Organizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only...
详细信息
Organizing the storing of information and data retrieval from databases is a crucial issue, which has become more critical with the spreading of cloud and Internet of Things (IoT) based applications. In fact, not only the network's traffic has increased, but also the amount of memory and the mechanisms needed to manage the so-called Big Data efficiently. Relational databases, based on SQL, are giving way to the nosql ones due to their efficiency in managing the heterogeneous information gathered from IoT environments. Such data can be stored, in a distributed manner, within the IoT network's devices or in the cloud. Hence, security and privacy concerns naturally emerge regarding access control, authentication, and authorization requirements. This paper analyzes the current state of the art of security and privacy solutions tailored to nosql databases, particularly Redis, Cassandra, MongoDB, and Neo4j stores. The paper also aims to shed light on current challenges and future research directions in the field databases' security in the IoT scenario.
nosql databases are gaining popularity in recent times for their ability to manage high volumes of unstructured data efficiently. This necessitates such databases to have strict data security mechanisms. Attribute-Bas...
详细信息
ISBN:
(纸本)9781450381437
nosql databases are gaining popularity in recent times for their ability to manage high volumes of unstructured data efficiently. This necessitates such databases to have strict data security mechanisms. Attribute-Based Access Control (ABAC) has been widely appreciated for its high flexibility and dynamic nature. We present an approach for integrating ABAC into nosql databases, specifically MongoDB, that typically only support Role-Based Access Control (RBAC). We also discuss an implementation and performance results for ABAC in MongoDB, while emphasizing that it can be extended to other nosql databases as well.
This paper presents a logical database design methodology for a MongoDB nosql database. Given a query, the design methodology is able to assist database designers to determine the best set of configurations of data, a...
详细信息
ISBN:
(纸本)9781665437714
This paper presents a logical database design methodology for a MongoDB nosql database. Given a query, the design methodology is able to assist database designers to determine the best set of configurations of data, also known elsewhere as scheme trees, in the database such that the retrieval time of the query can be minimal or reduced. The design methodology first models an application of interest with a conceptual model. Based on our previous researches, the design methodology then generates from the conceptual model as few scheme trees as possible, which will eventually be implemented as MongoDB's collections in the database. To illustrate the design methodology, the COVID-19 data set was downloaded as an example application. The design methodology first conceptualized the data set with an Entity-Relationship model. Multiples queries were then devised to access various parts of the date set, whose executions required retrievals of the attribute values of all or some of the entity types and/or the relationship in the ER model. The design methodology then generated the best sets of scheme trees for the queries.
For over four decades, Relational database management systems RDBMS have been the primary model for data storage, retrieval and management. However, due to the continuous information growth in current organizations an...
详细信息
ISBN:
(纸本)9781665419956
For over four decades, Relational database management systems RDBMS have been the primary model for data storage, retrieval and management. However, due to the continuous information growth in current organizations and the increasing needs for scalability and performance, specially while handling a very huge amount of data that generated by various new generation real time applications or social networking sites that could be unstructured or semi-structured data, poses a set of challenges to the existing RDBMS Vendors. Such challenges have created a need for adaptation alternative technologies in the field of data storage and manipulation. nosql technology is the alternative category of Database Management Systems that have been emerged as the solution to the ever-growing data requirements. In this paper, the advantages and the limitations of relational databases we will be presented. The nosql data model, types of nosql data stores, characteristics of each data store, advantages and disadvantages of nosql over RDBMS will also be discussed. The paper helps the interest users to take a review of the different database model solutions, which can serve as a base for selecting the proper database model that can satisfy their application requirements.
Digital forensics is the procedure of collecting, analysing and providing proper documentation of all valid digital evidence from electronic devices such as computers, smartphones, cameras and networks of these device...
详细信息
ISBN:
(数字)9798350371406
ISBN:
(纸本)9798350371413
Digital forensics is the procedure of collecting, analysing and providing proper documentation of all valid digital evidence from electronic devices such as computers, smartphones, cameras and networks of these devices. nosql forensics is the process of analysing and extracting data from non-relational databases, such as MongoDB, Cassandra, or Redis. nosql forensics can be used for various purposes, such as investigating cybercrimes, auditing security breaches, or recovering lost data. nosql forensics requires specialised tools and techniques to deal with the challenges of schema-less, distributed, and heterogeneous data models. In this paper, we propose a six-phase forensic investigation framework for the wide-column store nosql DBMS. Unlike previous studies that focused on specific aspects of nosql forensics, such as transaction log analysis or deleted data recovery, our framework covers the entire process of forensic investigation, from preparation to reporting. We also address the challenges of identifying and analysing distributed evidence in a nosql environment, which is different from the relational DBMS. Our framework applies to various documents as well as wide-column store nosql DBMSs, such as MongoDB, CouchDB, and Cassandra. To demonstrate its effectiveness, we conduct a case study using Cassandra as an example.
Modeling is one of the most important steps in developing a database. In traditional databases, the Entity Relationship (ER) and Unified Modeling Language (UML) models are widely used. But how are nosql databases bein...
详细信息
Modeling is one of the most important steps in developing a database. In traditional databases, the Entity Relationship (ER) and Unified Modeling Language (UML) models are widely used. But how are nosql databases being modeled? We performed a systematic mapping review to answer three research questions to identify and analyze the levels of representation, models used, and contexts where the modeling process occurred in the main categories of nosql databases. We found 54 primary studies where we identified that conceptual and logical levels received more attention than the physical level of representation. The UML, ER, and new notation based on ER and UML were adapted to model nosql databases, in the same way, formats such as JSON, XML, and XMI were used to generate schemas through the three levels of representation. New contexts such as benchmark, evaluations, migration, and schema generation were identified, as well as new features to be considered for modeling nosql databases, such as the number of records by entities, CRUD operations, and system requirements (availability, consistency, or scalability). Additionally, a coupling and co-citation analysis was carried out to identify relevant works and researchers.
databases are a fundamental part of the systems of organizations, companies or enterprises, therefore, the importance of a suitable selection of the database manager to use implies the correct functioning of the syste...
详细信息
databases are a fundamental part of the systems of organizations, companies or enterprises, therefore, the importance of a suitable selection of the database manager to use implies the correct functioning of the system and a factor of business success. This work is focused on measuring the performance between SQL and nosql databases by executing several tests defined in different scenarios, which differ in the number of clients and the number of transactions that will increase in each scenario and also the definition of benchmarks for hardware such as CPU usage, disk I / O, memory and software such as, response time, number of operations successfully executed; which will allow a comparative analysis between SQL and nosql databases or what is known as database benchmarking, obtaining a clearer view of the behavior and consumption of resources of each database manager.
One of the most important considerations when selecting a database is how relational (SQL) and non-relational (nosql) data structures will interact. While all options are viable, consumers should take certain distinct...
详细信息
ISBN:
(纸本)9781665490597
One of the most important considerations when selecting a database is how relational (SQL) and non-relational (nosql) data structures will interact. While all options are viable, consumers should take certain distinctions into account before choosing. Since SQL databases are vertically scalable, you can typically scale server components like CPU, RAM, or SSD. nosql databases, on the other hand, support horizontal scaling. As a result, you can increase the capacity of your nosql database by fragmenting (data partitioning), or by adding extra servers. Why, then, is it still challenging to choose the instance that is most appropriate for a given application and requires the least amount of runtime? Because data that will be conveyed via the internet uses a cloud in computer networks as a metaphor. To determine which model to utilize, it is required to conduct a comparison study of SQL-oriented database engines. SQL has a form created for another side of non-productive data and is offered in the form of ordered data, but nosql databases are horizontally expandable. Workload management solutions are therefore also in charge of automating organizational procedures, i.e., they carry out activities without requiring manual employee attendance. For businesses trying to implement continuous delivery methods and enhance the effectiveness of customer service delivery, they are unavoidable.
Over the past few years, data has been growing significantly due to the advent of new connected devices, availability of bandwidth, and the emergence of new applications which utilize cloud computing infrastructure in...
详细信息
Over the past few years, data has been growing significantly due to the advent of new connected devices, availability of bandwidth, and the emergence of new applications which utilize cloud computing infrastructure in the data centers. This increased amount of data faces many problems in terms of storage, transmission, management, and processing, etc. Therefore, the term big data has gained significant attention from researchers in recent years. The rapidly growing quantity, velocity, and variety of data require more probable and logical tools for its storage. For this purpose, the industry is highly emphasizing the development of more viable tools for the storage of big data. The traditional big data storage tools are unsuccessful in storing an enormous amount of data. Hence, the structural modifications of management mechanisms of conventional storage systems such as SQL databases to nosql databases technology are necessary to cope up with drastically increasing requirements of big data storage. The primary objective of this paper is to concentrate exclusively on designing a road map for nosql big data storage technologies, evaluate current evidence, research progresses in nosql data storage systems and their applications in various domains. We conducted a systematic literature review (SLR) of various studies published in recent years. We propose a framework to classify selected articles on the basis of various factors such as motivations behind big data storage, nosql techniques used for storing big data, and significant applications of big data in different domains. Furthermore, we also discuss research issues and define an outline for future research in the big data storage domain for nosql databases.
nosql technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and u...
详细信息
nosql technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and unstructured data. Unfortunately, most developments over nosql technologies consider security as an afterthought, putting at risk personal data of individuals and potentially causing severe economic loses as well as reputation crisis. In order to avoid these situations, companies require an approach that introduces security mechanisms into their systems without scrapping already in-place solutions to restart all over again the design process. Therefore, in this paper we propose the first modernization approach for introducing security in nosql databases, focusing on access control and thereby improving the security of their associated information systems and applications. Our approach analyzes the existing nosql solution of the organization, using a domain ontology to detect sensitive information and creating a conceptual model of the database. Together with this model, a series of security issues related to access control are listed, allowing database designers to identify the security mechanisms that must be incorporated into their existing solution. For each security issue, our approach automatically generates a proposed solution, consisting of a combination of privilege modifications, new roles and views to improve access control. In order to test our approach, we apply our process to a medical database implemented using the popular document-oriented nosql database, MongoDB. The great advantages of our approach are that: (1) it takes into account the context of the system thanks to the introduction of domain ontologies, (2) it helps to avoid missing critical access control issues since the analysis is performed automatically, (3) it reduces the effort and costs of the modernization process thanks to the automated steps in the process, (4) it can be u
暂无评论