DSpace Repository

Migration Model for un secure Database driven Software System to Secure System using Cryptography

Show simple item record

dc.contributor.author Mr. Mahendra Kumar Shrivas, Dr. Augustine Amoako,Mr. Samuel Odame Boateng,Dr. Thomas Yeboah
dc.date.accessioned 2016-06-22T11:28:52Z
dc.date.accessioned 2022-01-16T06:45:23Z
dc.date.available 2016-06-22T11:28:52Z
dc.date.available 2022-01-16T06:45:23Z
dc.date.issued 2016-06-22
dc.identifier.issn 2016022
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/447
dc.description.abstract Most of the software systems are having role based operation model where each user, based on their job role having some functionality to perform. Role based access privileges are basic security implementation in most of the database driven software system. Users or Operators of the system enters the records into the software system using graphical user interface (GUI), which is stored into the database after data validation. Generally administrators are having all privileges and can perform all system and functional operations. Administrator can be divided into following categories:- 1. Software System Administrators 2. Network Administrators 3. Server Administrators 4. Database Administrators Network, Server & Database administrators are more powerful than software system administrator as they are having full privileges and can able to do changes in the systems which is almost untraceable unless complete system audit is performed to trace the mismatch of manual record and software system record. Data in the databases are unsecure as confidential organization record is stored on servers in unencrypted form, which is not secure from insider and outsider attack. This research work shows how to protect data confidentiality even when attackers get access to all the data stored on servers. Also authors are proposing a migration model which can be used to secure existing unsecure database driven software system. As a case study authors have taken an existing software system and applying AES based encryption and decryption with the key initialization vector (IV) and Code Block Chaining (CBC) mode with PKCS 5 padding because it has a very high security performance. en_US
dc.language.iso en en_US
dc.subject Algorithms, Authentication, Cipher, Cryptography, CBC, PKCS5, Encryption, Decryption, Database Security, AES en_US
dc.title Migration Model for un secure Database driven Software System to Secure System using Cryptography en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account