Implementing Security Technique on Generic Database Gaurav Dubey Vikram Khurana Shelly Sachdeva Department of Computer Science and Engineering Jaypee Institute of Information Technology, Noida gd.jiit@gmail.com, vikram0602@gmail.com, shelly.sachdeva@jiit.ac.in AbstractDatabase maintenance has become an important issue in today’s world. Addition or alteration of any field to an existing database schema cost high to a corporation. Whenever new data types are introduced or existing types are modified in a conventional relational database system, the physical design of the database must be changed accordingly. For this reason, it is desirable that a database should be flexible and allow for modification and addition of new types of data without having to change the physical database schema. The generic model is designed to allow a wide variety of data to be accommodated in a general purpose set of data structures. This generic mechanism for data storage has been used in various information systems such as banking, defense, e-commerce and especially healthcare domain. But, addressing security on generic databases is a challenging task. To the best of our knowledge, applying security on generic database has not been addressed yet. Various cryptographic security techniques, such as hashing algorithms, public and private key algorithms, have already been applied on a database. In this paper, we are proposing an extra layer of security to the existing databases, through Negative Database technique. The advantages of the negative database approach on generic database has been demonstrated and emphasized. Correspondingly, the complexity of the proposed algorithm has been computed. Keywords—Negative Database; Generic Database; Database security; Information Security; Security and Privacy. I. INTRODUCTION The complexity of databases is increasing rapidly, where the design of an efficient database is not possible. There is a more general database (DB) for this kind of problem known as generic database, which handles most of the complex problems with ease without changing the basic structure of the database. It’s based on a basic EAV (Entity Attribute Value) model where all type of data can be stored in a single table without worrying about which type of data has to be stored and where it has to be stored. It is a more general database that can be used for any purpose. Its application is widely seen in the health care systems where the structure of the table is not strictly defined as defining a database is not that easy and a requirement of slight addition in the structure of the table results in several empty fields in the table whereas generic database handles it with ease. Security is the major concern. Considering the current trends of usability, the need of protecting this type of database is becoming mandatory. Hackers try to get access to the private information, which needs to be highly secured. There are several organizations like banks, security agencies, electronic health records, and intelligence applications that need their data to be secured to the highest extent. Various security techniques such as hashing algorithms, public and private key algorithms have already been implemented for these databases. In this paper, the authors aim to present a framework to implement the concept of negative database on generic databases (EAV model) for enhancing security. This framework consists of various set of algorithms which manipulate the input data and store it in the database with some counterfeit data. This populated database is referred as negative database. Negative database provides an extra layer of security for these databases and will make the databases more secure. A. Simple Entity Attribute Value (EAV) model The EAV data model, as the name implies, consist of three parts: entities, attributes and values. This idea of EAV model originates from the concept of association lists as they are called LISP. An association of these list stores information in key-value pairs roughly equivalent to the attribute value part of the entity-attribute value tuple [6]. This idea was used in various health care database developed in 1970’s, after which it is considered in many standard applications like openEHR [10], TMR (The Medical Record), and HELP CDR (Clinical data repository). The EAV model's simplest form is three column table; the entity column which describes the data item, for example a product. The attribute column that describes attributes for entities, and the value table contains the values for those attributes. Application systems where we need to store variety of data, such as healthcare, e-commerce, and banks, this method is very useful. For such specific systems, the best way to implement a database is an EAV model, optimized for some specific needs. Table I, illustrates an example of person's health records, we see the simple table stores records for person's disease and the second table shows the EAV representation of disease records table. 978-1-4673-7948-9/15/$31.00 ©2015 IEEE