SYSTEMATIC ANALYSIS OF THE SECURITY OF STATE ELECTRONIC REGISTERS AND PERSONAL DATABASES
DOI:
https://doi.org/10.28925/2663-4023.2025.28.735Keywords:
data protection; databases; personal data; electronic state registers; personal databases; access control; information technologies; digital infrastructure of the state.Abstract
. The paper considers the issue of protecting personal databases of electronic state registers. These data are used in information and analytical and information and communication systems in order to optimize record keeping and ensure the digital sovereignty of the state. During war and the danger of various types of threats, the most valuable and at the same time vulnerable to leakage of personal data of citizens are state registers, portals of electronic services, databases of personal data of state organizations and institutions. Inaccessibility of electronic registers due to unauthorized access, blocking and damage to personal databases of citizens poses a serious threat to the digital sovereignty of the state. The purpose of the article is a systematic analysis of the criteria for protecting databases of electronic registers of citizens and the development of a comprehensive system of access control and protection of personal data in state registers. The components of the state digital infrastructure system and the role of interconnected electronic systems, registers and personal data bases in ensuring the rights and freedoms of citizens are considered. A comprehensive system of access control and protection of personal databases has been developed. This system considers various options for placing personal data bases, communication access control systems, possible tools for ensuring information security and means for preventing leakage and loss of data. The combination of components forms a comprehensive system of access control and personal data protection, which not only promotes data security, but also provides convenient and fast access to government services for citizens. For maximum effect, it is important to integrate various tools, access control systems and security measures that help ensure the reliability and security of databases. A comprehensive approach to protecting personal databases allows minimizing the risk of information leakage and unauthorized access. The implementation of a comprehensive system of access control and protection of personal data for state registers is an appropriate and necessary step to ensure a high level of information security.
Downloads
References
Electronic registers: state in Ukraine: col. Monographs. (2021). Kyiv: NAS of Ukraine, M.V. Ptukha Institute of Demography and Social Research. https://www.idss.org.ua/arhiv/registers3.pdf
Gladun, O. M., Pugacheva, M. V., & Vynogradova, M. V. (2021). Electronic registers: European experience in creation and use: collection of monographs. Kyiv: NAS of Ukraine, M. V. Ptukha Institute of Demography and Social Research. https://idss.org.ua/arhiv/registers.pdf
Shafi, M., Fatima, M., Amna, M., Aryendra, D., & Manish, V. (2024). Safeguarding Data Privacy: Enhancing Cybersecurity Measures for Protecting Personal Data in the United States. Computer Security and Reliability, 15.
Polotai, O., & Puzyr, А. (2024). Analysis of means of prevention of leakage of confidential information at enterprises, on the example of the DLP system. Bulletin of Lviv State University of Life Safety, 30, 134–144. https://doi.org/10.32447/20784643.30.2024.13.
Duggineni, S. (2023). Impact of Controls on Data Integrity and Information Systems. Science and Technology, 13(2), 29–35. https://doi.org/10.5923/j.scit.20231302.04
Sargiotis, D. (2024). Data Security and Privacy: Protecting Sensitive Information. In: Data Governance, 217–245. Springer. https://doi.org/10.1007/978-3-031-67268-2_6
Olusegun, J., Ok, E., & Barnty, B. (2025). Data Security and Privacy Challenges in IoT and RFID-Based Healthcare Systems. https://www.researchgate.net/publication/388891522
Baihaqi, M., Handayani, S., Sensuse, D., Lusa, S., Adi, P., & Indriasari, S. (2024). Cybersecurity Implementation on Smart Government in Smart City: A Systematic Review. International Journal on Advanced Science, Engineering and Information Technology, 14, 1936–1943. https://doi.org/10.18517/ijaseit.14.6.19874
Hudson, J. (2024). Revolutionizing Database Security with AI: Exploring the Latest Advances in Cybersecurity. Database Security, 23. https://doi.org/10.13140/RG.2.2.30396.24964
Chiang, D. & Hoesin, Z. (2024). Ensuring Equality Before the Law and Personal Data Protection through Implementation of AI Integration in Single Identification Number Systems: A Positivism Philosophy Perspective. Devotion: Journal of Research and Community Service, 5(11), 1347–1361. https://www.doi.org/10.59188/devotion.v5i11.20688
Sani, A., Olajide, A., Ogunsanya, V., Oyebode, D., Alfred, J., Oseni, T., Jegede, E., Nwaogu, N., & Abbas, R. (2025). Cybersecurity Challenges in Digitizing Government Administration. Proceedings of the International Academy of Sciences, 2(1), 1–13. https://www.doi.org/rpc/2025/rpc.pias/00123 13
Bakayev, О. О. & Suskyy, H. V. (2024). Methods of protecting personal information in information systems. Telecommunication and Informative Technologies, 2(83), 68–77. https://doi.org/10.31673/2412-4338.2024.028190
Ivanchenko, I. & Pedchenko, Y. (2024). Structural model of the cybersecurity assessment system of cloud services of information infrastructure objects. Electronic Professional Scientific Journal “Cybersecurity: Education, Science, Technique”, 1(25), 505–515. https://doi.org/10.28925/2663-4023.2024.25.505515
Balatska, V., & Poberezhnyk, V. (2024). The concept of applying blockchain technologies to increase the security of personal data of the “Diya” platform: compliance with the requirements of the GDPR and ukrainian legislation. Electronic Professional Scientific Journal “Cybersecurity: Education, Science, Technique”, 2(26), 268–290. https://doi.org/10.28925/2663-4023.2024.26.681
Zadereyko, O. V., Troyanskyi, O. V., Chanyshev, R. I., & Dyka, A. I. (2022). Conceptual foundations of protecting the information sovereignty of Ukraine: monograph; 2nd ed., revised and supplemented. Odesa: Phoenix. https://doi.org/10.32837/11300.22733
Dmytryshyn, M. V. & Zhurakivska, M. I. (2020). Leakage of personal data in electronic governance: realities and problems of state websites and portals. Public management and administration in Ukraine, 20, 111–119. https://doi.org/10.32843/pma2663-5240-2020.20.20
Gorodianska L., & Tsiukalo L. (2021). Information security of small businesses in the context of digitalization. Collection of Scientific Works of the Military Institute of Kyiv National Taras Shevchenko University, (70), 105–114. https://doi.org/10.17721/2519-481X/2021/70-11
Dziundziuk, B. (2023). Using blockchain technology as infrastructure in public sector. Electronic scientific journal “Derzhavne upravlinnya: udoskonalennya ta rozvytok”, 4, 1–18. http://doi.org/10.32702/2307-2156.2023.4.9
Pazyuk, A. & Slabko, T. (2024). Using commercial cloud technologies for processing data from state registers of Ukraine. IFES Ukraine. https://www.ifesukraine.org/wp-content/uploads/2024/01/ifes-ukraine-the-use-of-commercial-cloud-technologies-for-processing-data-from-state-registers-of-ukraine-1.pdf
Zadereyko, О., Trofymenko, O., Prokop, Yu., Loginova, N., Dyka, A., & Kukharenko, S. (2022). Research of potential data leaks in information and communication systems. Radioelectronic and computer systems, 4(104), 64–84. https://doi.org/10.32620/reks.2022.4.05
Zadereyko, A., Prokop, Y., Trofymenko, O., Loginova, N., & Plachinda О. (2021). Development of an algorithm to protect user communication devices against data leaks. Eastern-European Journal of Enterprise Technologies, 1/2 (109), 24–34. https://doi.org/10.15587/1729-4061.2021.225339
Zadereyko О., Trofymenko, O., Loginova, N., Loboda, Y., & Prokop, Y. (2024). Analysis of potential personal data leaks in web browsers. Electronic Professional Scientific Journal “Cybersecurity: Education, Science, Technique”, 3(23), 199–212. https://doi.org/10.28925/2663-4023.2024.23.199212
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Олександр Задерейко, Олена Трофименко, Світлана Єленич, Наталія Логінова, Володимир Гура

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.