Security Implementation on EAV model using Negative database and Shuffling.

Abstract

This Paper presents an improvised security mechanism for EAV (Entity Attribute Value) data model. EAV data model for data storage has been used in various information systems now days as it gives an advantage of data flexibility and addition and modification of new data without changing the physical database schema. In EAV (Entity Attribute Value) model uses only three columns to store the data where first column stores entity, second column stores attribute and third column stores the value of the attribute for particular entity and single generic table is used to the data. As data security and database flexibility is important in this paper we are proposing security mechanism for existing databases using concept of negative database and shuffling.

Authors and Affiliations

Pooja Vartak, Prof. Amarja Adgaonkar

Keywords

Related Articles

Levelof Awareness among Professionals in the Nigerian Construction Industry on Public Private Partnership Procurement and Its Variants in Infrastructure Development in Nigeria: Case Study, Lagos State

This is a survey that investigates the awarenessof professionals and other participants in the Nigerian construction industry in the use of public private partnership and its variant methods in procuring infrastructure i...

A Case Elaboration Methodology for a Semantic Web Service Discovery System Based on CBR

The Case Based Reasoning is a paradigm of intelligent reasoning which consists on reusing results of previously solved problems (Source Cases) to solve new problems (Target Cases). It has been formalized as a five-step p...

COLOR IMAGE COMPRESSION USING MULTI-LEVEL BLOCK TRUNCATION CODE ALGORITHM AND VECTOR QUANTIZATION

This paper aims to proposed multi-level block truncation code (BTC) based image compression of continuous tone still image to achieve low bit rate and high quality. The algorithm has been proposed by combining bit map an...

Displaying of Digital Clock through digital circuits and through Assembly Language Programs of 8051 microcontroller

With a view to display a Digital Clock through digital circuits using modulo-n (mod-n) counters, a circuit diagram was designed and implemented it through multi simulation software. In the similar manner the time digits...

Download PDF file
  • EP ID EP392085
  • DOI 10.9790/9622-0708065660.
  • Views 108
  • Downloads 0

How To Cite

Pooja Vartak, Prof. Amarja Adgaonkar (2017). Security Implementation on EAV model using Negative database and Shuffling.. International Journal of engineering Research and Applications, 7(8), 56-60. https://europub.co.uk/articles/-A-392085