A framework for cloud database security

Author(s):  
Lin Dai ◽  
Shiyong Jin ◽  
Longjun Song ◽  
Shouchen Sun
2019 ◽  
pp. 165-187 ◽  
Author(s):  
Ganesh Chandra Deka

To get the desired benefits for the IT enterprise, NoSQL databases must be combined with proven and reliable SQL features into a single proven infrastructure meeting the manageability and security requirements of cloud computing. Various specifications, including SAML (Security Assertions Markup Language), improved interoperability across organizational boundaries are coming up. This chapter discuses some of the security issues of NoSQL databases. All the related technology used in the chapter are explained either where they appear or at the end of the chapter.


2014 ◽  
Vol 99 (14) ◽  
pp. 24-31 ◽  
Author(s):  
Murtala AminuBaba ◽  
Abdulrahman Yusuf ◽  
Aminu Ahmad ◽  
Ladan Maijama�a

Author(s):  
Ganesh Chandra Deka

To get the desired benefits for the IT enterprise, NoSQL databases must be combined with proven and reliable SQL features into a single proven infrastructure meeting the manageability and security requirements of cloud computing. Various specifications, including SAML (Security Assertions Markup Language), improved interoperability across organizational boundaries are coming up. This chapter discuses some of the security issues of NoSQL databases. All the related technology used in the chapter are explained either where they appear or at the end of the chapter.


2021 ◽  
pp. 15-29
Author(s):  
Mahmoud Ismail ◽  
◽  
◽  
◽  
Naif El El-Rashidy ◽  
...  

The rise in mobile Internet usage and increased reliance on cloud computing have led to increased fear of cloud database security. Mobile cloud computing has emerged as the only promising way of providing solutions for the mobile computing environment, including computation offloading and data binding. This paper discusses the overview of mobile cloud computing features and its prone computing security issues and how to walk over them with the most promising solutions. More specifically, it explores in detail a wide range of threats that may attack the mobile cloud-computing platform and the various devices and applications that work extremely well in supporting and mitigating the wide range of problems related to security issues in mobile applications. Moreover, this paper studies some of the ways to make mobile cloud computing more secure and productive no matter the intensity of the required computation. This study takes into consideration, the most common threats that affect the security issues of the mobile cloud database and its solutions. It is deemed necessary to note that, the duty of various cloud service providers is to keep all mobile cloud data safe. Consequently, they must come up with solutions to the problems affecting the day-to-day mobile cloud database security.


2020 ◽  
Vol 8 (5) ◽  
pp. 1361-1370 ◽  

In today’s era, the cloud database security is one of the main concerns for any of the real time data accessing web/mobile applications. The cloud database protection involves accessibility and vulnerability of data, data protection, storage space, integrity and confidentiality on sensitive data. Building an electronic voting system that tries to completely fulfill the needs of the people has always been a challenge to achieve. The existing E-Voting System (E-VS) is not that much compatible with that of the current trends and does not assure to provide more security A lot of distributed ledger technologies which has been an exciting approach during existing election voting process. If we take a look on the ways of implying E-VS in a distribute ledger then Blockchain would be the right choice. As we all know that nowadays, Blockchain is one of the emerging technologies in the field of Information Technology. It normally stores information in batches called blocks which are linked together in a chronological way or method to form chain of blocks using cryptography techniques. During online voting process, many fraudulent activities happens which corrupt the entire election process. One of the major problems faced are fake voting which is obviously done by unauthorized people, inconvenient to reach to the respective places, average security level which may lead to the chances of an electoral fraud or any other malpractices.. Our proposed E-Voting System is mainly to protect the cloud database for real time data and to reduce the time consumption in voting and vote counting processes. Instead of standing in the queue for casting the vote, people can cast their votes from anywhere they want through online. The E-VS gives complete privacy and security for the online voting and makes it an ease for every individual to access it and cast their votes from anywhere possible with full pronounced security. In our proposed E-VS, Blockchain security concept called Consensus algorithm is implemented which makes it impossible for any unwanted activities to occur during election process. The E-VS system also achieves a higher level of security. Hence, the proposed system achieves data integrity, data confidentiality, eliminates storage overhead, and reduces time consumption for overall electronic voting system.


2003 ◽  
Author(s):  
Jeffrey Worst ◽  
R. Jason Weiss
Keyword(s):  

2018 ◽  
Vol 7 (2) ◽  
pp. 155
Author(s):  
Guntoro Barovih ◽  
Salimin Salimin

Maraknya peredaran obat ilegal membuat resah pemerintah dan masyarakat. Perlu adanya payung hukum untuk memberantas peredaran obat ilegal ini. Selain payung hukum yang kuat diperlukan juga mekanisme pengawasan pengawasan obat yang baik. Penelitian ini memcoba menciptakan suatu sistem pengawasan obat yang menghubungkan setiap stackholder farmasi mulai dari industri farmasi hingga instalasi sediaan farmasi dan terintegrasi pada dua instansi pemerintah yaitu DinKes dan BPOM selaku badan pengawasan melalui infrastruktur Cloud. Sistem yang dibangun menggunakan metode Togaf ADM dengan melibatkan 4 tahapan didalamnya. Untuk menjamin apakah sistem yang dibangun memiliki konsistensi yang baik maka dilakukan pengujian performa server dengan menggunakan parameter Quality of Service. Hasil dari penelitian ini menjabarkan bentuk model database yang bisa digunakan di platform aplikasi yang berbeda serta hasil pengujian performa yang didapatkan nilai dari parameter yang digunakan memenuhi standar tiphon dengan kategori sangat baik, sehingga konsistensi data yang tersimpan akan bernilai positif atau konsistensi data bisa terjamin.


Sign in / Sign up

Export Citation Format

Share Document