Asian Journal of Research in Computer Science

  • About
    • About the Journal
    • Submissions & Author Guideline
    • Accepted Papers
    • Editorial Policy
    • Editorial Board Members
    • Reviewers
    • Propose a Special Issue
    • Reprints
    • Subscription
    • Membership
    • Publication Ethics and Malpractice Statement
    • Digital Archiving Policy
    • Contact
  • Archives
  • Indexing
  • Publication Charge
  • Submission
  • Testimonials
  • Announcements
Advanced Search
  1. Home
  2. Archives
  3. 2022 - Volume 14 [Issue 1]
  4. Original Research Article

Submit Manuscript


Subscription



  • Home Page
  • Author Guidelines
  • Editorial Board Member
  • Editorial Policy
  • Propose a Special Issue
  • Membership

Analysis of the Unexplored Security Issues Common to All Types of NoSQL Databases

  • Hima Bindu Sadashiva Reddy
  • Roopesh Reddy Sadashiva Reddy
  • Ratnaditya Jonnalagadda
  • Pallavi Singh
  • Avinash Gogineni

Asian Journal of Research in Computer Science, Page 1-12
DOI: 10.9734/ajrcos/2022/v14i130323
Published: 24 May 2022

  • View Article
  • Download
  • Cite
  • References
  • Statistics
  • Share

Abstract


NoSQL databases outperform the traditional RDBMS due to their faster retrieval of large volumes of data, scalability, and high performance. The need for these databases has been increasing  in recent years because data collection is growing tremendously. Structured, unstructured, and semi- structured data storage is allowed in NoSQL, which is not possible in a traditional database. NoSQL needs to compensate with its security feature for its amazing functionalities of faster data access and large data storage. The main concern exists in sensitive information stored in the data. The need to protect this sensitive data is crucial for confidentiality and privacy problems. To understand the severity of preserving sensitive data, recognizing the security issues is important. These security issues, if not resolved, will cause data loss, unauthorized access, database crashes by hackers, and security breaches. This paper investigates the security issues common to the top twenty NoSQL databases of the following types: document, key-value, column, graph, object- oriented, and multi-model. The top twenty NoSQL databases studied were MongoDB, Cassandra, CouchDB, Hypertable, Redis, Riak, Neo4j, Hadoop HBase, Couchbase, MemcacheDB, RavenDB, Voldemort, Perst, HyperGraphDB, NeoDatis, MyOODB, OrientDB, Apache Drill, Amazon, and Neptune. The comparison results show that there are common security issues among the databases. SQL injection security issues were detected in eight databases. The names of the databases were MongoDB, Cassandra, CouchDB, Neo4j, Couchbase, RavenDB, OrientDB, and Apache Drill.


Keywords:
  • NoSQL
  • security issues
  • document
  • key-value
  • column
  • graph
  • object-oriented
  • multi-model databases
  • Full Article – PDF
  • Review History

How to Cite

Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R., Singh, P., & Gogineni, A. (2022). Analysis of the Unexplored Security Issues Common to All Types of NoSQL Databases. Asian Journal of Research in Computer Science, 14(1), 1-12. https://doi.org/10.9734/ajrcos/2022/v14i130323
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

References

Berg KL, Seymour T, Goel R. History of databases. International Journal of Management & Information Systems (IJMIS). 2013;17(1):29-36.

Chandra DG. BASE analysis of NoSQL database. Future Generation Computer Systems. 2015;52:13-21.

De Oliveira VF, Pessoa MADO, Junqueira F, Miyagi PE. SQL and NoSQL Databases in the Context of Industry 4.0. Machines. 2021;10(1):20.

Raut ABPD. NOSQL database and its comparison with RDBMS. International Journal of Computational Intelligence Research. 2017;13(7):1645-1651.

Han J, Haihong E, Le G, Du J. Survey on NoSQL database. In 2011 6th international conference on pervasive computing and applications. IEEE. 2011; 363-366.

Bjeladinovic S, Marjanovic Z, Babarogic S. A proposal of architecture for integration and uniform use of hybrid SQL/NoSQL database components. Journal of Systems and Software. 2020;168:110633.

Matallah H, Belalem G, Bouamrane K. Comparative study between the MySQL relational database and the MongoDB NoSQL database. International Journal of Software Science and Computational Intelligence (IJSSCI). 2021;13(3):38-63.

Ali W, Shafique MU, Majeed MA, Raza A. Comparison between SQL and NoSQL Databases and Their Relationship with Big Data Analytics. Asian Journal of Research in Computer Science. 2019;4(2):1-10.

Chen JK, Lee WZ. An introduction of NoSQL databases based on their categories and application industries. Algorithms. 2019;12(5):106.

Gessert F, Wingerath W, Friedrich S, Ritter N. NoSQL database systems: a survey and decision guidance. Computer Science-Research and Development. 2017;32(3): 353-365.

Deka GC. A survey of cloud database systems. It Professional. IEEE. 2013; 16(2):50-57.

Okman L, Gal-Oz N, Gonen Y, Gudes E, Abramov J. Security issues in NoSQL databases. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. 2011;541-547.

Rao S, Suma SN, Sunitha M. Security solutions for big data analytics in healthcare. In 2015 Second International Conference on Advances in Computing and Communication Engineering. IEEE. 2015;510-514.

Hou B, Shi Y, Qian K, Tao L. Towards analyzing MongoDB NoSQL security and designing injection defense solution. In 2017 IEEE 3rd International Conference on Big Data Security on Cloud (bigdatasecurity), IEEE International Conference on High Performance and Smart Computing (hpsc), and IEEE International Conference on Intelligent Data and Security (ids). IEEE. 2017;90-95.

Abramova V, Bernardino J. NoSQL databases: MongoDB vs Cassandra. In Proceedings of the International C* Conference on Computer Science and Software Engineering. 2013;14-22.

Noiumkar P, Chomsiri T. A comparison the level of security on top 5 open source NoSQL databases. In The 9th International Conference on Information Technology and Applications (ICITA); 2014.

Dos Santos Ferreira G, Calil A, dos Santos Mello R. On providing DDL support for a relational layer over a document NoSQL database. In Proceedings of International Conference on Information Integration and Web- based Applications & Services. 2013;125-132.

Mason RT. NoSQL databases and data modeling techniques for a document-oriented NoSQL database. In Proceedings of Informing Science & IT Education Conference (InSITE). 2015;3(4):259-268.

Guimaraes V, Hondo F, Almeida R, Vera H, Holanda M, Araujo A, Lifschitz S. A study of genomic data provenance in NoSQL document-oriented database systems. In 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). IEEE. 2015;1525-1531.

Kumar J, Garg V. Security analysis of unstructured data in NoSQL MongoDB database. In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN). IEEE. 2017;300-305.

Tian X, Huang B, Wu M. A transparent middleware for encrypting data in MongoDB. In 2014 IEEE Workshop on Electronics, Computer and Applications. IEEE. 2014;906-909.

Zahid A, Masood R, Shibli MA. Security of sharded NoSQL databases: A comparative analysis. In 2014 Conference on Information Assurance and Cyber Security (CIACS). IEEE. 2014;1-8.

Lim H, Fan B, Andersen DG, Kaminsky M. SILT: A memory-efficient, high-performance key- value store. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. 2011;1-13.

Zaki AK, Indiramma M. A novel Redis security extension for NoSQL database using authentication and encryption. In 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE. 2015;1-6.

Müller S, Bermbach D, Tai S, Pallas F. Benchmarking the performance impact of transport layer security in cloud database systems. In 2014 IEEE International Conference on Cloud Engineering. IEEE. 2014;27-36.

Sahafizadeh E, Nematbakhsh MA. A survey on security issues in big data and NoSQL. Advances in Computer Science: An International Journal. 2015;4(4):68-72.

Pallas F, Günther J, Bermbach D. Pick your choice in HBase: Security or performance. In 2016 IEEE International Conference on Big Data (Big Data). IEEE. 2016;548-554.

Vicknair C, Macias M, Zhao Z, Nan X, Chen Y, Wilkins D. A comparison of a graph database and a relational database: a data provenance perspective. In Proceedings of the 48th annual Southeast Regional Conference 2010;1-6.

Hurlburt G. High tech, high sec.: Security concerns in graph databases. IT Professional. IEEE. 2015;1:58-61.

Di Martino S, Fiadone L, Peron A, Riccabone A, Vitale VN. Industrial Internet of Things: Persistence for Time Series with NoSQL Databases. In 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE. 2019;340-345.

Becker MY, Sewell P. Cassandra: Flexible trust management, applied to electronic health records. In Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004. IEEE. 2004;139-154.

Cuzzocrea A, Shahriar H. Data masking techniques for NoSQL database security: A systematic review. In 2017 IEEE International Conference on Big Data (Big Data). IEEE. 2017;4467-4473.

Lourenço JR, Cabral B, Carreiro P, Vieira M, Bernardino J. Choosing the right NoSQL database for the job: a quality attribute evaluation. Journal of Big Data. 2015;2(1):18.

Morgado C, Baioco GB, Basso T, Moraes R. A security model for access control in graph-oriented databases. In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE. 2018;135-142.
  • Abstract View: 87 times
    PDF Download: 26 times

Download Statistics

Downloads

Download data is not yet available.
  • Linkedin
  • Twitter
  • Facebook
  • WhatsApp
  • Telegram
Make a Submission / Login
Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue
  • Atom logo
  • RSS2 logo
  • RSS1 logo


© Copyright 2010-Till Date, Asian Journal of Research in Computer Science. All rights reserved.