Military Database Security via Justapose Database Shuffling
J. Jegan Amarnath1, M.Suresh Anand2, D. Sathish Kumar3, S. Gurusubramani4, A. Sheela5
1J.Jegan Amarnath, Department of Computer Science Engineering, Sri Sairam Engineering College, Chennai (Tamil Nadu), India.
2M.Suresh Anand, Department of Computer Science Engineering, Sri Sairam Engineering College, Chennai (Tamil Nadu), India.
3D.Sathish Kumar, Department of Computer Science Engineering, Sri Sairam Engineering College, Chennai (Tamil Nadu), India.
4S.Gurusubramani, Department of Computer Science Engineering, Sri Sairam Engineering College, Chennai (Tamil Nadu), India.
5A.Sheela, Department of Computer Science Engineering, Sri Sairam Engineering College, Chennai (Tamil Nadu), India.
Manuscript received on 24 November 2019 | Revised Manuscript received on 07 December 2019 | Manuscript Published on 14 December 2019 | PP: 56-60 | Volume-9 Issue-1S October 2019 | Retrieval Number: A10111091S19/19©BEIESP | DOI: 10.35940/ijeat.A1011.1091S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper aims for Database security which expresses the need for preventing data leak from military databases which often leads to sensitive data leaks which bring the defence machinery of the nation at peril. Cyber-Attacks and Large-Scale Phishing from neighbouring nations have brought the immediate need of securing the database which concerns the confidentiality of the defence proceedings and hence the paper proposes some techniques and a unique project proposal to overcome the drawbacks of the existing technologies which can henceforth be secured to find a secure environment for the data. Lack of awareness regarding the gravity of the confidential data and what harm it might bring upon the defence set-up can lead to essential data being compromised and hence our paper proposes a novel solution in Database security by employing RSM method which invokes data dredging and mining.
Keywords: Data Dredging, Slicing and Dicing, Shuffling, Data Mining, Data Security, Database Management.
Scope of the Article: Database Theory and Application