Security and privacy implications on database systems in big data era: A survey
GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …
model for data storage and management. However, as the Big Data explosion has …
Systematic identification of threats in the cloud: A survey
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
Automatic schema suggestion model for NoSQL document-stores databases
New generation databases also called NoSQL (Not only SQL) databases are highly
scalable, flexible, and low-latent. These types of databases emerge as a result of the rigidity …
scalable, flexible, and low-latent. These types of databases emerge as a result of the rigidity …
[PDF][PDF] A survey on detection and prevention of SQL and NoSQL injection attack on server-side applications
M Shachi, NS Shourav, ASS Ahmed… - … Journal of Computer …, 2021 - researchgate.net
Attacks concerning data can be considered as an intense security threat. A couple of major
cyberattacks on eminent database-driven web applications are SQL and NoSQL injection …
cyberattacks on eminent database-driven web applications are SQL and NoSQL injection …
Security analysis of unstructured data in NOSQL MongoDB database
NoSQL databases systems are non-relational databases uniquely intended to give high
accessibility, reliability, and scalability for enormous data. Additionally sharding is the main …
accessibility, reliability, and scalability for enormous data. Additionally sharding is the main …
NoSQL security: can my data-driven decision-making be influenced from outside?
A Nikiforova, A Daskevics, O Azeroual - … and Uses in the Public and …, 2023 - emerald.com
Nowadays, there are billions interconnected devices forming Cyber-Physical Systems
(CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an …
(CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an …
Privacy-breaching patterns in NoSQL databases
K Goel, AHM Ter Hofstede - IEEE Access, 2021 - ieeexplore.ieee.org
NoSQL databases disrupted the database market when first introduced. Their contemporary
relevance has increased further in the era of big data due to the demands placed on (real …
relevance has increased further in the era of big data due to the demands placed on (real …
Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation
Cloud computing environment offers many services which have attracted the criminals or
oppugners to commit cyber-crimes in a more sophisticated manner. Most of the crimes …
oppugners to commit cyber-crimes in a more sophisticated manner. Most of the crimes …
[PDF][PDF] Data modeling guidelines for NoSQL document-store databases
Good database design is key to high data availability and consistency in traditional
databases, and numerous techniques exist to abet designers in modeling schemas …
databases, and numerous techniques exist to abet designers in modeling schemas …
[图书][B] Big data in ehealthcare: challenges and perspectives
This book focuses on the different aspects of handling big data in healthcare. It showcases
the current state-of-the-art technology used for storing health records and health data …
the current state-of-the-art technology used for storing health records and health data …