Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/447
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMr. Mahendra Kumar Shrivas, Dr. Augustine Amoako,Mr. Samuel Odame Boateng,Dr. Thomas Yeboah
dc.date.accessioned2016-06-22T11:28:52Z
dc.date.accessioned2022-01-16T06:45:23Z-
dc.date.available2016-06-22T11:28:52Z
dc.date.available2022-01-16T06:45:23Z-
dc.date.issued2016-06-22
dc.identifier.issn2016022
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/447-
dc.description.abstractMost of the software systems are having role based operation model where each user, based on their job role having some functionality to perform. Role based access privileges are basic security implementation in most of the database driven software system. Users or Operators of the system enters the records into the software system using graphical user interface (GUI), which is stored into the database after data validation. Generally administrators are having all privileges and can perform all system and functional operations. Administrator can be divided into following categories:- 1. Software System Administrators 2. Network Administrators 3. Server Administrators 4. Database Administrators Network, Server & Database administrators are more powerful than software system administrator as they are having full privileges and can able to do changes in the systems which is almost untraceable unless complete system audit is performed to trace the mismatch of manual record and software system record. Data in the databases are unsecure as confidential organization record is stored on servers in unencrypted form, which is not secure from insider and outsider attack. This research work shows how to protect data confidentiality even when attackers get access to all the data stored on servers. Also authors are proposing a migration model which can be used to secure existing unsecure database driven software system. As a case study authors have taken an existing software system and applying AES based encryption and decryption with the key initialization vector (IV) and Code Block Chaining (CBC) mode with PKCS 5 padding because it has a very high security performance.en_US
dc.language.isoenen_US
dc.subjectAlgorithms, Authentication, Cipher, Cryptography, CBC, PKCS5, Encryption, Decryption, Database Security, AESen_US
dc.titleMigration Model for un secure Database driven Software System to Secure System using Cryptographyen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science

Files in This Item:
File Description SizeFormat 
Paper 5.pdf286.05 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.