Journal Highly available systems №3 for 2020 г.
Article in number:
Enlarged functional and information models of the information extraction tool complex with built in privacy elements and integration of extracted data
Type of article: scientific article
DOI: 10.18127/j20729472-202003-03
UDC: 681.3
Keywords: Features of the construction of functional and informational models of the tool complex (TС) are considered in the article. IC is designed to automate the creation and maintenance of specialized software systems for ensuring information security based on the use of privacy extracts when extracting information in systems that implement data intensive use (Systems that implement Data Intensive Domains – DID). The constructed functional and informational TС models do not depend on the hardware and software platform on which this complex is implemented and on specific technical solutions for its construction. Roles of TС users are defined. An enlarged description of the functionality they implement using IС has been completed. Integrated functional and informational models of TС are described. The purpose of their main components is defined. The functional model of TС is considered as a set of functions and actions performed by it in interaction with users as well as the relationships between them which are essential for representing the functionality of the TС and its interaction with other systems. The model is presented in the form of process diagrams (PFDD-diagrams). Their general description with the user actions carried out using TС and user interaction is given along with diagrams. The information model of TС is considered as a set of information objects and the relationships between them that characterize the essential properties and conditions of TС and participate in its interaction with other systems. The information model of TС defines the semantics of data related to the functioning of TС and end software products for TС and includes the basic concepts the relationships between them and the main attributes of the concepts. A generalized description of the model is given in the form of a description of its basic concepts. The results obtained do not depend on the hardware and software platform on which the TС is implemented and specific technical solutions for its construction. They form the methodological basis for the work on the creation of TС. They can be used as a toolkit as well as in the preparation of requirements for TС and in the work on its creation
Authors:

V.I. Budzko – Dr.Sc.(Eng.), Deputy Director, 

Institute of Informatics Problems of FRC CSC RAS (Moscow);

Member of Russian Cryptography Academy;

Professor, 

National Research Nuclear University «MEPhI» (Moscow)

E-mail: vbudzko@ipiran.ru

V.I. Korolev – Dr.Sc.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow); 

Professor, 

Financial University under the Government of the Russian Federation

E-mail: vkorolev@ipiran.ru

V.G. Belenkov – Ph.D.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow) E-mail: vbelenkov@ipiran.ru

Abstract:

Features of the construction of functional and informational models of the tool complex (TС) are considered in the article. IC is designed to automate the creation and maintenance of specialized software systems for ensuring information security based on the use of privacy extracts when extracting information in systems that implement data intensive use (Systems that implement Data Intensive Domains – DID).

The constructed functional and informational TС models do not depend on the hardware and software platform on which this complex is implemented, and on specific technical solutions for its construction.

Roles of TС users are defined. An enlarged description of the functionality they implement using IС has been completed. Integrated functional and informational models of TС are described. The purpose of their main components is defined. The functional model of TС is considered as a set of functions and actions performed by it in interaction with users, as well as the relationships between them, which are essential for representing the functionality of the TС and its interaction with other systems. The model is presented in the form of process diagrams (PFDD-diagrams). Their general description with the user actions carried out using TС and user interaction is given along with diagrams.

The information model of TС is considered as a set of information objects and the relationships between them that characterize the essential properties and conditions of TС, and participate in its interaction with other systems. The information model of TС defines the semantics of data related to the functioning of TС and end software products for TС, and includes the basic concepts, the relationships between them and the main attributes of the concepts. A generalized description of the model is given in the form of a description of its basic concepts.

The results obtained do not depend on the hardware and software platform on which the TС is implemented, and specific technical solutions for its construction. They form the methodological basis for the work on the creation of TС. They can be used as a toolkit, as well as in the preparation of requirements for TС and in the work on its creation.

Pages: 27-45
For citation

Budzko V.I., Korolev V.I., Belenkov V.G. Enlarged functional and information models of the information extraction tool complex with built in privacy elements and integration of extracted data. Highly Available Systems. 2020. V. 16. № 3. P. 27−45. DOI: 10.18127/j20729472-202003-03. (In Russian).

References
  1. Budzko V.I., Belenkov V.G., Korolev V.I. Arkhitektura instrumentalnogo kompleksa izvlecheniya informatsii s uchetom vstroennykh ekstraktov konfidentsialnosti i integratsii izvlechennykh dannykh. Sistemy vysokoi dostupnosti. 2020. T. 16. № 2. S. 5−21. DOI: 10.18127/j20729472-202002-01. (In Russian).
  2. Budzko V.I., Belenkov V.G., Korolev V.I. Osobennosti ispolzovaniya markerov konfidentsialnosti v sistemakh intensivnogo ispolzovaniya dannykh. Sistemy vysokoi dostupnosti. 2019. T. 15. № 2. S. 57−65. DOI: 10.18127/j20729472-201902-06. (In Russian).
  3. Budzko V.I., Belenkov V.G., Korolev V.I. Elementy konfidentsialnosti i perspektivy ikh ispolzovaniya v sistemakh, realizuyushchikh intensivnoe ispolzovanie dannykh. Sistemy vysokoi dostupnosti. 2018. T. 14. № 4. S. 55−60. DOI: 10.18127/j20729472-201804-10. (In Russian).
  4. Promezhutochnyi otchet po NIR «Metody i programmnye sredstva nakopleniya i obrabotki dannykh». IPI RAN. Chast 2. 2017. (In Russian).
  5. Budzko V.I., Belenkov V.G., Korolev V.I. Ob odnom kontseptualnom podkhode k zashchite informatsii v sistemakh, realizuyushchikh DID. Trudy Mezhdunar. nauchno-tekhnich. konf. «Informatsionnye tekhnologii i matematicheskoe modelirovanie sistem 2018». M.: Tsentr informatsionnykh tekhnologii v proektirovanii RAN. 2018. (In Russian).
  6. Budzko V.I., Belenkov V.G., Korolev V.I. Ob osobennostyakh ispolzovaniya sredstv i metodov OIB v sistemakh, realizuyushchikh DID. Trudy Mezhdunar. nauchno-tekhnich. konf. «Informatsionnye tekhnologii i matematicheskoe modelirovanie sistem 2018». M.: Tsentr informatsionnykh tekhnologii v proektirovanii RAN. 2018. (In Russian).
Date of receipt: 15 июля 2020 г.