Data Integrity Checking for Securing Students Grades Lists Using the Hash Function
- DOI
- 10.2991/aisr.k.200424.019How to use a DOI?
- Keywords
- integrity, SHA-512, list of grades
- Abstract
Presently, institutions should preserve the quality of teaching, services and resources to ensure the quality of the institutions. All information is presented in full, fast and always in accordance with existing developments. The use of computer technology has an impact on eliciting gaps by irresponsible parties. The list of grades or transcripts of student grades is one of the objects targeted by the irresponsible parties experienced by several institutions in Indonesia. The fact that the list of student values in an institution is very important, a mechanism is needed to secure data manipulation from irresponsible parties. For the purpose of securing the list of grades, cryptography techniques are used. Data integrity, part of authentication in cryptography, is the right choice for this purpose. This study uses the data integrity method by comparing the initial hash value and final value. In this study the integrity of the data is examined using the SHA-512 algorithm which has the one-way function. A scheme and n algorithm which can be used to check changes in values in the database has been created to ensure the integrity of the students grades. Furthermore, a software prototype that has been developed can be used to check the integrity of student grades. With the prototype software, it is proven that if student data has been changed by an unauthorized party, a warning should appear. Changes in value that have occurred can be reported by using program history which can be used as evaluation material in the future. To provide a warning to the leader of a faculty, a pop-up notification containing a report message is made each time there is a change in the data value without the right permissions. The pop-up notification is generated by a trigger in the database and thus perform a comparison of hash values using the right query in an application.
- Copyright
- © 2020, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Megah MULYA AU - Hardini NOVIANTI AU - Des Alwine ZAYANTI AU - A.S. Syahrul Ramadhan AU - Rendy WIJAYA AU - Christofer YEREMIA PY - 2020 DA - 2020/05/06 TI - Data Integrity Checking for Securing Students Grades Lists Using the Hash Function BT - Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019) PB - Atlantis Press SP - 129 EP - 132 SN - 1951-6851 UR - https://doi.org/10.2991/aisr.k.200424.019 DO - 10.2991/aisr.k.200424.019 ID - MULYA2020 ER -