A Security Approach for File Management System using Data Encryption Standard (DES) algorithm
Journal: International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (Vol.8, No. 5)Publication Date: 2019-10-15
Authors : Irma T. Plata Edward B. Panganiban; Bryan B. Bartolome;
Page : 2042-2048
Keywords : data security; data encryption standard (DES); cryptography; file management; rapid application development;
Abstract
Security is very essential to avoid the unauthorized exposé or modification of the information. Due to the extraordinary changes in advance these days, various mixed media information is being produced and transmitted, hence, leaving our very own information defenseless against alteration and copying. Information being transmitted through a communication system can be ensured through cryptography. In an information processing environment, cryptography is executed through a process which uses a mystery key or an arrangement of bits. This paper established a security key management scheme that provides the support necessary to protect files or records between individual end users, and that also can be used to protect data stored or conveyed from one computer to another. It contains encryption and decryption process, each related with a key which should be stayed secret through Data Encryption Standard (DES). The authors employed System Development Life Cycle (SDLC), particularly on Rapid Application Development (RAD). This method involves initial data gathering, cost and requirements' analysis, and identification of the methods to be used in designing, testing, deploying and sustaining the system. Specifically, this paper used the block cipher approach as the main framework. The reliability of this system is measured using several tests done in the system. Experimental analysis includes testing in hardware and software components, system components, system units, and system integration and acceptance. The results showed that the performance of the system is in its best condition. There are four (4) parameters used in checking the complexity and time latency (CTL) in the DES algorithm. These were physical server, web server, network connectivity, and system. From each parameter, the system undergone three (3) phases of processes. Furthermore, questionnaires were floated to the respondents to assess the security system developed in terms of its usability, functionality, and reliability. The questionnaire was taken from an International Standard in evaluating system software called the ISO/IEC 25010:2011. The system was accomplished based from software tools like PHP, Apache, HTML, CSS and JavaScript for the system development and MySQL for its database. In the end, the researchers achieved high security through the implementation of DES algorithm.
Other Latest Articles
- Multi-domain Cross-dataset and Camera Style Transfer for Person Re-Identification
- Training and Development of Professional Skills: An Analysis of activity in Professional Skills
- An Assessment of the Visual Features Extractions for the Audio-Visual Speech Recognition
- Effective Zone Based Routing Protocols for MANET
- Fuzzy Logic based Channel Selection Algorithm for Wireless Mesh Networks
Last modified: 2019-11-11 17:56:23