Preview

Security Issues in NoSQL Databases

Good Essays
Open Document
Open Document
851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues in NoSQL Databases
Security Issues in NoSQL Databases
Lior Okman
Deutsche Telekom Laboratories at Ben-Gurion University,
Beer-Sheva, Israel
Nurit Gal-Oz, Yaron Gonen, Ehud Gudes
Deutsche Telekom Laboratories at Ben-Gurion University, and Dept of Computer Science,
Ben-Gurion University,
Beer-Sheva, Israel
Jenny Abramov
Deutsche Telekom Laboratories at Ben-Gurion University and
Dept of Information Systems Eng.
Ben-Gurion University,
Beer-Sheva, Israel
Abstract—The recent advance in cloud computing and distributed web applications has created the need to store large amount of data in distributed databases that provide high availability and scalability. In recent years, a growing number of companies have adopted various types of non-relational databases, commonly referred to as NoSQL databases, and as the applications they serve emerge, they gain extensive market interest.
These new database systems are not relational by definition and therefore they do not support full SQL functionality. Moreover, as opposed to relational databases they trade consistency and security for performance and scalability. As increasingly sensitive data is being stored in NoSQL databases, security issues become growing concerns.
This paper reviews two of the most popular NoSQL databases
(Cassandra and MongoDB) and outlines their main security features and problems.
Index Terms—NoSQL; Security; Cassandra; MongoDB;
I. INTRODUCTION
The recent advance in cloud computing and distributed web applications has created the need to store large amount of data in distributed databases that provide high availability and scalability.
In recent years, a growing number of companies have adopted various types of non-relational databases, commonly referred to as NoSQL databases and as the applications they serve emerge, they gained extensive market interest. Different
NoSQL databases take different approaches. Their primary advantage is that, unlike relational databases, they handle

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A database is a digital storage area that helps people keep track of things. A database can also be considered a digital list because in the real world work environment keeping track of lists is very valuable to an organization but in other cases a simple list is not agile and versatile enough to avoid data inconsistencies and other problems that may arise. Databases are valuable because they are not only objects that remain in list form; but also a tool that can be split into table data that may then help to solve organizational problems that lead to more efficient business operation. The best way to organize valuable information within an organization is rational database tables because they are designed to solve all of the problems and limitations that comes with simple lists.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Databases are defined as: a usually large collection of data organized especially for rapid search and retrieval (as by a computer). Without databases the world of technology wouldn’t be as far along as it is. Databases are used in every organization, online websites, home computer systems, and other various ones. The contents of this paper will analyze the use of Modernized Integrated Database (MIDB) within L3 Communications, Titan’s, Product Support Team (PST) in reference to Global Command and Control Systems-Maritime (GGCS-M).…

    • 758 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Relational Databases

    • 4830 Words
    • 20 Pages

    Contrast the logical and the physical view of data and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following employees: a programmer, a manager, and an internal auditor. How will understanding logical data structures assist you when designing and using database systems?</para></question><question id="ch04ques02" label="4.2">…

    • 4830 Words
    • 20 Pages
    Better Essays
  • Better Essays

    This paper is trying to demonstrate how Airavat, a MapReduce-based system for distributed computations provides end-to-end confidentiality, integrity, and privacy guarantees using a combination of mandatory access control and differential privacy which provides security and privacy guarantees against data leakage.…

    • 762 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles of IT Seurity, 2012). Ensure the physical security of the data and telecommunications centers and resources. By regulate authorized access to resources through security measures such as user IDs, passwords, and digital certificates. Also by implement auditable authorization processes that adhere to policies provide security awareness training and resources. Keep the Security Department informed of any system/data custodian issues concerning access rules and security violations.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Database Concepts

    • 1636 Words
    • 7 Pages

    4) An advantage of keeping data in lists is that if you add a new row of data to the list you will never have null values occurring for any data item in the row.…

    • 1636 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Data Protection

    • 735 Words
    • 3 Pages

    Data can be collected by organisations such as the websites we use daily, such as Facebook and Twitter. They have our information such as our age, date of birth, home address and other personal information which we would not share with strangers, and it is their job to protect that data, so that it doesn't get into the wrong hands, such as scammers. Organisations may collect information from you in a number of ways, over the internet, over the phone, or also in person. When the organisation collects your information, they should tell you what they information they are collecting and why they are collecting it and they should not use in a way that it is unfair to you.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data protection & security What is Data Protection and Security ? This is the protection of data such as database from accidental, unauthorised or malicious access Data Protection Act Data protection Act controls and monitors the way personal and customer information is been used by organisations.…

    • 343 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Integrity

    • 500 Words
    • 3 Pages

    This section describes the rules that can be applied to table columns to enforce different types of data integrity.…

    • 500 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NoSQL

    • 262 Words
    • 1 Page

    NoSQL (Not Only SQL) can be a great asset when it pertains to dealing with large amounts of data and its ability to be able to provide a better scalability and availability than the traditional RDBMS can make it a plus. But the down side of the perks that NoSQL provide may not make it the ultimate choice for many businesses. NoSQL ability to deliver faster access to data and easily is also an advantage for data storage. But due to its infrastructure of being nontraditional it raises concerns. Unlike most SQL systems NoSQL is not formally structured as its counterparts simply meaning it does not store data in an organized plan such as tables and rows. This makes it easier to store data more easily with multiple servers with an improved scalability. Because NoSQL lack of being structured in a formatted scheme it also lack confidentiality and integrity and the column or the rows cannot be segregated which may pose a challenge with user privileged access. Also, due to its scheme it lacks the capability of producing real time operations.…

    • 262 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Web Security Issues

    • 911 Words
    • 4 Pages

    This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.…

    • 911 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Big DATA

    • 460 Words
    • 2 Pages

    The amount of information being collected is so huge that modern database management tools are becoming overloaded and therefore obsolete. The need to find new ways of supporting big data helps explain the need for more data.…

    • 460 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Facebook trades your security and privacy for profit, so be careful of what you post and consider who is going to have access to it. Also, change your Facebook settings in as many areas possible so that the only people who can see what you post, are your friends. Companies like Facebook allow other businesses, for the right price, to scan through your posts and place advertisements accordingly. However, Facebook is allowing more and more people to have access to larger amounts of people’s accounts by no longer providing the option of opting out of information sharing freedoms. The larger issue is that, although people do not have to use social networking sites such as Facebook, they would be cut off from a great deal of society. This begs the question as to whether or not Facebook is worth the risks that include serious issues such as identity theft and smaller ones, such as an emotionally harmful comment. The best solution to this issue is to use Facebook, but be careful about how much information one reveals and to opt out of privacy sharing agreements whenever possible.…

    • 1797 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Database Notes

    • 652 Words
    • 3 Pages

    Database: specialized structures that allow computer-based systems to store, manage, and retrieve data very quickly.…

    • 652 Words
    • 3 Pages
    Good Essays