] D. Maevsky, V. Kharchenko, M. Kolisnyk, and E. Maevskaya,
with the blockchain [25, 29, 33, 34, 35].                                 “Software reliability models and assessment techniques review:
                                                                          Classification issues”, 2017 9th IEEE International Conference on
    They can monitor movements and transfer of goods and                  Intelligent Data Acquisition and Advanced Computing Systems:
automatically calculate and debit the cost of shipping. Data can          Technology and Applications (IDAACS), IEEE, pp. 894–899, 2017.
include satellite data, maps, land plot data, 3D visualization            DOI: 10.1109/IDAACS.2017.8095216
data, etc. In this way, they can easily estimate and distribute      [7] E.G.Vorobiev, S.A. Petrenko, I.V. Kovaleva, and I.K. Abrosimov,
spatial data of satellites, drones, and even terrain                      “Organization of the entrusted calculations in crucial objects of
measurements. They can integrate data security through tokens.            informatization under uncertainty”, Proceedings of 2017 20th IEEE
                                                                          International Conference on Soft Computing and Measurements, SCM,
                                                                          no. 20, pp. 299 – 300, 2017. DOI: 10.1109/SCM.2017.7970566.
                VII. DISCUSSION OF RESULTS                           [8] Markov A., Barabanov A., Tsirlov V. Models for Testing Modifiable
                                                                          Systems. In Book: Probabilistic Modeling in System Engineering, by ed.
    Human activity continuously connects with the flow of                 A.Kostogryzov. IntechOpen, 2018, Chapter 7, pp. 147-168. DOI:
data, documents and money. It is very difficult to control this           10.5772/intechopen.75126.
process. Employees of banks, shops very often tend to abuse          [9] Markov A., Barabanov A., Tsirlov V. Periodic Monitoring and Recovery
their official status.                                                    of Resources in Information Systems. In Book: Probabilistic Modeling
                                                                          in System Engineering, by ed. A.Kostogryzov. IntechOpen, 2018,
    Blockchain is a technology of reliable distributed data               Chapter 10, pp. 213-231. DOI: 10.5772/intechopen.75232.
storage and the data can be of any types of human activity           [10] Petrenko, A.S., Petrenko, S.A., Makoveichuk, K.A., Chetyrbok, P.V.:
products [36, 37, 38].                                                    Protection Model of PCS of Subway from Attacks Type «Wanna cry»,
                                                                          «Petya» and «Bad rabbit» IoT. In: Proceedings of the 2018 IEEE
                                                                          Conference of Russian Young Researchers in Electrical and Electronic




                                                                                                                                             73
     Engineering (ElConRus 2018). IEEE, pp. 945 – 949 (2018). DOI:              [27] S.A. Pavlov, “Perfection of technology of formation of territorial zones
     10.1109/EIConRus.2018.8317245.                                                  of objects of technogenic safety at introduction of the state ground
[11] M. Edwards, R. Larson, B. Green, A. Rashid, and A. Baron, “Panning              cadastre” [Sovershenstvovanie tekhnologii formirovaniya territorialnykh
     for gold: Automatically analysing online social engineering attack              zon      obieektov     tekhnogennoi        bezopasnosti pri     vvedenii
     surfaces”, Computers & Security, vol. 69, pp. 18–34, 2017.                      gosudarstvennogo zemelnogo kadastra] Slavic forum [Slavyanskii
                                                                                     forum], no. 3 (17), pp. 144 – 149, 2017.
[12] V.N. Ivanova, A.L. Poltarykhin, A. Szromnik, and O. Anichkina,
     “Economic        policy    for   country’s   digitalization:   a   case    [28] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, A.V. Antonenkova, and
     study”, Entrepreneurship and Sustainability Issues, no. 7(1), pp. 649-          N.A. Zhenova, “Performance evaluation of the electronic commerce
     661, 2019.                                                                      systems”, Espacios, vol. 38, no. 62, p.11, 2017.
[13] B.I. Skorodumov, O.B. Skorodumova, and L.F. Matronina “Research of         [29] S.V. Shaitura, A.M. Minitaeva, K.V. Ordov, and V.V. Shaparenko,
     Human Factors in Information Security”, Modern Applied Science, vol.            “Virtual enterprises in a spatial economy”, International Journal of
     9, no. 5, pp. 287–294. 2015.                                                    Recent Technology and Engineering (IJRTE), vol. 7, no. 6, pp. 719 –
                                                                                     724, 2019.
[14] K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “Advanced social
     engineering attacks” Journal of Information Security and Applications,     [30] S.V. Shaitura, K.V. Ordov, I.G. Lesnichaya, Yu.D. Romanova, and S.S.
     vol. 22, pp. 113–122, 2015.                                                     Khachaturova “Services and mechanisms of competitive intelligence on
                                                                                     the internet”, Espacios, vol. 39, no. 45, p. 24, 2018.
[15] F. Mouton, L. Leenen, and H.S. Venter, “Social engineering attack
     examples, templates and scenarios”, Computers & Security, ] vol. 59,       [31] J.Y. Astier, I.Y. Zhukov, O.N. Murashov, “Smart Building Management
     pp. 186–209, 2016.                                                              Systems and Internet of Things. IT Security”, [S.l.], vol. 24, no. 3, pp.
                                                                                     18−29, july 2017. ISSN 2074-7136.
[16] Nader Sohrabi Safa, Rossouw von Solms, and Lynn Futcher, “Human
     aspects of information security in organisations”, Computer Fraud &        [32] Malte Burkert, Heiko Krumm, and Christoph Fiehe, “Technical
     Security, no. 2, pp. 15–18, 2016.                                               management system for dependable Building Automation Systems”,
                                                                                     2015 IEEE 20th Conference on Emerging Technologies & Factory
[17] S.V. Belim, and N.F. Bogachenko, “Distribution of Cryptographic Keys
                                                                                     Automation        (ETFA),       pp.      1     -     8,  2015.      DOI:
     in Systems with a Hierarchy of Objects”, Automatic Control and
                                                                                     10.1109/ETFA.2015.7301656
     Computer Sciences, vol. 50, no. 8, pp. 777–786, 2016.
                                                                                [33] Zhaohui Wu, Jianwei Yin, Shuiguang Deng, Jian Wu, Ying Li, and
[18] A. Barabanov, and A. Markov, “Modern Trends in The Regulatory
                                                                                     Liang Chen, “Modern Service Industry and Crossover Services:
     Framework of the Information Security Compliance Assessment in
                                                                                     Development and Trends in China”, IEEE Transactions on Services
     Russia Based on Common Criteria”, Proceedings of the 8th International
                                                                                     Computing, vol. 9, no. 5, pp. 664-671, 2016. DOI:
     Conference on Security of Information and Networks (Sochi, Russian
                                                                                     10.1109/TSC.2015.2418765
     Federation, September 08-10, 2015). SIN '15. ACM New York, NY,
     USA, 2015, pp. 30-33. DOI: 10.1145/2799979.2799980.                        [34] Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara “Low Power
                                                                                     Wide Area Networks: An Overview”, IEEE Communications Surveys &
[19] A. Markov, D. Luchin, Y. Rautkin, and V. Tsirlov, “Evolution of a               Tutorials, vol. 19, no. 2, pp. 855-873, 2017. DOI:
     Radio Telecommunication Hardware-Software Certification Paradigm in             10.1109/COMST.2017.2652320
     Accordance with Information Security Requirements”, Proceedings of
     the 11th International Siberian Conference on Control and                  [35] Keyi Zhang, and Alan Marchiori, “Crowdsourcing low-power wide-
     Communications (Omsk, Russia, May 21-23, 2015). SIBCON-2015.                    area IoT networks”, 2017 IEEE International Conference on Pervasive
     IEEE, 1-4. DOI: 10.1109/SIBCON.2015.7147139.                                    Computing and Communications (PerCom), pp. 41-49, 2017. DOI:
                                                                                     10.1109/PERCOM.2017.7917849
[20] V. Yemelyanov, N. Yemelyanova and A. Nedelkin, “Neural network for
     decision support to determine the operating mode of lined equipment”,      [36] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable
     Paper presented at the MATEC Web of Conferences, p.224, 2018.                   SCADA in view of acquiring multi-protocol smart grid devices”, 2016
     doi:10.1051/matecconf/201822404005                                              2nd International Conference on Advances in Electrical, Electronics,
                                                                                     Information, Communication and Bio-Informatics (AEEICB), pp. 182 –
[21] A. Boiko, V. Shendryk, and O. Boiko, “Information systems for supply            187, 2016. DOI: 10.1109/AEEICB.2016.7538269
     chain management: uncertainties, risks and cyber security”, Procedia
     Computer Science, vol. 149, pp. 65 – 70, 2019. DOI:                        [37] Saveen A. Abeyratne, and Radmehr P. Monfared, “Blockchain ready
     10.1016/j.procs.2019.01.108.                                                    manufacturing supply chain using distributed ledger”, International
                                                                                     Journal of Research in Engineering and Technology, no. 05 (09), pp. 1–
[22] G. G. Trubach, “Environment development for monitoring commodity                10, 2016.
     and transport flows based on blockchain technologies” [“Razrabotka
     sredy monitoringa tovarno-transportnykh potokov na osnove                  [38] A. B. Ayed, “A conceptual secure blockchain-based electronic voting
     tekhnologii blokchein”], Collection of works of the 74th scientific             system”, International Journal of Network Security & Its Applications,
     conference of students and postgraduates of the Belarusian state                vol. 9, no. 3, 2017.
     University: in 3 parts [Sbornik rabot 74-i nauchnoi konferentsii           [39] R.Hanifatunnisa, and B. Rahardjo, “Blockchain based e-voting recording
     studentov i aspirantov Beloruskogo gosudarstvennogo universiteta: v 3           system design (2018)”, Proceeding of 2017 11th International
     chastyakh], pp. 96-99, 2017.                                                    Conference on Telecommunication Systems Services and Applications,
[23] V. Tatarinov, and A. Kirsanov, “Enhancement of monitoring systems for           TSSA 2017, pp. 1-6, January 2018.
     the transport of dangerous goods by road”, 2019 IOP Conf. Ser.: Mater.     [40] D. Kirilova, N. Maslov, T. Astakhova, “Prospects for the introduction of
     Sci. Eng. 492 012017                                                            blockchain technology into a modern system of education”,
[24] V.YA. Tsvetkov, “Logistics information distributed systems”                     International Journal of Open Information Technologies, vol. 6, no. 8,
     [“Logistika informatsionnykh raspredelennykh sistem”], Prospects of             2018.
     science and education [Perspektivy nauki i obrazovaniya], no. (4)22, pp.   [41] F. Caldieraro, J. Z. Zhang, M. Jr. Cunha, and J. D. Shulman, “Strategic
     18 -22, 2016.                                                                   Information Transmission in Peer-to-Peer Lending Markets”, Journal of
[25] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, T.A. Vintova, A.M.                    Marketing, vol. 82, no. 2, pp. 42- 63, March 2018
     Minitaeva, and V.M. Feoktistova, “Geoinformation services in a spatial     [42] W. Liu and L-Q Xia, “An Evolutionary Behavior Forecasting Model for
     economy”, International Journal of Civil Engineering and Technology,            Online Lenders and Borrowers in Peer-to-Peer Lending.” AsiaPacific
     vol. 9, no. 22, pp. 829-841, 2018.                                              Journal of Operational Research, vol. 34, no. 01, 2017.
[26] V.V. Dik, and S.V. Shaitura, “Life cycle of information systems”
     [ZHiznennyi tsikl informatsionnykh sistem], Vestnik MGTU MIREA,
     no. 3 (4), pp. 116 – 129, 2014.




                                                                                                                                                          74