COMPARITIVE ANALYSIS BETWEEN TWO SECURITY MODELS OF NoSQL DATABASE

Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:I-Manager's Journal on Information Technology Ročník 9; číslo 2; s. 12
Hlavní autoři: SOMASUNDARA RAO, M., VENKATA RAO, K., KRISHNA PRASAD, M. H. M.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Nagercoil iManager Publications 01.03.2020
Témata:
ISSN:2277-5110, 2277-5250
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2277-5110
2277-5250
DOI:10.26634/jit.9.2.17685