The two phase locking protocol provides controlled access to a data item and prevents data inconsistencies in the distributed database system. The hashing algorithm is used to calculate hash value for the requested data item and the generated hash value is used as a medium to secure the communication between server and client connected through a network. This paper presents a methodology which is used to secure network of a distributed database system while processing requests for data items from various users at the same time. The concurrency control issues are resolved using two phase locking protocol and the security issue is resolved using secure hash algorithm-3, 512 variant. By performing extensive experiments, the performance of the proposed method is epitomized. Performance parameters like throughput, accuracy are calculated to compare the proposed methodology with the hash based optimistic concurrency control algorithm.