Providing Security to NoSQL Database with Encryption

Shivanshkumar Pandey*, Manoj Raut**, Madhuri Gedam***
*-*** Department of Information Technology, Shree L .R. Tiwari College of Engineering, Maharashtra, India.
Periodicity:September - November'2021
DOI : https://doi.org/10.26634/jit.10.4.17361

Abstract

As technology advances, a huge amount of data are generated every day from various sources like Social Media, Banking, Hospital Management, etc. Modern businesses that use big data use-cases are helping to build a different set of technologies to replace SQL (Structured Query Language). Currently, data migration is very important because of the increasing volume of data collected from multiple sources, which is driving the migration from relational database management systems (RDBMS) to NoSQL (not just SQL) databases. The purpose of this work is to review a method for migrating data from RDBMS to NoSQL database. This approach uses SQL as the RDBMS and MongoDB as the NoSQL database to implement software prototypes. In this regard, SQL database and Mongo database data are kept secure by using encryption technology and providing encryption for users.

Keywords

NoSQL, MongoDB, Encryption.

How to Cite this Article?

Pandey, S., Raut, M., and Gedam, M. (2021). Providing Security to NoSQL Database with Encryption. i-manager’s Journal on Information Technology, 10(4), 31-37. https://doi.org/10.26634/jit.10.4.17361

References

[1]. Boicea, A., Radulescu, F., & Agapin, L. I. (2012, September). MongoDBvs Oracle--database comparison. In 2012, Third International Conference on Emerging Intelligent Data and Web Technologies (pp. 330-335). IEEE. https://doi.org/10.1109/EIDWT.2012.32
[2]. Chodorow, K., & Dirolf, M. (2010). MongoDB: The Definitive Guide. O'Reilly Media, Inc.
[3]. Data & Intelligence. (2015). NoSQLNoSecurity – Security issues with NoSQL Database. Retrieved from https://blogs.perficient.com/2015/06/22/nosql-nosecuitysecurity-issues-with-nosql-database/#:~:text=Security% 20in%20NoSQL%20databases%20is,is%20very%20weak%20when%20implemented.&text=Cannot%20use%20e xternal%20encryption%20tools,between%20client%20an d%20the%20servers
[4]. Hauger, W. K., & Olivier, M. S. (2018). NoSQL databases: forensic attribution implications. SAIEE Africa Research Journal, 109(2), 119-132. https://doi.org/10.23919/SAIEE. 2018.8531952
[5]. MongoDB. (n.d.). Retrieved from https://www.mon godb.com/
[6]. Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., & Abramov, J. (2011, November). Security issues in nosql databases. In 2011, IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 541-547). IEEE. https://doi.org/10.11 09/TrustCom.2011.70
[7]. Pepito, G. (2018). RDBMS to NoSQLmigration: Challenges and Strategies. University of San Carlos (Philippines).
[8]. Rai, R., & Chettri, P. (2018). Nosql hands on. In Advances in Computers (Vol. 109, pp. 157-277). Elsevier. https://doi. org/10.1016/bs.adcom.2017.08.004
[9]. Saur, K., Dumitraş, T., & Hicks, M. (2016, October). Evolving NoSQL databases without downtime. In 2016, IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 166-176). IEEE. https://doi.org/10.1109/ICSME.2016.47
[10]. Srivastava, P. P., Goyal, S., & Kumar, A. (2015, October). Analysis of various NoSql database. In 2015, International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 539-544). IEEE Computer Society. https://doi. org/10.1109/ICGCIoT.2015.7380523
[11]. Tudorica, B. G., & Bucur, C. (2011, June). A comparison between several NoSQL databases with comments and notes. In 2011, RoEduNet international conference 10th edition: Networking in education and research (pp. 1-5). IEEE. https://doi.org/10.1109/RoEduNet. 2011.5993686
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.