DATA ENCRYPTION IN EDMS BASED ON BLOCKCHAIN TECHNOLOGIES
Abstract
The article discusses the issues of storing confidential and personal data in electronic document management systems. The possibility of storing confidential and personal data in electronic document management systems based on blockchain technologies is considered. One of the key characteristics of blockchain is the openness of data. All transactions entered into the blockchain are visible to all network participants. This can become a serious problem when storing sensitive data, such as personal information, bank details or medical history. storage of personal data, since the blockchain platform is open. Various methods are used to hide information, including homomorphic encryption, ZK-SNARKs (zero-knowledge proofs), specialized hardware add-ons, and other methods. Previously, the authors presented a protocol for storing confidential data in blockchain systems using hybrid encryption. The paper focuses on the use of symmetric cryptography algorithms in conjunction with elliptic curve cryptography, as it is widely used in modern blockchain platforms such as Bitcoin and Ethereum. The reason for choosing elliptic curves is their high cryptographic strength with a relatively short key length, computational efficiency, and low resource requirements, which is especially important for decentralized networks with limited node computing capabilities. The article presents the results of modeling the process of generating encrypted confidential data using various encryption algorithms: ECC ElGamal, ECDH-AES, ECDH-Magma (in CTR and CBC modes). Experiments have shown that the most effective solution is to use the hybrid ECDH-AES algorithm with AES-NI support, which provides high data processing speed while maintaining a high level of security. The analysis suggests that the use of hybrid encryption in blockchain systems strikes a balance between the need to ensure privacy and preserve the key benefits of the technology – decentralization, immutability, and transparency for authorized participants. Possible formats of data presentation are considered, an experimental comparison of various encryption algorithms that can be used in electronic document management systems based on blockchain technologies is carried out.
References
1. Kondyrev Dmitriy. Metod obespecheniya konfidentsial'nosti dannykh na osnove ZK-SNARK
[A method for ensuring data confidentiality based on the ZK-SNARK], Prikladnaya diskretnaya ma-tematika. Prilozhenie [Applied discrete mathematics. Appendix], 2021, 14, pp. 132-134.
2. Bender A., Kats Dzh., Morselli R. Kol'tsevye signatury: bolee strogie opredeleniya i konstruktsii bez sluchaynykh orakulov [Ring signatures: stricter definitions and constructions without random oracles], Khalevi S., Rabin T. (ed.), Teoriya kriptografii. TCC 2006. Konspekty lektsiy po informatike [Theory of cryptography. TCC 2006. Lecture Notes on Computer Science]. Vol. 3876. Springer, Berlin, Gey-del'berg, 2006. Available at: https://doi.org/10.1007/11681878_4.
3. Ziskind G., Natan O. and Pentland A. Detsentralizatsiya konfidentsial'nosti: ispol'zovanie blokcheyna dlya zashchity personal'nykh dannykh [Decentralizing Privacy: Using Blockchain to Protect Personal Data], Seminary IEEE po bezopasnosti i konfidentsial'nosti, 2015 g. San-Khose, Kaliforniya, SShA, 2015 g. [IEEE Seminars on Security and Privacy, 2015, San Jose, California, USA, 2015], pp. 180-184. Document number: 10.1109/ SPW.2015.27.
4. Guggenberger Tobias, Shlatt Vinsent, Shmid Dzhonatan, Nil's Urbakh. Strukturirovannyy obzor atak na sistemy blokcheyn [Structured overview of attacks on blockchain systems], 2021. Available at: https://www.researchgate.net/publication/352960457_A_Structured_Overview_of_Attacks_on_Blockchain_Systems (accessed 22 March 2025).
5. Aldiafla I., et al. Proektirovanie i realizatsiya bezopasnogo khranilishcha dannykh na osnove smart-kontrakta Ethereum [Designing and implementing a secure data warehouse based on the Ethereum smart contract], Applied Sciences, 2023, Vol. 13, No. 9.
6. Rakhman M., Bayardi F., Guidi B., Richchi L. Zashchita personal'nykh dannykh s pomoshch'yu smart-kontraktov [Protection of personal data using smart contracts], Mater. IEEE Int. Conf. Blockchain [Pro-ceedings of the IEEE Int. Conf. Blockchain], 2019. Available at: https://ieeexplore.ieee.org/document/ 8971241 (accessed 22 March 2025).
7. Kiran A., Dkharanikota S. and Basava A. Kontrol' dostupa k dannym na osnove blokcheyna s ispol'zovaniem smart-kontraktov [Blockchain-based data access control using smart contracts], TENCON, konferentsiya IEEE Region 10 (TENCON), 2019–2019 gg., Kochi, Indiya, 2019 g. [TENCON, IEEE Region 10 Conference (TENCON), 2019-2019, Kochi, India, 2019], pp. 2335-2339. DOI: 10.1109/TENKON.2019.8929451.
8. Romanenko K.S., Ishchukova E.A. Algoritm khraneniya privatnykh dannykh v blokcheyn sistemakh [Algorithm for storing private data in blockchain systems], Sovremennye metody, sredstva i tekhnologii zashchity informatsii: Sb. trudov XV Mezhdunarodnoy nauchno-prakticheskoy konferentsii imeni Olega Borisovicha Makarevicha (Taganrog, 11–15 sentyabrya 2024 g.) [Proceedings of the XV International Scientific and Practical Conference Named After Oleg Borisovich Makarevich (Taganrog, September 11–15, 2024)]. Rostov-on-Don; Taganrog: Izd-vo YuFU, 2024.
9. Ishchukova E.A., Panasenko S.P., Romanenko K.S., Salmanov V.D. Kriptograficheskie osnovy blok-cheyn-tekhnologiy [Cryptographic foundations of blockchain technologies]. Moscow: OOO "DMK Press. Elektronnye knigi", 2022, 301 p. ISBN 978-5-9706-0865-4.
10. 1S:Dokumentooborot 8 [1C:Document management 8]. Available at: https://v8.1c.ru/doc8/ (accessed 22 March 2025).
11. SED «Delo» [SED "Delo"]. Available at: https://eos.ru/eos_products/eos_delo/sed-delo/ (accessed 22 March 2025).
12. Kontur Diadok [Contour of Diadems]. Available at: https://www.diadoc.ru/ (accessed 22 March 2025).
13. Platforma Docsvision [Docsvision platform]. Available at: https://docsvision.com/ (accessed 22 March 2025).
14. Sitnikov D.S., Gayrbekov S.M.K. Analiz vozmozhnogo ispol'zovaniya biblioteki kriptograficheskikh protsedur OpenSSL [Analysis of the possible use of the OpenSSL cryptographic procedure library], In-formatsionnye tekhnologii v nauke, biznese i obrazovanii. Problemy obespecheniya tsifrovogo su-vereniteta gosudarstva: Mater. XIII Mezhdunarodnoy nauchno-prakticheskoy konferentsii studentov, aspirantov i molodykh uchenykh, Moskva, 26 noyabrya 2021 g. [Information technologies in science, business and education. Problems of ensuring the digital sovereignty of the state: Proceedings of the
XIII International Scientific and Practical Conference of Students, Postgraduates and Young Scientists, Moscow, November 26, 2021], under the general ed. A.M. Prokhorova, A.V. Tsaregorodtseva. Mos-cow: Moskovskiy gosudarstvennyy lingvisticheskiy universitet, 2022, pp. 85-91.
15. Belyavskiy D. Rossiyskaya kriptografiya v svobodnom PO [Russian cryptography in free software], Pyatnadtsataya konferentsiya razrabotchikov svobodnykh programm: Tezisy dokladov. Kaluga,
28–30 sentyabrya 2018 g. [The Fifteenth Conference of Free Software Developers : abstracts. Kaluga, September 28-30, 2018], ed. by V.L. Chernyy. Kaluga: OOO "MAKS Press", 2018. – S. 38-39.
16. Nikiforov A.N., Matveeva N.N. Issledovanie metodov zashchity informatsii s pomoshch'yu kriptografii [Investigation of information security methods using cryptography], Sovremennye informatsionnye tekhnologii, innovatsii i molodezh' - «SITIM-2024»: Mater. Vserossiyskoy studencheskoy nauchno-prakticheskoy konferentsii s mezhdunarodnym uchastiem, Yakutsk, 22-23 marta 2024 g. [Modern in-formation technologies, innovations and youth - SITIM-2024 : proceedings of the All-Russian Student Scientific and Practical Conference with international participation, Yakutsk, March 22-23, 2024]. Ul'yanovsk: IP Ken'shenskaya Viktoriya Valer'evna (Izd-vo "Zebra"), 2024, pp. 151-155.
17. OpenSSL. Available at: https://openssl-library.org/ (accessed 22 March 2025).
18. Gafurov I.R. Metody optimizatsii programmnoy realizatsii blochnogo shifra "Magma" [Methods of op-timizing the software implementation of the block cipher "Magma"], Uchenye zapiski UlGU. Seriya: Matematika i informatsionnye tekhnologii [Scientific notes of the USU. Series: Mathematics and Infor-mation Technology], 2022, No. 1, pp. 8-16.
19. Tezcan C. Optimization of Advanced Encryption Standard on Graphics Processing Units, IEEE Access, 2021, Vol. 9, pp. 67315-67326. DOI: 10.1109/ACCESS.2021.3077551.
20. Valamehr J., Tiwari M., Sherwood T. [et al.]. Hardware assistance for trustworthy systems through
3-D integration, Proceedings - Annual Computer Security Applications Conference, ACSAC: 26th An-nual Computer Security Applications Conference, ACSAC 2010, December 6–10, 2010 / sponsors: Ap-plied Computer Security Associates (ACSA). Austin, TX: [s.n.], 2010, pp. 199-210. DOI: 10.1145/1920261.1920292.
21. Lebedev R.K. Primenenie rasshireniy protsessornoy arkhitektury x86 dlya zatrudneniya analiza pro-grammnogo koda [The use of extensions of the x86 processor architecture to complicate the analysis of program code], MNSK-2021: Mater. 59-y Mezhdunarodnoy nauchnoy studencheskoy konferentsii. No-vosibirsk, 12–23 aprelya 2021 g. [MNSK-2021: Proceedings of the 59th International Scientific Student Conference. Novosibirsk, April 12-23, 2021]. Novosib. nats. issled. gos. un-t. Novosibirsk: Izd-vo NGU, 2021, pp. 12.
22. Pristanskov E.I., Kudryavtsev O.A., Andreev D.E. [et al.]. Analiz apparatnoy podderzhki kriptografii pri postroenii informatsionnoy bezopasnosti vuza [Analysis of hardware support for cryptography in build-ing information security of a university], Upravlenie obrazovaniem: teoriya i praktika [Education Manage-ment: Theory and Practice], 2022, No. 6 (52), pp. 126-132. DOI: 10.25726/h2048-6130-4735-p.








