oalogo2  

AUTHOR(S):

Hassan Bediar Hashim

 

TITLE

Use of a Hash-Based Integrity Verification Framework for Secure Data Transfer Between Database Tables

pdf PDF

ABSTRACT

Data integrity guarantee among transferred data between tables is also an essential problem in modern database-reliant systems, especially in security-sensitive scenarios such as finance, healthcare, and large-scale administrative applications. While cryptographic hash functions and message authentication operations are well-known, their application in databases as part of a protocol that ensures systematic data transfer with concurrency control and automatic recovery has not been addressed satisfactorily. We proposed hash-based integrity verification parallel framework that integrates the SHA-256 hashing and the HMAC-based authentication to guarantee secure and reliable data movement between relational database tables. The protocol operates in four coordinated stages: pre-transfer hash generation, authenticated data transfer using HMAC, post-transfer integrity verification, and a process that can automate the recovery of such corrupted content. The model was realized by Python and MySQL, and verified through a series of large-scale experiments that include controlled link failure injections and adversarial modifications of the data. Results of experiments show that the error rate of data transmission in the proposed approach drops to 0.1% from 4.5%, and with the mandatory referential integrity guaranteed, it can reach up to a rate of close to 100%. Although the history-based scheme may suffer a 25.5% higher transfer time because of cryptographic calculations, such overhead is tolerable to cases constantly demanding high reliability and data security. Results further manifest that the advocated schema offers a flexible integrity-preserving data transfer solution applicable to relational databases.

KEYWORDS

Data Integrity; SHA-256; HMAC; Secure Data Transfer; Database Security; Integrity Verification

 

Cite this paper

Hassan Bediar Hashim. (2026) Use of a Hash-Based Integrity Verification Framework for Secure Data Transfer Between Database Tables. International Journal of Computers, 11, 7-12

 

cc.png
Copyright © 2026 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0