A NOVEL REDIS SECURITY BEST PRACTICES FOR NOSQL DATABASES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 3
Abstract
In last decades of years the field of databases has emerged. The organizations are migrating towards Non-Relational databases from Relational Databases due to the current trend of Big Data, Big Users and Cloud Computing. Business data processing is the main market of Relational Databases. It turns out to be harder to managing Big Clients and Big information on a cloud domain. To modeling the data these databases uses a rigid and schema based approach and are designed to run on a single machine and NoSQL (Not Only SQL) database provides, flexible data model, dynamic schemas, efficient big data storage, scale-out architecture and access requirement hence these are considering as new Era of database [11][12].We have taken Redis as a new NoSQL database in this work. Redis in its least difficult structure is a key value pair based information framework. It bolsters all the information structures like arrays, variables, strings and linked list. In SQL database like SQL Server, MySQL and Oracle the data in Redis is structured data unlike the other databases where the data is relational data [6]. However Redis provides minimum to virtually no security for the data. As all the information is put away in key value pair, anyone can get the value if the key is known. Accordingly such a database is not suitable for big enterprise and most useful application information. So in this work we add security to a Redis framework.
Authors and Affiliations
Jeelani Ahmed
Intrinsic Plagiarism Detection for Text Based Features Pattern
Plagiarism detection means detecting the document whether copied or stealing from the other document. The main goal is to detect the word by analyzing the writing style using technique intrinsic plagiarism detecti...
Adaptive Resource Allocation for Wireless Multi-cast MIMO OFDM using Water filling Algorithm
Multiple antenna orthogonal frequency division multiple access (OFDMA) is a promising technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would b...
A DATA GUIDED LEXI-SERACH APPROACH FOR TIME DEPENDENT TRAVELLING SALEMSMAN PROBLEM
A simple lexi-search algorithm that uses path representation method for the time dependent traveling salesman problem TDTSP is proposed, to obtain exact optimal solution to the problem. Then a data-guided lexi se...
Demineralization of Indian Coal by Using Solvents
Coal is most important fossil fuel in the world. Availability of coal is three times greater than that of the crude oil. Ash content of Indian coal is very high ranging from 15% to 55% [1]. High ash Indian coals a...
IMPROVING USER - TO - ROOT AND REMOTE - TO - LOCAL ATTACKS USING GROWING HIERARCHICAL SELF ORGANIZING MAP
Intrusion Detection System (IDS) protects a system by detecting “known” as well as “unknown” attacks and generates the alert for suspicious activities in the traffic. There are various approaches for IDS, but our surve...