Message Sharing Database Security Protocol Designing (MSDSP)

Abstract

The objective of this research was to design a security protocol of database manipulation. Stakeholder of this protocol were Security Administrator (SA), Database Client (DC), and Database Administrator (DA). SA was responsible in data encryption and decryption. DA acted just as a data keeper. DC was one who process data manipulation on plain data. Under SA responsibility, cipher text was transformed to secret shares. After that, this secret shares were sent to be kept in many database engines under DA’s management. When DC requested specific record for data processing task, The ID of this record was sent to SA. SA requested this defined record ID to all DA. All DA retrieved ordered record ID from their database engine then sent it back to SA. SA used these secret shares to reconstruct the plain text then sent it to DC in order to perform any processing on plain data. When the processing was ended, SA compiled encrypt the new plain text and do transform this one to a new secret shares and repeat sending them to DA to look after the secret shares again as before. These designed security protocol, especially in data processing, were written as function program prototype. The function program prototype and detail of designed security protocol were sent to five security experts in order to evaluate of its performance and data processing correction. Evaluation result indicates that average appreciation on all evaluation topics were in good level (3.60). Expert’s opinion on possibility of practicable application was about 70.20%.

Authors and Affiliations

Somchai Prakancharoen

Keywords

Related Articles

Development of Management System for Mobile Learning Application on Android (OS) Tablets: Participatory Enhancement of Local Teachers’ Competency

The purposes of this study were to 1) develop the management system for mobile learning application on Android (OS) Tablets; 2) evaluate the effectiveness of the management system for mobile learning application on Andro...

Internet Plagiarism in PhD Papers

The Internet has recently been accused as a potential tool for plagiarism in the research community. This paper investigated plagiarism in thirty PhD. students’ work. Research instruments were a test on participants’ kn...

Determinants of Fraud Based on Islamic Paradigm: Case Study in Islamic Financial Services Cooperatives

Islamic financial institutions conducting its operations based on the principles of Islamic Shariah. In fact, cases of fraud still become a problem to be solved in the Islamic financial institutions. This study examined...

Development of Automation Navigation System of Unmanned Aerial Vehicle with Chua’s Chaotic Model

The actual performance of Automatic Unmanned Aerial Vehicle for searching target in broad topography may cause the coverage aviation and immediately find target problems. In the past research, it had accepted that chaoti...

Internet Usage in Developing an Instrument Evaluation Character Education in the Primary School Based Culture

The aim of this research is to know how far internet usage by teachers in developing an instrument character education evaluation based culture in schools and to develop models instrument evaluation character education....

Download PDF file
  • EP ID EP598516
  • DOI -
  • Views 140
  • Downloads 0

How To Cite

Somchai Prakancharoen (2017). Message Sharing Database Security Protocol Designing (MSDSP). International Journal of the Computer, the Internet and Management, 25(3), 109-113. https://europub.co.uk/articles/-A-598516