COMPARITIVE ANALYSIS BETWEEN TWO SECURITY MODELS OF NoSQL DATABASE
Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left...
Gespeichert in:
| Veröffentlicht in: | I-Manager's Journal on Information Technology Jg. 9; H. 2; S. 12 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Nagercoil
iManager Publications
01.03.2020
|
| Schlagworte: | |
| ISSN: | 2277-5110, 2277-5250 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study. |
|---|---|
| AbstractList | Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study. |
| Author | SOMASUNDARA RAO, M. VENKATA RAO, K. KRISHNA PRASAD, M. H. M. |
| Author_xml | – sequence: 1 givenname: M. surname: SOMASUNDARA RAO fullname: SOMASUNDARA RAO, M. – sequence: 2 givenname: K. surname: VENKATA RAO fullname: VENKATA RAO, K. – sequence: 3 givenname: M. H. M. surname: KRISHNA PRASAD fullname: KRISHNA PRASAD, M. H. M. |
| BookMark | eNo1kE1PwkAQhjcGExG5et7Ec-vudD_Y41IWbVKo2irhtGnLNoEoxRYO_ns3oKeZZJ68b-a5RYN9u3cI3VMSghARe9xtj6EKIaRSTPgVGgJIGXDgZPC_U0pu0Ljvd4QQUIIpYEM0jbPFi35LiuTDYL3U6TpPcjw1xcqYJS5WGc5N_O7va7zIZibNcTbHyzZ_TfFMF3qqc3OHrpvys3fjvzlCxdwU8XOQZk9JrNOgFlIFdRWVTUMdNLWrlCLK11fcOcpZKTzAarWZVFCx0lUTyslmUzLniKSNqEFSHo3QwyX20LXfJ9cf7a49dXvfaMH_AoxKqTwVXqi6a_u-c409dNuvsvuxlNizKetNWWXBnk1FvzmTV4I |
| Cites_doi | 10.1109/CCI.2016.7778937 10.1109/TDSC.2005.9 10.1109/ ISCID.2017.64 10.1109/QRS.2 018.00027 10.1109/ICISCT49550.2020.9080027 10.5121/ijist.2016.6218 10.1109/ICISSEC.2016.7885847 10.1109/BigData.201 8.8622241 10.1109/ICBDSC. 2019.8645583 10.1109/ICVRIS.2019.00107 |
| ContentType | Journal Article |
| Copyright | 2020 i-manager publications. All rights reserved. |
| Copyright_xml | – notice: 2020 i-manager publications. All rights reserved. |
| CorporateAuthor | Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India |
| CorporateAuthor_xml | – name: Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India – name: Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India – name: Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India |
| DBID | AAYXX CITATION 04Q 04S 04W 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.26634/jit.9.2.17685 |
| DatabaseName | CrossRef India Database (ProQuest) India Database: Business India Database: Science & Technology ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection (Proquest) ProQuest Computer Science Collection Computer Science Database (Proquest) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ProQuest Indian Journals Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database Indian Journals: Business ProQuest One Academic UKI Edition Indian Journals: Science & Technology ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2277-5250 |
| ExternalDocumentID | 10_26634_jit_9_2_17685 |
| GroupedDBID | 04Q 04S 04W 8FE 8FG AAYXX ABUWG AFFHD AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ HCIFZ K6V K7- P62 PHGZM PHGZT PQGLB PQQKQ PROAC 3V. 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c679-cb3aff1e2fceb9909924b5ee154a66794c9d8b2b4aeb8150dda4ee071f6c27153 |
| IEDL.DBID | 04Q |
| ISSN | 2277-5110 |
| IngestDate | Sun Nov 09 06:59:25 EST 2025 Sat Nov 29 06:19:17 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c679-cb3aff1e2fceb9909924b5ee154a66794c9d8b2b4aeb8150dda4ee071f6c27153 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2492241779 |
| PQPubID | 2030619 |
| ParticipantIDs | proquest_journals_2492241779 crossref_primary_10_26634_jit_9_2_17685 |
| PublicationCentury | 2000 |
| PublicationDate | 20200301 |
| PublicationDateYYYYMMDD | 2020-03-01 |
| PublicationDate_xml | – month: 03 year: 2020 text: 20200301 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Nagercoil |
| PublicationPlace_xml | – name: Nagercoil |
| PublicationTitle | I-Manager's Journal on Information Technology |
| PublicationYear | 2020 |
| Publisher | iManager Publications |
| Publisher_xml | – name: iManager Publications |
| References | ref8 ref7 ref12 ref9 ref4 ref3 ref6 ref11 ref5 ref10 ref2 ref1 |
| References_xml | – ident: ref4 – ident: ref9 doi: 10.1109/CCI.2016.7778937 – ident: ref6 doi: 10.1109/TDSC.2005.9 – ident: ref8 doi: 10.1109/ ISCID.2017.64 – ident: ref11 doi: 10.1109/QRS.2 018.00027 – ident: ref2 doi: 10.1109/ICISCT49550.2020.9080027 – ident: ref10 doi: 10.5121/ijist.2016.6218 – ident: ref7 doi: 10.1109/ICISSEC.2016.7885847 – ident: ref1 doi: 10.1109/BigData.201 8.8622241 – ident: ref3 doi: 10.1109/ICBDSC. 2019.8645583 – ident: ref5 doi: 10.1109/ICVRIS.2019.00107 – ident: ref12 |
| SSID | ssj0002964924 |
| Score | 2.097017 |
| Snippet | Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Index Database |
| StartPage | 12 |
| SubjectTerms | Access control Data base management systems Relational data bases Security management Security systems |
| Title | COMPARITIVE ANALYSIS BETWEEN TWO SECURITY MODELS OF NoSQL DATABASE |
| URI | https://www.proquest.com/docview/2492241779 |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2277-5250 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964924 issn: 2277-5110 databaseCode: P5Z dateStart: 20111201 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database (Proquest) customDbUrl: eissn: 2277-5250 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964924 issn: 2277-5110 databaseCode: K7- dateStart: 20111201 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: India Database (ProQuest) customDbUrl: eissn: 2277-5250 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964924 issn: 2277-5110 databaseCode: 04Q dateStart: 20111201 isFulltext: true titleUrlDefault: https://search.proquest.com/indianjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2277-5250 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002964924 issn: 2277-5110 databaseCode: BENPR dateStart: 20111201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwELWgZWDhQ4AolMoDEpPb1PlwPCFaWiGBopZ2qFgsx7GlItSUJsDf55wPUBcWMkSKkiF6ie-9853uIXTNHU4VDRJiVBwSz5WaSJ9zElOqDEgIpoLSbIJFUbhY8Em14ZZVbZV1TCwCdZIqu0fes5PtgG0Y47frd2Jdo2x1tbLQ2EVNy1N2YTre9GePxZYUeeFrS22lErSFU85tBFZyvd7rMu_yLu32QXL727y0HZYLrhkf_vctj9BBpTLxXflbHKMdvTpBg2HpOWgDHK6HkeCqUQvPv1I8q8zssHVIe8twanCUzqZP-F7m0vLdKZqPR_PhA6ksFIgKGCcqdqUxfU2N0jHwDgc0Yl9r0E0ygAc8xZMwprEndRyCNEwS6WkNqsMEijIIhmeosUpX-hxhFw6qZKAT5UJOyO0cPEeHJgg9ZRJGW-imxk-sy0EZAhKMAmkBSAsuqCiQbqF2jZ2oFkwmfoG7-Pv2JdqnNuUt2sDaqJFvPvQV2lOf-TLbdIrv30HNwSiaPMPVIyNwnvgv3_E8u3Q |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V09T8MwELWqggQLHwJEoYAHEJP74aRJPCAELVWrlgjUDt0sx7GlItSUJlDxo_iPnPMB6sLWgazJEOVd3rvz2fcQumQNRiV1QqJl4BHbEoqIFmMkoFRqSCFc6WRmE67ve5MJeyqhr-IsjNlWWXBiStRhJM0aed1MtgO1cV12O38jxjXKdFcLC40sLAbqcwklW3zT7wC-V5R2H8btHsldBYh0XEZkYAmtm4pqqQKgYgYFSNBSClIJ4cADtmShF9DAFirwIFsKQ2ErBUKsHUndpjGJAMbfsC3PMT_UwCU_Szqmg8lSG11qGqOQyjSyMZEggpZdf5kmNVajtSZk-K1VGVxVgVTaurv_7KPsoZ08h8Z3WdDvo5KaHaD7duaoaOgbF6NWcL4NDY-XER7lVn3Y-L-9xjjS2I9Gz0PcEYkwan6Ixut46yNUnkUzdYywBReVwlGhtKDiZWbKX0N52vFsqUOXVtB1ARefZ2NAOJRPKbAcgOWMU54CW0HVAiqe00HMf3E6-fv2BdrqjR-HfNj3B6dom5riPt3wVkXlZPGuztCm_Eim8eI8DT2M-JpR_QZgzBW9 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comparitive+Analysis+between+Two+Security+Models+of+NoSQL+Database&rft.jtitle=I-Manager%27s+Journal+on+Information+Technology&rft.au=Rao%2C+M+Somasundara&rft.au=Rao%2C+K+Venkata&rft.au=M+H+M+Krishna+Prasad&rft.date=2020-03-01&rft.pub=iManager+Publications&rft.issn=2277-5110&rft.eissn=2277-5250&rft.volume=9&rft.issue=2&rft.spage=12&rft_id=info:doi/10.26634%2Fjit.9.2.17685 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2277-5110&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2277-5110&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2277-5110&client=summon |