Comparitive Analysis between Two Security Models of NoSQL Database

M. Somasundara Rao *, K. Venkata Rao**, M. H. M. Krishna Prasad***
* Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India.
** Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India.
*** Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India.
Periodicity:March - May'2020
DOI : https://doi.org/10.26634/jit.9.2.17685

Abstract

Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study.

Keywords

Database, Database Security, NoSQL, Security, Graph-Oriented Database Management System.

How to Cite this Article?

Rao, M. S., Rao, K. V., and Prasad, M. H. M. K. (2020). Comparitive Analysis between Two Security Models of NoSQL Database. i-manager's Journal on Information Technology, 9(2), 12-19. https://doi.org/10.26634/jit.9.2.17685

References

[1]. Albalawi, U. (2018, December). Countermeasure of statistical inference in database security. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 2044-2047). IEEE. https://doi.org/10.1109/BigData.201 8.8622241
[2]. Ali, R., Liu, R., Awan, S. A., Qayoom, A., Mahmood, S., ur Rehman, S., & Umer, M. (2020, February). Improvisation the security and privacy in real time database system. In 2020 International Conference on Information Science and Communication Technology (ICISCT) (pp. 1-6). IEEE. https://doi.org/10.1109/ICISCT49550.2020.9080027
[3]. Al-Maawali, Z. A., Noronha, H., & Kumar, P. U. (2019, January). Big data acquisition, preprocessing and analysis to develop and implement effective database th system with high security standards. In 2019, 4 MEC International Conference on Big Data and Smart City (ICBDSC) (pp. 1-4). IEEE. https://doi.org/10.1109/ICBDSC. 2019.8645583
[4]. Almutairi, A. H., & Alruwaili, A. H. (2012). Security in database systems, Global Journal of Computer Science and Technology Network, Web & Security, 12(17), 9-14.
[5]. Bao, H., He, H., Liu, Z., & Liu, Z. (2019, September). Research on network privacy information security management method based on NoSQL database. In 2019, International Conference on Virtual Reality and Intelligent Systems (ICVRIS) (pp. 415-419). IEEE. https://doi. org/10.1109/ICVRIS.2019.00107
[6]. Bertino, E., & Sandhu, R. (2005). Database securityconcepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19. https://doi.org/10.1109/TDSC.2005.9
[7]. Cinar, O., Guncer, R. H., & Yazici, A. (2016, December). Database security in private database clouds. In 2016, International Conference on Information Science and Security (ICISS) (pp. 1-5). IEEE. https://doi.org/ 10.1109/ICISSEC.2016.7885847
[8]. Huijie, W. (2017, December). A security framework for th database auditing system. In 2017, 10 International Symposium on Computational Intelligence and Design (ISCID) (Vol. 1, pp. 350-353). IEEE. https://doi.org/10.1109/ ISCID.2017.64
[9]. Kumar, B., & Al Hasani, M. H. S. (2016, October). Database security—Risks and control methods. In 2016, First IEEE International Conference on Computer Communication and the Internet (ICCCI) (pp. 334-340). IEEE. https://doi.org/10.1109/CCI.2016.7778937
[10]. Malik, M., & Patel, T. (2016). Database security attacks and control methods. International Journal of Information, 6(1/2), 175-183.
[11]. Morgado, C., Baioco, G. B., Basso, T., & Moraes, R. (2018, July). A security model for access control in graph- oriented databases. In 2018, IEEE International Conference on Software Quality, Reliability and Security (QRS) (pp. 135-142). IEEE. https://doi.org/10.1109/QRS.2 018.00027
[12]. Rathore, S., & Sharma, A. (2018). Database securityattacks, threats and challenges. International Journal of Engineering Research & Technology (IJERT), 5(10).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.