Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019)

Data Integrity Checking for Securing Students Grades Lists Using the Hash Function

Authors
Megah MULYA, Hardini NOVIANTI, Des Alwine ZAYANTI, A.S. Syahrul Ramadhan, Rendy WIJAYA, Christofer YEREMIA
Corresponding Author
Megah MULYA
Available Online 6 May 2020.
DOI
10.2991/aisr.k.200424.019How to use a DOI?
Keywords
integrity, SHA-512, list of grades
Abstract

Presently, institutions should preserve the quality of teaching, services and resources to ensure the quality of the institutions. All information is presented in full, fast and always in accordance with existing developments. The use of computer technology has an impact on eliciting gaps by irresponsible parties. The list of grades or transcripts of student grades is one of the objects targeted by the irresponsible parties experienced by several institutions in Indonesia. The fact that the list of student values in an institution is very important, a mechanism is needed to secure data manipulation from irresponsible parties. For the purpose of securing the list of grades, cryptography techniques are used. Data integrity, part of authentication in cryptography, is the right choice for this purpose. This study uses the data integrity method by comparing the initial hash value and final value. In this study the integrity of the data is examined using the SHA-512 algorithm which has the one-way function. A scheme and n algorithm which can be used to check changes in values in the database has been created to ensure the integrity of the students grades. Furthermore, a software prototype that has been developed can be used to check the integrity of student grades. With the prototype software, it is proven that if student data has been changed by an unauthorized party, a warning should appear. Changes in value that have occurred can be reported by using program history which can be used as evaluation material in the future. To provide a warning to the leader of a faculty, a pop-up notification containing a report message is made each time there is a change in the data value without the right permissions. The pop-up notification is generated by a trigger in the database and thus perform a comparison of hash values using the right query in an application.

Copyright
© 2020, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019)
Series
Advances in Intelligent Systems Research
Publication Date
6 May 2020
ISBN
978-94-6252-963-2
ISSN
1951-6851
DOI
10.2991/aisr.k.200424.019How to use a DOI?
Copyright
© 2020, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Megah MULYA
AU  - Hardini NOVIANTI
AU  - Des Alwine ZAYANTI
AU  - A.S. Syahrul Ramadhan
AU  - Rendy WIJAYA
AU  - Christofer YEREMIA
PY  - 2020
DA  - 2020/05/06
TI  - Data Integrity Checking for Securing Students Grades Lists Using the Hash Function
BT  - Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019)
PB  - Atlantis Press
SP  - 129
EP  - 132
SN  - 1951-6851
UR  - https://doi.org/10.2991/aisr.k.200424.019
DO  - 10.2991/aisr.k.200424.019
ID  - MULYA2020
ER  -