The constant increase in the amount of information processed in automated control systems, which simply does not physically fit in the internal long-term memory of its processing means, necessitates the use of data storage systems. One of the main requirements for existing data storage systems, regardless of the structure of their construction and principles of operation, is to ensure the security of the information stored in them.
In turn, one of the measures to ensure the security of information in data storage systems under conditions of random errors and destructive actions of an attacker (unauthorized alteration of data (for example, through the operation of malicious code) or failure of a part of the carrier (for example, individual cells, sectors)) protection of their integrity. The task of protecting the integrity of data is difficult because of its complexity, as it includes not only the control of data integrity, but also its maintenance, which implies the restoration of data whose integrity has been compromised for various reasons. The most popular solution is integrated data integrity protection associated with the simultaneous solution of control and data integrity tasks, which is achieved by consistently applying first cryptographic transformation to data, and then data backup, which is known to lead to the introduction of high redundancy. The developed method of monitoring and ensuring the integrity of information in data storage systems allows reducing the input redundancy by aggregating existing solutions for a given level of information security. To control the integrity of the data in the presented method, a hash function was selected, which is necessary when storing data under attacker's conditions, and the data recovery procedure is performed using redundant modular codes, the use of which in combination with the hash function allows the construction of a unique scheme provide minimal redundancy.