Open Access   Article Go Back

COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES

P. Rajesh Kannan1 , R. Mala2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 304-311, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.304311

Online published on Oct 31, 2018

Copyright © P. Rajesh Kannan, R. Mala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Rajesh Kannan, R. Mala, “COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.304-311, 2018.

MLA Style Citation: P. Rajesh Kannan, R. Mala "COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES." International Journal of Computer Sciences and Engineering 6.10 (2018): 304-311.

APA Style Citation: P. Rajesh Kannan, R. Mala, (2018). COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES. International Journal of Computer Sciences and Engineering, 6(10), 304-311.

BibTex Style Citation:
@article{Kannan_2018,
author = {P. Rajesh Kannan, R. Mala},
title = {COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {304-311},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3022},
doi = {https://doi.org/10.26438/ijcse/v6i10.304311}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.304311}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3022
TI - COMPARISON OF ENCRYPTION ALGORITHMS ON NoSQL DATABASES
T2 - International Journal of Computer Sciences and Engineering
AU - P. Rajesh Kannan, R. Mala
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 304-311
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
421 322 downloads 243 downloads
  
  
           

Abstract

Security has become one of the key features of data transmission on large databases. Sensible data that are available in the form of documents or unstructured format must be shared among the users in a confidential manner. NoSQL databases are nowadays popular in handling the unstructured data that are available as open source databases such as MongoDB, Cassandra, Redis etc. This paper make a detailed study on the encryption techniques of NoSQL databases especially MongoDB which becomes popular in data management. Since encryption features are not applied on handling the data in MongoDB, the various encryption techniques proposed on securing the sensitive data at rest and at transit are compared based on different encryption algorithms.

Key-Words / Index Term

Data Security, NoSQL, MongoDB Encryption, encryption at rest, encryption at transit

References

[1]. P.R.Hariharan & Dr. K.P. Thooyamani , Various Schemes for Database Encryption - A Survey”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8763-8767, Research India Publications.
[2]. Jef Van Loon, Prof. Dr. C-C. Kanne, Ch. Sturm, “Database Security - Concepts, Approaches”, Article in IEEE Transactions on Dependable and Secure Computing • Seminar in Database Systems, University of Zurich, Department of Informatics, Autumn Term 2008, DOI: 10.1109/TDSC.2005.9 • Source: IEEE Xplore.
[3]. Mubina Malik and Trisha Patel, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016.
[4]. S. Priyadharshini, R. Rajmohan, “Analysis on Database Security Model Against NOSQL Injection”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307
[5]. Suna Yin, Dehua Chen, Jiajin Le,China, 2016 IEEE,"STNOSQL Creating NOSQL Database on the SensibleThings Platform.
[6]. Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu, USA, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing ,"Mongo Database NOSQL Injection Analysis and Detection".
[7]. Anil Kumar, Harsha H L, B. Swaroop Reddy, K.Sunil Kumar Reddy, Krishna N, “Homomorphic Encrypted MongoDB for Users Data Security”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 6, June 2018.
[8]. https://en.wikipedia.org/wiki/Paillier_cryptosystem M.W. Grim, A.T. Wiersma, F. Turkmen, “Security and Performance Analysis of Encrypted NoSQL Databases”, February 12, 2017.
[9]. Alves, Pedro. A framework for searching encrypted databases. In Anais do XVI Simpsio Brasileiro em Segurana da Informao e de Sistemas Computacionais (SBSeg 2016), 2016.
[10]. Brian F Cooper, Adam Silberstein, Erwin Tam, Raghu Ramakrishnan, and Russell Sears. “Benchmarking cloud serving systems with YCSB”, In Proceedings of the 1st ACM symposium on Cloud computing, pages 143{154. ACM, 2010.
[11]. At-test encryption in MongoDB 3.2: features and performance. https://www.mongodb.com /blog/post/at-rest-encryption-in-mongodb-3-2-features-and-performance.Accessed: 2017-01-23.
[12]. Vidushi Jain, Aviral Upadhyay, , “MongoDB and NoSQL Databases”,International Journal of Computer Applications (0975 – 8887) Volume 167 – No.10, June 2017
[13]. Zhu Wei-ping, Li Ming-xin- Using MongoDB to Implement Textbook Management System instead of MySQL IEEE2011
[14]. Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov - Security Issues in NoSQL Databases IEEE2011
[15]. Tianyu Jia, Xiaomeng Zhao, Zheng Wang, Dahan Gong and Guiguang Ding - Model Transformation and Data Migration from Relational Database to MongoDB IEEE 2016.
[16]. Charmi Pariawala, and Ravi Sheth,” Encrypting Data of MongoDB at Application Level”, Advances in Computational Sciences and Technology, Volume 10, Number 5 (2017) pp. 1199-1205
[17]. Karan Patel, Kirti Sharma, Mosin Hasan. “Encrypting MongoDB Data using Application Level Interface”. Discovery, 2015, 46(214), 164-169
[18]. Anand Shende1, Omkar Gurav2, Swapnil Shirode3, Piyush Govekar 4, S.N.Zaware 5, “Secure Unique Identification using Encrypted Storage in NoSQL Database”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2016
[19]. Hanan A. Al-Souly, Abeer S. Al-Sheddi, Heba A. Kurdi;Fast, Lightweight Symmetric Encryption Algorithm for Secure Database. (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Extended Papers from Science and Information Conference 2013.
[20]. https://docs.mongodb.com/manual/core/security-encryption-at-rest.