Using MongoDB to Understand the Underlying Methods Techniques Encryption in NoSQL database
Author
Shahida B
Abstract
There
is a need for appropriate encryption methods, which must be adhered by the
concerned parties, in order to provide a high level of security for the secret
data. In this study, an examination of the different encryption algorithms and
their performance in the management of private data with authentication, access
control, secure configuration, and data encryption is presented. It includes
enhancing MongoDB's level-based access protected model and adding privacy keys
for security and monitoring purposes respectively. The NoSQL data stores, also
known as highly compressed data on non-relational database management systems,
which provide support for data management of internet user programs, do not now
offer this service. Data security, encryption techniques, MongoDB, and NoSQL
are some of the keywords that come to mind.The proper encryption methods used
to various crucial data fields provide data protection without adversely
affecting the database's performance in terms of speed or memory usage. Due to
the use of appropriate encryption techniques, this is achievable. Since
document-oriented and unstructured data are generally kept in databases, it is
frequently used to handle various sorts of data. Examples of such databases
include MongoDB, Cassandra, CouchDB, Redis, Hyper-table, and others. Since they
are open source, there is a critical necessity to offer good security and
protect the user's private information when it is in transit or at rest. There
is a need for a single solution that can improve the security of data transfer
by providing an improved encryption method that speeds up processes and uses
less memory when maintaining databases.
Keywords
NoSQL database, MongoDB, CouchDB, Column Database, Key-value Database, Big Data, Big Data Analytics, RDBMS, and NoSQL
DOI : https://doi.org/10.55248/gengpi.2022.3.9.23
Full Text:
Download Paper PDF
References
[1] Abramova, V., &
Bernardino, J. (2013, July). NoSQL databases: MongoDB vs Cassandra. In
Proceedings of the international C* conference on computer science and software
engineering (pp. 14-22).
[2] Ali, W., Shafique, M. U.,
Majeed, M. A., & Raza, A. (2019). Comparison between SQL and NoSQL
Databases and Their Relationship with Big Data Analytics. Asian Journal of
Research in Computer Science, 4(2), 1-10
[3] Becker, M. Y., &
Sewell, P. (2004, June). Cassandra: Flexible trust management, applied to
electronic health records. In Proceedings. 17th IEEE Computer Security
Foundations Workshop, 2004. (pp. 139-154). IEEE.
[4] Berg, K. L., Seymour, T.,
& Goel, R. (2013). History of databases. International Journal of
Management & Information Systems (IJMIS), 17(1), 29-36.
[5] Bjeladinovic, S.,
Marjanovic, Z., & Babarogic, S. (2020). A proposal of architecture for
integration and uniform use of hybrid SQL/NoSQL database components. Journal of
Systems and Software, 168, 110633.
[6] Chandra, D. G. (2015). BASE
analysis of NoSQL database. Future Generation Computer Systems, 52, 13-21.
[7] Chen, J. K., & Lee, W.
Z. (2019). An introduction of NoSQL databases based on their categories and
application industries. Algorithms, 12(5), 106.
[8] Cuzzocrea, A., &
Shahriar, H. (2017, December). Data masking techniques for NoSQL database
security: A systematic review. In 2017 IEEE International Conference on Big
Data (Big Data) (pp. 4467-4473). IEEE.
[9] de Oliveira, V. F., Pessoa,
M. A. D. O., Junqueira, F., & Miyagi, P. E. (2021). SQL and NoSQL Databases
in the Context of Industry 4.0. Machines, 10(1), 20.
[10] Deka, G. C. (2013). A
survey of cloud database systems. It Professional, 16(2), 50-57. IEEE.
[11] Di Martino, S., Fiadone,
L., Peron, A., Riccabone, A., & Vitale, V. N. (2019, June). Industrial
Internet of Things: Persistence for Time Series with NoSQL Databases. In 2019
IEEE 28th International Conference on Enabling Technologies: Infrastructure for
Collaborative Enterprises (WETICE) (pp. 340-345). IEEE.
[12] dos Santos Ferreira, G.,
Calil, A., & dos Santos Mello, R. (2013, December). On providing DDL
support for a relational layer over a document NoSQL database. In Proceedings
of International Conference on Information Integration and Web-based
Applications & Services (pp. 125-132).
[13] Gessert, F., Wingerath,
W., Friedrich, S., & Ritter, N. (2017). NoSQL database systems: a survey
and decision guidance. Computer Science-Research and Development, 32(3),
353-365.
[14] Guimaraes, V., Hondo, F.,
Almeida, R., Vera, H., Holanda, M., Araujo, A., ... & Lifschitz, S. (2015,
November). A study of genomic data provenance in NoSQL document-oriented
database systems. In 2015 IEEE International Conference on Bioinformatics and
Biomedicine (BIBM) (pp. 1525-1531). IEEE.
[15] Rodriguez, K. M., Reddy,
R. S., Barreiros, A. Q., & Zehtab, M. (2012, June). Optimizing Program
Operations: Creating a Web-Based Application to Assign and Monitor Patient
Outcomes, Educator Productivity and Service Reimbursement. In DIABETES (Vol.
61, pp. A631-A631). 1701 N BEAUREGARD ST, ALEXANDRIA, VA 22311-1717 USA: AMER
DIABETES ASSOC.
[16] Kwon, D., Reddy, R., &
Reis, I. M. (2021). ABCMETAapp: R shiny application for simulation-based
estimation of mean and standard deviation for meta-analysis via approximate
Bayesian computation. Research synthesis methods, 12(6), 842–848.
https://doi.org/10.1002/jrsm.1505
[17] Reddy, H. B. S., Reddy, R.
R. S., Jonnalagadda, R., Singh, P., & Gogineni, A. (2022). Usability
Evaluation of an Unpopular Restaurant Recommender Web Application Zomato. Asian
Journal of Research in Computer Science, 13(4), 12-33.
[18] Reddy, H. B. S., Reddy, R.
R. S., Jonnalagadda, R., Singh, P., & Gogineni, A. (2022). Analysis of the
Unexplored Security Issues Common to All Types of NoSQL Databases. Asian
Journal of Research in Computer Science, 14(1), 1-12.
[19] Singh, P., Williams, K., Jonnalagadda, R.,
Gogineni, A., &; Reddy, R. R. (2022). International students: What’s
missing and what matters. Open Journal of Social Sciences, 10(02),
[20] Jonnalagadda, R., Singh,
P., Gogineni, A., Reddy, R. R., & Reddy, H. B. (2022). Developing,
implementing and evaluating training for online graduate teaching assistants
based on Addie Model. Asian Journal of Education and Social Studies, 1-10.
[21] Sarmiento, J. M.,
Gogineni, A., Bernstein, J. N., Lee, C., Lineen, E. B., Pust, G. D., &
Byers, P. M. (2020).Alcohol/illicit substance use in fatal motorcycle crashes.
Journal of surgical research, 256, 243-250.
[22] Brown, M. E., Rizzuto, T.,
& Singh, P. (2019). Strategic compatibility, collaboration and collective
impact for community change. Leadership & Organization Development Journal.
[23] Sprague-Jones, J., Singh,
P., Rousseau, M., Counts, J., & Firman, C. (2020). The Protective Factors
Survey: Establishing validity and reliability of a self-report measure of
protective factors against child maltreatment. Children and Youth Services
Review, 111, 104868
Share your valuable work from Social Media Buttons