An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

Author(s):  
Mamdouh Alenezi ◽  
Muhammad Usama ◽  
Khaled Almustafa ◽  
Waheed Iqbal ◽  
Muhammad Ali Raza ◽  
...  

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.

2019 ◽  
Vol 13 (2) ◽  
pp. 14-31
Author(s):  
Mamdouh Alenezi ◽  
Muhammad Usama ◽  
Khaled Almustafa ◽  
Waheed Iqbal ◽  
Muhammad Ali Raza ◽  
...  

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.


2021 ◽  
Vol 174 ◽  
pp. 1-12
Author(s):  
Hui Xie ◽  
Zhengyuan Zhang ◽  
Qi Zhang ◽  
Shengjun Wei ◽  
Changzhen Hu

Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 


2019 ◽  
Vol 8 (4) ◽  
pp. 5327-5330

MANETs is a network which has nodes. Communication is done without use of infrastructure. Quality based routing is developed which considers end to end qualitatiove data communication. A number of protocols were designed and suggested by researchers to achieve effective communication in MANETs. Considering number of quality factors as energy, trust, bandwidth etc a number of protocols are existing. But still there are number of factors those can consider to enhance the performance of the protocols used for the communication purpose. The existing schemes were effective enough but still as factors those were considering only the resources held by a node not the physical factors were present as node is to survive and communication in network. So further enhancements were possible by considering the physical parameters. Inspired from that in this paper a proposed scheme considering physical factor name as Distance is considered as the improvement to the traditional scheme. The distance factor is behaving as finding the physical presence of the node in the network also the distance factor will help to find the appropriate node for the next hop to communicate. A simulation is conducted in MATLAB software and performance factors as throughput and energy are analyzed, also an comparison with existing system is done and the results shows that the proposed scheme is effective enough to achieve QOS based routing with reduced energy consumption and high throughput.


2019 ◽  
pp. 353-388
Author(s):  
S. Vasavi ◽  
Mallela Padma Priya ◽  
Anu A. Gokhale

We are moving towards digitization and making all our devices, such as sensors and cameras, connected to internet, producing bigdata. This bigdata has variety of data and has paved the way to the emergence of NoSQL databases, like Cassandra, for achieving scalability and availability. Hadoop framework has been developed for storing and processing distributed data. In this chapter, the authors investigated the storage and retrieval of geospatial data by integrating Hadoop and Cassandra using prefix-based partitioning and Cassandra's default partitioning algorithm (i.e., Murmur3partitioner) techniques. Geohash value is generated, which acts as a partition key and also helps in effective search. Hence, the time taken for retrieving data is optimized. When users request spatial queries like finding nearest locations, searching in Cassandra database starts using both partitioning techniques. A comparison on query response time is made so as to verify which method is more effective. Results show the prefix-based partitioning technique is more efficient than Murmur3 partitioning technique.


Author(s):  
S. Vasavi ◽  
Mallela Padma Priya ◽  
Anu A. Gokhale

We are moving towards digitization and making all our devices, such as sensors and cameras, connected to internet, producing bigdata. This bigdata has variety of data and has paved the way to the emergence of NoSQL databases, like Cassandra, for achieving scalability and availability. Hadoop framework has been developed for storing and processing distributed data. In this chapter, the authors investigated the storage and retrieval of geospatial data by integrating Hadoop and Cassandra using prefix-based partitioning and Cassandra's default partitioning algorithm (i.e., Murmur3partitioner) techniques. Geohash value is generated, which acts as a partition key and also helps in effective search. Hence, the time taken for retrieving data is optimized. When users request spatial queries like finding nearest locations, searching in Cassandra database starts using both partitioning techniques. A comparison on query response time is made so as to verify which method is more effective. Results show the prefix-based partitioning technique is more efficient than Murmur3 partitioning technique.


Author(s):  
Peer Hasselmeyer ◽  
Gregory Katsaros ◽  
Bastian Koller ◽  
Philipp Wieder

The management of the entire service landscape comprising a Cloud environment is a complex and challenging venture. There, one task of utmost importance, is the generation and processing of information about the state, health, and performance of the various services and IT components, something which is generally referred to as monitoring. Such information is the foundation for proper assessment and management of the whole Cloud. This chapter pursues two objectives: first, to provide an overview of monitoring in Cloud environments and, second, to propose a solution for interoperable and vendor-independent Cloud monitoring. Along the way, the authors motivate the necessity of monitoring at the different levels of Cloud infrastructures, introduce selected state-of-the-art, and extract requirements for Cloud monitoring. Based on these requirements, the following sections depict a Cloud monitoring solution and describe current developments towards interoperable, open, and extensible Cloud monitoring frameworks.


Sign in / Sign up

Export Citation Format

Share Document