Open Access Open Access  Restricted Access Subscription or Fee Access

“Data Management Privacy Control in MongoDB”

Kusum Kakwani, Naziya Pathan, Shyam Dubey

Abstract


Space, Time and Privacy are important keys for data management systems. The NoSQL data management systems, has highly compress data with non relational database management systems, which often support data management of web applications, still do not provide support. It consists of the enhancement of the MongoDB level based access control model with privacy keys for security and monitor. The proposed monitor is easily used into any MongoDB deployment control with high protection for data security. In recent years, database obtrusion has become a crucial feature in computing. Since the rapid data growth and need to keep it safer require organizations to integrate how they manage and use their data. So to meet the necessities, No-SQL has proven to be much better over RDBMS due to its high scalability. No-SQL databases has a large amount of Redundant data. To address this neophyte challenges and further achieve a dependable and secure storage service, different storage efficiency approaches are used. To store original data at one place and producing a pointer table which locate the copies of data, various key value pairs received the output are collected. Key-value pairs with the pointer table are now stored as a single document using Document-Oriented. The main reason of using MongoDB is its much better scalability as a document may contain further various type documents with different key pairs. The MongoDB is used for the purpose, as document based No-SQL storage are more efficient with easy handling in network.


Keywords


Document-Oriented, MongoDB, No-SQL, RDBMS, Storage Efficiency Technology.

Full Text:

PDF

References


R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In28th International Conference on Very Large Data Bases (VLDB), 2002.

K. Browder and M. A. Davidson. The Virtual Private Database in Oracle9iR2. Technical report, 2002. Oracle Technical White Paper.

J. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. The VLDB Journal, 17(4), 2008.

R. Cattell. Scalable SQL and NoSQL Data Stores. SIGMOD Rec., 39(4):12–27, May 2011.

A. Cavoukian. Privacy by Design: leadership, methods, and results. In S. Gutwirth, R. Leenes, P. de Hert, and Y. Poullet, editors, European Data Protection: Coming of Age. Springer, 2013.

F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 26(2):4, 2008.

P. Colombo and E. Ferrari. Enforcement of purpose based access control within relational database management systems. IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(11), 2014.

P. Colombo and E. Ferrari. Enforcing obligations within relational database management systems. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(4), 2014.

P. Colombo and E. Ferrari. Efficient enforcement of action aware purpose-based access control within relational database management systems. IEEE Transactions on Knowledge and Data Engineering, 27(8), 2015.

P. Colombo and E. Ferrari. Privacy aware access control for big data: A research roadmap. Big Data Research, 2015. http://dx.doi.org/10.1016/j.bdr.2015.08.001.

D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 2001.

Y. Guo, L. Zhang, F. Lin, and X. Li. A solution for privacy preserving data manipulation and query on NoSQL database. Journal of Computers, 8(6):1427–1432, 2013.

M. Kabir, H. Wang, and E. Bertino. A role-involved conditional purpose-based access control model. In M. Janssen, W. Lamersdorf, J. Pries-Heje, and M. Rosemann, editors, E-Government, E Services and Global Processes, volume 334 of IFIP Advances in Information and Communication Technology, pages 167–180. Springer Berlin Heidelberg, 2010.

M. E. Kabir and H. Wang. Conditional purpose based access control model for privacy protection. In ADC 2009.

B. Klimt and Y. Yang. The Enron corpus: a new dataset for email classification research. In Machine learning: ECML 2004.

D. Kulkarni. A fine-grained access control model for key-value systems. In Proceedings of the third ACM conference on Data and application security and privacy, pages 161–164. ACM, 2013.

N. Leavitt. Will NoSQL databases live up to their promise? Computer, 43(2), Feb 2010.

Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. Karat, J. Karat, and A. Trombetta. Privacy-aware role-based access control. ACM Transactions on Information and System Security (TISSEC), 13(3), 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.