2019
DOI: 10.4197/comp.8-1.1
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Models in NoSQL Databases: An Overview

Abstract: Recently non-relational databases known as NoSQL have become most popular for handling a huge amount of data. Many organizations move from relational databases towards NoSQL databases due to the growing popularity of cloud computing and big data. NoSQL database is designed to handle unstructured data like documents, e-mails, and social media efficiently. It uses distributed and cooperating devices to store and retrieve data. As a large number of people storing sensitive data in NoSQL databases, security issues… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
(31 reference statements)
0
2
0
Order By: Relevance
“…Moreover, they analyzed different data protection mechanisms and extensively compared 32 datastores from all database models in terms of authorization and access control, authentication, auditing and logging, encryption and consistency model for data integrity. Alotaibi et al (2019) reviewed access control models in different NoSQL databases, highlighting the lack of FGAC. Colombo and Ferrari (2019) focused on access control, presenting a literature review for existing access control solutions in NoSQL datastores.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, they analyzed different data protection mechanisms and extensively compared 32 datastores from all database models in terms of authorization and access control, authentication, auditing and logging, encryption and consistency model for data integrity. Alotaibi et al (2019) reviewed access control models in different NoSQL databases, highlighting the lack of FGAC. Colombo and Ferrari (2019) focused on access control, presenting a literature review for existing access control solutions in NoSQL datastores.…”
Section: Related Workmentioning
confidence: 99%
“…The key-value model uses a hash table and is the simplest one among all NoSQL models. It is powerful and efficient in storing schema-less data in the form of data values associated to keys, which are used as indexes for quickly finding values in large data sets (Alotaibi et al , 2019). Data can be either stored as rows, like structured data, or JSON objects.…”
Section: Key-value Databasesmentioning
confidence: 99%