Cryptography Generator for Prevention SQL Injection Attack In Big Data

Martiano Martiano, Yoshida Sary

Abstract


Currently, especially in Indonesia, data leaks occur in domestic agencies and private e-commerce. From these problems, cryptographic researchers are needed to make the data difficult to read, this research forms cryptography through a substitution method which will determine the number of keys that have been used and generated back in the dictionary, in its implementation the researcher uses the Devops design method, this method uses 4 stages, namely 1. ) continues development, 2) continues testing, 3) continues integration, 4) continues development. The results obtained by the text can be encrypted and described perfectly and successfully as much as 15864 data, and consumes low resources

Keywords


e-commerce ; cryptographic; number of keys; Data

Full Text:

PDF

References


Anggraini E P, 2020, et al "Implementasi Kriptografi dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang " Applied Information Systems and Management (AISM), vol. 3, pp. 69-78.

A. Taryana, A. (2020) Fadli dan S. R. Nurshiami, Merancang Perangkat Lunak Sistem Penjaminan Mutu Internal (SPMI) Perguruan Tinggi yang Memiliki Daya Adaptasi Terhadap Perubahan Kebutuhan Pengguna secara Cepat dan Sering, Al-Azhar Indonesia Seri Sains dan Teknologi, 2020

Arvind, (2019). DevOps Life cycle: Everything You Need To Know About DevOps Life cycle Phases, 26 November 2019. [Online]. Available: https://www.edureka.co/blog/devops-lifecycle/. [Diakses 20 April 2020].

Fauzi, F., Al-Khowarizmi, A. K., & Muhathir, M. (2020). The e-Business Community Model is Used to Improve Communication Between Businesses by Utilizing Union Principles. Journal of Informatics and Telecommunication Engineering, 3(2), 252-257.

Martiano, M. (2021). Development of EDUDA as a Media to Build Students' Self-Resistance in Preventing Drugs. Journal of Computer Science, Information Technology and Telecommunication Engineering, 2(1), 169-173.

Martiano, M., & Maulana, H. (2021). Development of A Base Learning Project Model With Online Media In An Effort to Increase Learning Activities During the COVID-19 Pandemic. International Journal of Basic and Applied Science, 10(2), 36-41.

Marnoko, S., & Martiano, M. (2020). Improvement of Quantum Teaching Model Assisted by Comics against Student Learning Outcomes.

Lubis, A. R., & Prayudani, S. (2020, October). Optimization of MSE Accuracy Value Measurement Applying False Alarm Rate in Forecasting on Fuzzy Time Series based on Percentage Change. In 2020 8th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE.

Lubis, Arif Ridho, Santi Prayudani, and Muharman Lubis. "Analysis of the Markov Chain Approach to Detect Blood Sugar Level." Journal of Physics: Conference Series. Vol. 1361. No. 1. IOP Publishing, 2019.

Tohirin, (2020). Implementasi DevOps pada Pengembangan Aplikasi e-Skrining Covid-19, jurnal multinetics, vol. 6 no. 1 may 2020

Gaurav Shrivastava, 2013. Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique, International Journal of Engineering Sciences & Research Technology. Vol. 2 Issue 6 ,Page No. 1475-1478, 01 June, ISSN: 2277-9655.

Widyati Suryani, 2021, "Kebocoran Data Pribadi dan Urgensi Pembentukan UU Pelindungan Data Pribadi," Pusat penelitian badan keahlian sekretariat jendral DPR RI,

Wiliam Stalling,(2011). Cryptography and Network Security Principles and Practice, Fifth EditionPearson Education,Inc.,publishing as Prentice Hall, USA,




DOI: https://doi.org/10.30596/jcositte.v3i2.11566

Refbacks

  • There are currently no refbacks.