An Efficient Architecture to Ensure Data Integrity in ERP Systems

In digital era, Cloud based web solutions plays a vital role in private sectors as well as the government sectors namely CSR (Common Service Centers), UIDAI etc., spreads widely around the globe. The critical issue behind this services are ensuring the data quality and the integrity of the data in the database. As far as the web services are concerned, the accounting and the payment related web services focusses on such integrity issues as the money matters in it. The integrity of the data can be ensuring by the strict audit policy. The audit policy incorporates certain auditing tools to assure the correctness in the data through which the integrity is ensured. Each and every data auditing technique have their own structure to audit the data. The algorithm behind the auditing techniques vary based on the way of verifying the data in the database. In this research, focuses on the query based data auditing algorithm implementing in CampusStack on top of the existing data auditing algorithms for cloud data auditing which provides the single output that fulfills the integrity and privacy issues. The time complexity and the space complexity has to be analyzed with the existing auditing techniques as well as the integrity has to be ensured.

[1]  Xin Pei,et al.  Ensuring replication-based data integrity and availability in multicloud storage , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[2]  P. Santhi Thilagam,et al.  Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications , 2016, International Journal of Information Security.

[3]  Haruna Chiroma,et al.  A Sequential Data Preprocessing Tool for Data Mining , 2014, ICCSA.

[4]  Mosleh M. Abu-Alhaj,et al.  Cloud Data Auditing Techniques with a Focus on Privacy and Security , 2017, IEEE Security & Privacy.

[5]  N. M. Sawant,et al.  A survey on auditing techniques used for preserving privacy of data stored on cloud , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[6]  Hai Jin,et al.  Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).

[7]  R. V. Nataraj,et al.  CampusStack: An Efficient Design Approach for Information Management System , 2018, 2018 3rd International Conference on Inventive Computation Technologies (ICICT).

[8]  Ranjeetsingh S. Suryawanshi,et al.  Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud , 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).