Secure Data Access in Homogeneous and Heterogeneous Distributed Databases Using Effective Authentication Protocols

  • Authors

    • Natarajan M Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, Tamilnadu, India.
    • Manimegalai R 2 Research Supervisor, Department of Information Technology, PSG College of Technology, Coimbatore, TamilNadu, India.
    https://doi.org/10.14419/ijet.v7i2.9.16241
  • Distributed DBMS, Homogeneous, Heterogeneous, Security, KASKAP, KCSHAP.
  • Tuberculosis is one of the dangerous infectious diseases that can be characterized by the growth of tubercles in the tissues. This disease mainly affects the lungs and also the other parts of our body. The orthodox diagnosis methods available for Tuberculosis diagnosis were been faced with a number of challenges which can, if measure not taken, increase the spread rate; hence, there is a need for aid in diagnosis of the disease. This study proposes a technique for intelligent diagnosis of TB using Genetic-Neuro-Fuzzy Inferential method to provide a decision support platform that can assist medical practitioners in administering accurate, timely, and cost effective diagnosis of Tuberculosis. The medical record of 100 TB patients aged 15 to 75 were used to evaluate the performance of the multitechnique decision support system. 70% of the dataset was used training data, 15% was used for validation while the remaining 15% was used to observe the performance of the proposed system.
  • References

    1. 1. M. Natarajan and R. Manimegalai, “Key Computation based Secure Handshake
      Authentication Protocol (KCSHAP) for Secured Distributed Database Accessâ€,
      IJCTA, 9(40), 2016, pp. 183-189

      2. M.Natarajan , R.Manimegalai, “Key Agreement based Secure Kerberos
      Authentication Protocol (KASKAP) for Distributed Database Access in Secured
      Mannerâ€IJET,7(2.9).2018,pp 24-27.
      3. Mohamed Firdhous, “Implementation of Security in Distributed Systems – A
      Comparative Studyâ€, International Journal of Computer Information Systems,vol. 2,
      issue 2, 2011
      4. Kun Fang, “TRUST Management Model in Distributed GISâ€, 2008 IEEE.
      5. Min Zhang, Desheng Zhang, Hequn Xian, Chi Chen, Dengguo Feng, “Towards A
      Secure Distribute Storage Systemâ€, International Conference on Advanced
      Communication Technology, Gangwon-Do, IEEE, vol 3, pp 1612 – 1617, 2008.
      6. MD.TABREZ QUASIM, “Security Issues in Distributed Database System Modelâ€,
      COMPUSOFT, An international journal of advanced computer technology, 2 (12),
      December-2013 (Volume-II, Issue-XII)
      7. Dr.Mohmad Kashif Qureshi “Security Aspects of Distributed Databaseâ€,
      IJAIR(2013)pp197-212.
      8. Parul Tomar and Megha, “ An Overview of Distributed Databasesâ€, International
      Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4,
      Number 2 (2014), pp. 207-214.
      9. Dr.C.Sunil Kumar,2 J.Seetha, S.R.Vinotha, â€Security Implications of Distributed
      Database Management System Models†International Journal of Soft Computing And
      Software Engineering (JSCSE) e-ISSN: 2251-7545 Vol.2,o.11, 2012.
      10. Ranjana Thalore1 , Partha Pratim Bhattacharya1 , and Manish Kumar Jha2,
      “Performance Comparison of Homogeneous and Heterogeneous 3D Wireless Sensor
      Networksâ€, Journal of Telecommunication and Information Technology(2017).

  • Downloads

  • How to Cite

    M, N., & R, M. (2018). Secure Data Access in Homogeneous and Heterogeneous Distributed Databases Using Effective Authentication Protocols. International Journal of Engineering & Technology, 7(2.9). https://doi.org/10.14419/ijet.v7i2.9.16241