COMPARITIVE ANALYSIS BETWEEN TWO SECURITY MODELS OF NoSQL DATABASE

Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:I-Manager's Journal on Information Technology Jg. 9; H. 2; S. 12
Hauptverfasser: SOMASUNDARA RAO, M., VENKATA RAO, K., KRISHNA PRASAD, M. H. M.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Nagercoil iManager Publications 01.03.2020
Schlagworte:
ISSN:2277-5110, 2277-5250
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study.
AbstractList Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes two distinctive security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system and organization based system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study has been performed as proof of concept, where the model has been instantiated and implemented for Neo4j database. A network management data security technique for executives based on NoSQL is suggested for better assurance of Organization based security systems. These are the two distinctive security models presented in this study.
Author SOMASUNDARA RAO, M.
VENKATA RAO, K.
KRISHNA PRASAD, M. H. M.
Author_xml – sequence: 1
  givenname: M.
  surname: SOMASUNDARA RAO
  fullname: SOMASUNDARA RAO, M.
– sequence: 2
  givenname: K.
  surname: VENKATA RAO
  fullname: VENKATA RAO, K.
– sequence: 3
  givenname: M. H. M.
  surname: KRISHNA PRASAD
  fullname: KRISHNA PRASAD, M. H. M.
BookMark eNo1kE1PwkAQhjcGExG5et7Ec-vudD_Y41IWbVKo2irhtGnLNoEoxRYO_ns3oKeZZJ68b-a5RYN9u3cI3VMSghARe9xtj6EKIaRSTPgVGgJIGXDgZPC_U0pu0Ljvd4QQUIIpYEM0jbPFi35LiuTDYL3U6TpPcjw1xcqYJS5WGc5N_O7va7zIZibNcTbHyzZ_TfFMF3qqc3OHrpvys3fjvzlCxdwU8XOQZk9JrNOgFlIFdRWVTUMdNLWrlCLK11fcOcpZKTzAarWZVFCx0lUTyslmUzLniKSNqEFSHo3QwyX20LXfJ9cf7a49dXvfaMH_AoxKqTwVXqi6a_u-c409dNuvsvuxlNizKetNWWXBnk1FvzmTV4I
Cites_doi 10.1109/CCI.2016.7778937
10.1109/TDSC.2005.9
10.1109/ ISCID.2017.64
10.1109/QRS.2 018.00027
10.1109/ICISCT49550.2020.9080027
10.5121/ijist.2016.6218
10.1109/ICISSEC.2016.7885847
10.1109/BigData.201 8.8622241
10.1109/ICBDSC. 2019.8645583
10.1109/ICVRIS.2019.00107
ContentType Journal Article
Copyright 2020 i-manager publications. All rights reserved.
Copyright_xml – notice: 2020 i-manager publications. All rights reserved.
CorporateAuthor Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India
Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India
Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India
CorporateAuthor_xml – name: Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India
– name: Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India
– name: Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India
DBID AAYXX
CITATION
04Q
04S
04W
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.26634/jit.9.2.17685
DatabaseName CrossRef
India Database (ProQuest)
India Database: Business
India Database: Science & Technology
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection (Proquest)
ProQuest Computer Science Collection
Computer Science Database (Proquest)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ProQuest Indian Journals
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
Indian Journals: Business
ProQuest One Academic UKI Edition
Indian Journals: Science & Technology
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 2277-5250
ExternalDocumentID 10_26634_jit_9_2_17685
GroupedDBID 04Q
04S
04W
8FE
8FG
AAYXX
ABUWG
AFFHD
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
K6V
K7-
P62
PHGZM
PHGZT
PQGLB
PQQKQ
PROAC
3V.
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c679-cb3aff1e2fceb9909924b5ee154a66794c9d8b2b4aeb8150dda4ee071f6c27153
IEDL.DBID 04Q
ISSN 2277-5110
IngestDate Sun Nov 09 06:59:25 EST 2025
Sat Nov 29 06:19:17 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c679-cb3aff1e2fceb9909924b5ee154a66794c9d8b2b4aeb8150dda4ee071f6c27153
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2492241779
PQPubID 2030619
ParticipantIDs proquest_journals_2492241779
crossref_primary_10_26634_jit_9_2_17685
PublicationCentury 2000
PublicationDate 20200301
PublicationDateYYYYMMDD 2020-03-01
PublicationDate_xml – month: 03
  year: 2020
  text: 20200301
  day: 01
PublicationDecade 2020
PublicationPlace Nagercoil
PublicationPlace_xml – name: Nagercoil
PublicationTitle I-Manager's Journal on Information Technology
PublicationYear 2020
Publisher iManager Publications
Publisher_xml – name: iManager Publications
References ref8
ref7
ref12
ref9
ref4
ref3
ref6
ref11
ref5
ref10
ref2
ref1
References_xml – ident: ref4
– ident: ref9
  doi: 10.1109/CCI.2016.7778937
– ident: ref6
  doi: 10.1109/TDSC.2005.9
– ident: ref8
  doi: 10.1109/ ISCID.2017.64
– ident: ref11
  doi: 10.1109/QRS.2 018.00027
– ident: ref2
  doi: 10.1109/ICISCT49550.2020.9080027
– ident: ref10
  doi: 10.5121/ijist.2016.6218
– ident: ref7
  doi: 10.1109/ICISSEC.2016.7885847
– ident: ref1
  doi: 10.1109/BigData.201 8.8622241
– ident: ref3
  doi: 10.1109/ICBDSC. 2019.8645583
– ident: ref5
  doi: 10.1109/ICVRIS.2019.00107
– ident: ref12
SSID ssj0002964924
Score 2.097017
Snippet Nowadays, organizations collect volumes of data for future analysis. Motivated by this amount of data and requirements of Web 2.0, a plethora of non-relational...
SourceID proquest
crossref
SourceType Aggregation Database
Index Database
StartPage 12
SubjectTerms Access control
Data base management systems
Relational data bases
Security management
Security systems
Title COMPARITIVE ANALYSIS BETWEEN TWO SECURITY MODELS OF NoSQL DATABASE
URI https://www.proquest.com/docview/2492241779
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2277-5250
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002964924
  issn: 2277-5110
  databaseCode: P5Z
  dateStart: 20111201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database (Proquest)
  customDbUrl:
  eissn: 2277-5250
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002964924
  issn: 2277-5110
  databaseCode: K7-
  dateStart: 20111201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: India Database (ProQuest)
  customDbUrl:
  eissn: 2277-5250
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002964924
  issn: 2277-5110
  databaseCode: 04Q
  dateStart: 20111201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/indianjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2277-5250
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002964924
  issn: 2277-5110
  databaseCode: BENPR
  dateStart: 20111201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwELWgZWDhQ4AolMoDEpPb1PlwPCFaWiGBopZ2qFgsx7GlItSUJsDf55wPUBcWMkSKkiF6ie-9853uIXTNHU4VDRJiVBwSz5WaSJ9zElOqDEgIpoLSbIJFUbhY8Em14ZZVbZV1TCwCdZIqu0fes5PtgG0Y47frd2Jdo2x1tbLQ2EVNy1N2YTre9GePxZYUeeFrS22lErSFU85tBFZyvd7rMu_yLu32QXL727y0HZYLrhkf_vctj9BBpTLxXflbHKMdvTpBg2HpOWgDHK6HkeCqUQvPv1I8q8zssHVIe8twanCUzqZP-F7m0vLdKZqPR_PhA6ksFIgKGCcqdqUxfU2N0jHwDgc0Yl9r0E0ygAc8xZMwprEndRyCNEwS6WkNqsMEijIIhmeosUpX-hxhFw6qZKAT5UJOyO0cPEeHJgg9ZRJGW-imxk-sy0EZAhKMAmkBSAsuqCiQbqF2jZ2oFkwmfoG7-Pv2JdqnNuUt2sDaqJFvPvQV2lOf-TLbdIrv30HNwSiaPMPVIyNwnvgv3_E8u3Q
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V09T8MwELWqggQLHwJEoYAHEJP74aRJPCAELVWrlgjUDt0sx7GlItSUJlDxo_iPnPMB6sLWgazJEOVd3rvz2fcQumQNRiV1QqJl4BHbEoqIFmMkoFRqSCFc6WRmE67ve5MJeyqhr-IsjNlWWXBiStRhJM0aed1MtgO1cV12O38jxjXKdFcLC40sLAbqcwklW3zT7wC-V5R2H8btHsldBYh0XEZkYAmtm4pqqQKgYgYFSNBSClIJ4cADtmShF9DAFirwIFsKQ2ErBUKsHUndpjGJAMbfsC3PMT_UwCU_Szqmg8lSG11qGqOQyjSyMZEggpZdf5kmNVajtSZk-K1VGVxVgVTaurv_7KPsoZ08h8Z3WdDvo5KaHaD7duaoaOgbF6NWcL4NDY-XER7lVn3Y-L-9xjjS2I9Gz0PcEYkwan6Ixut46yNUnkUzdYywBReVwlGhtKDiZWbKX0N52vFsqUOXVtB1ARefZ2NAOJRPKbAcgOWMU54CW0HVAiqe00HMf3E6-fv2BdrqjR-HfNj3B6dom5riPt3wVkXlZPGuztCm_Eim8eI8DT2M-JpR_QZgzBW9
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comparitive+Analysis+between+Two+Security+Models+of+NoSQL+Database&rft.jtitle=I-Manager%27s+Journal+on+Information+Technology&rft.au=Rao%2C+M+Somasundara&rft.au=Rao%2C+K+Venkata&rft.au=M+H+M+Krishna+Prasad&rft.date=2020-03-01&rft.pub=iManager+Publications&rft.issn=2277-5110&rft.eissn=2277-5250&rft.volume=9&rft.issue=2&rft.spage=12&rft_id=info:doi/10.26634%2Fjit.9.2.17685
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2277-5110&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2277-5110&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2277-5110&client=summon