A Novel AMS Model Based On Database Replication Using Multi-Shares

K Vijaya Kashyap, P Jayanthi, V Janardhan Babu


The use of information systems to improve organizational effectiveness and efficiency has increased rapidly.  Attendance Management System developed for daily student attendance in colleges and institutes facilitates access to the attendance information of a particular student in a particular class. This system will also help in evaluating attendance eligibility criteria of a student. The information is stored by the operators, which will be provided by the teacher for a particular class. Security for such information system is one of the most critical aspects due to the sensitive and important information stored. Also, Organizations need to share information but they still need to protect it from people who should not have access to it, while at the same time making those resources available to authorized users. Effective security achieves these goals. We chose secret sharing technique and MySQL technology like representative relational database management system. We watched the analysis of an electronic business. We also presented the technologies that we have used: PHP, MySQL, HTML, and CSS.


Full Text:



A. O. Afolabi, A. O. Ajayi, Performance Evaluation of Database Management System (A case study of INTERBASE and MySQL, Journal of Engineering and Applied Sciences 3 (2), Medwell Journals, 2008, ISSN: 1816-949X, pp. 155-160;

K. Changsu, T. Wang, S. Namchul, K. Ki-Soo, An empirical study of customers perceptions of security and trust in e- payment systems, Electronic Commerce Research and Applications 9 (2010), pp. 8495;

K. Wikstrom, K. Artto, J. Kujala, J. Soderlund,Business models in project business, International Journal of Project Management, Volume 28, Issue 8, IRNOP 2009 in Berlin, December 2010.

A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud- of-clouds", EuroSys'11: Proc. 6thConf. onComputer systems, 2011, pp. 31-46.

D. Gupta, P. Jalote and G. Barua, A formal framework for on- line software version change. In IEEE Transactions on Software Engineering, 22, 1996, pp. 120 131.

Y. W. Lee, D. M. Strong, B. K. Kahn and R. Y. Wang, AIMQ: a methodology for information quality assessment. In Information Management 40, 2002, pp. 133-146.

A. Shamir, "How to share a secret”, Communications of the ACM, 22(11), 1979, pp. 612-613.

P.A. Loscocco, S.D. Smalley, P.A. Muckelbauer, R.C. Taylor, S.J. Turner and J.F. Farrell, "The inevitability of failure: The flawed assumption of security in modern computing environments", Citeseer, 1998, pp. 303-314.

H. Hacigumus, B. Iyer and S. Mehrotra, Providing database as a service. In ICDE 2002, pp. 29.

L. M. Kaufman, Data security in the world of cloud computing, IEEE Security & Privacy (2009), pp. 61-64.


  • There are currently no refbacks.