CryptNoSQL – A Methodology for Secure Querying and Processing of Encrypted NoSQL Data on the Cloud Environment

نویسندگان

چکیده

Businesses today use modern computing technologies such as Big Data and Machine Learning in their daily operations, which require effective management of large amounts data. Relational data formats are no longer suitable for these applications, NoSQL preferred. The cloud infrastructure offers advantages scalability, availability, resource maintenance, but security remains a challenge. Although vendors provide encryption features, they may not be sufficient sensitive To address this, some businesses methods, retrieving from an encrypted form possible. While specific methods support the processing without decryption, there is complete implementation secure MongoDB or other databases. proposed methodology, called CryptNoSQL, provides way to query process data, including updates on We introduce customized database design model that selects appropriate method during insertion document based type field operation it will involved in. Our experimental results demonstrate our approach organizations with hosted frequent operations this

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment

Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...

متن کامل

A Unified Framework for Secure Search Over Encrypted Cloud Data

This paper presents a unified framework that supports different types of privacy-preserving search queries over encrypted cloud data. In the framework, users can perform any of the multi-keyword search, range search and k-nearest neighbor search operations in a privacypreserving manner. All three types of queries are transformed into predicate-based search leveraging bucketization, locality sen...

متن کامل

On The Security Of Querying Encrypted Data

Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns.The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. Ho...

متن کامل

developing a pattern based on speech acts and language functions for developing materials for the course “ the study of islamic texts translation”

هدف پژوهش حاضر ارائه ی الگویی بر اساس کنش گفتار و کارکرد زبان برای تدوین مطالب درس "بررسی آثار ترجمه شده ی اسلامی" می باشد. در الگوی جدید، جهت تدوین مطالب بهتر و جذاب تر، بر خلاف کتاب-های موجود، از مدل های سطوح گفتارِ آستین (1962)، گروه بندی عملکردهای گفتارِ سرل (1976) و کارکرد زبانیِ هالیدی (1978) بهره جسته شده است. برای این منظور، 57 آیه ی شریفه، به صورت تصادفی از بخش-های مختلف قرآن انتخاب گردید...

15 صفحه اول

a study on insurer solvency by panel data model: the case of iranian insurance market

the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRG international journal of electronics and communication engineering

سال: 2023

ISSN: ['2349-9184', '2348-8549']

DOI: https://doi.org/10.14445/23488549/ijece-v10i5p102