Challenges and Security Issues of NOsql Databases
Keywords:
Middleware,Validation, Database, Security, Authentication, Key-Value.Abstract
In this paper we will be discussing about what are the security problems in NOSQL, what concerns has to be taken care to solve the security issues in NOSQL while the data is in moving or in rest, during authentication and authorization. This paper also includes the vulnerabilities in NOSQL as well as Injections in NOSQL from which un-authorized person can breach the security. Multi model Heterogeneous problems explain the detail concept of the security issue when types of databases merge with each other. It includes the explanation of different layers exist in NOSQL with some particular databases issue. In last some currents issues or breaches in NOSQL has been explained.
References
- List of NoSQL Databases [currently 225]. (n.d.). Retrieved May 17, 2016, from http://nosql-database.org
- Main Page. (n.d.). Retrieved May 16, 2016, from http://en.wikipedia.org/wiki/Main_Page
- NoSQL, no security? (n.d.). Retrieved May 19, 2016, from http://www.slideshare.net/wurbanski/nosql-no-security
- Cassandra. (n.d.). Retrieved May 15, 2016, from http://cassandra.apache.org
- MongoDB for GIANT Ideas. (n.d.). Retrieved May 18, 2016, from http://mongodb.com
- Retrieved May 19, 2016, from http://www.youtube.com/?app=desktop
- Ron, A., Shulman-Peleg, A., & Bronshtein, E. (2015). No SQL, No Injections. 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015, doi:10.1109/msp.2015.06
- Ron, A., Shulman-Peleg, A., & Puzanov, A. (2016). Analysis and Mitigation of NoSQL Injections. IEEE Security & Privacy IEEE Secur. Privacy, 14(2), 30-39. doi:10.1109/msp.2016.36
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.