Verification of stored security data in computer system

  • Authors:
  • Heng-Sheng Chen;Tsang-Yean Lee;Huey-Ming Lee

  • Affiliations:
  • Department of Information Management, Chinese Culture University, Yang-Ming-San, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Yang-Ming-San, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Yang-Ming-San, Taipei, Taiwan

  • Venue:
  • ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part I
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security data must keep security in the computer system. We encrypt these security data to produce encrypted security data. When we need, we decrypt these encrypted security data to produce original security data. We set encryption data table and use it to encrypt the security data. Each security data has key code in the file information data base. We use key code to insert encryption data table to the encrypted security data. When we want to get the original security data, we use key code in the file information data base to get encryption data table in the encrypted security data. We use encryption data table and decryption algorithm to decrypt the remaining encrypted security data and get the original security data. In this paper, we propose the method of verification to check whether the encrypted security data is modified or not. When we install these algorithms in the computer system to process, it is more secure.