Data Privacy Framework on Multi Check-out Timestamp Order for Secured Transaction in Mobile Network

Byambasuren Byamba (1), Su-Cheng Haw (2)
(1) Faculty of Information Technology, Multimedia University, Malaysia
(2) Faculty of Information Technology, Multimedia University, Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
Byamba, Byambasuren, and Su-Cheng Haw. “Data Privacy Framework on Multi Check-Out Timestamp Order for Secured Transaction in Mobile Network”. International Journal on Advanced Science, Engineering and Information Technology, vol. 1, no. 3, June 2011, pp. 289-93, doi:10.18517/ijaseit.1.3.60.
Data transaction over distri uted network has gained much attention in the database communities since the last decade, especially in terms of security support. There are several data privacy models for mobile computing such as Data Encryption Standard, Skipjack, RC5 and so on. Most of the cipher algorithms are designed for huge data size of encryption and decryption processes. Therefore, a suitable secure cipher algorithm is needed if the encryption and decryption is merely for small amount of data such as in the mobile database environment. In this paper, we discuss on the five well-known symmetric key cryptographic ciphers and propose a framework for the security model on top of Multi Check-out Timestamp Order (MCTO) data transaction model.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).