Improving security in NoSQL document databases through model-driven modernization

被引:0
作者
Alejandro Maté
Jesús Peral
Juan Trujillo
Carlos Blanco
Diego García-Saiz
Eduardo Fernández-Medina
机构
[1] University of Alicante,Lucentia Research Group, Department of Software and Computing Systems
[2] University of Cantabria,ISTR Research Group, Department of Computer Science and Electronics
[3] University of Castilla-La Mancha,GSyA Research Group, Institute of Information Technologies and Systems, Information Systems and Technologies Department
来源
Knowledge and Information Systems | 2021年 / 63卷
关键词
NoSQL databases; Security; Modernization process; Ontology;
D O I
暂无
中图分类号
学科分类号
摘要
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and unstructured data. Unfortunately, most developments over NoSQL technologies consider security as an afterthought, putting at risk personal data of individuals and potentially causing severe economic loses as well as reputation crisis. In order to avoid these situations, companies require an approach that introduces security mechanisms into their systems without scrapping already in-place solutions to restart all over again the design process. Therefore, in this paper we propose the first modernization approach for introducing security in NoSQL databases, focusing on access control and thereby improving the security of their associated information systems and applications. Our approach analyzes the existing NoSQL solution of the organization, using a domain ontology to detect sensitive information and creating a conceptual model of the database. Together with this model, a series of security issues related to access control are listed, allowing database designers to identify the security mechanisms that must be incorporated into their existing solution. For each security issue, our approach automatically generates a proposed solution, consisting of a combination of privilege modifications, new roles and views to improve access control. In order to test our approach, we apply our process to a medical database implemented using the popular document-oriented NoSQL database, MongoDB. The great advantages of our approach are that: (1) it takes into account the context of the system thanks to the introduction of domain ontologies, (2) it helps to avoid missing critical access control issues since the analysis is performed automatically, (3) it reduces the effort and costs of the modernization process thanks to the automated steps in the process, (4) it can be used with different NoSQL document-based technologies in a successful way by adjusting the metamodel, and (5) it is lined up with known standards, hence allowing the application of guidelines and best practices.
引用
收藏
页码:2209 / 2230
页数:21
相关论文
共 45 条
  • [1] Michael K(2013)Big data: new opportunities and new challenges [guest editors’ introduction] Computer 46 22-24
  • [2] Miller KW(2014)Big data’ s impact on privacy, security and consumer welfare Telecommun Policy 38 1134-1145
  • [3] Kshetri N(2015)Big data security issues and challenges Int J Innov Res Adv Eng 2 15-20
  • [4] Toshniwal R(2015)Big data and hadoop—a study in security perspective Procedia Comput Sci 50 596-601
  • [5] Dastidar KG(2009)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns Artif Intell Law 17 1-30
  • [6] Nath A(2008)Twenty-five years of mokum: for 25 years of data and knowledge engineering: Correctness by design in relation to mde and correct protocols in cyberspace Data Knowl Eng 67 293-329
  • [7] Saraladevi B(2006)Model driven security: from uml models to access control infrastructures ACM Trans Softw Eng Methodol 15 39-91
  • [8] Pazhaniraja N(2015)The big data security challenge Netw Secur 2015 12-14
  • [9] Paul PV(2015)A graph-based comprehensive reputation model: Exploiting the social context of opinions to enhance trust in social commerce Inf Sci 318 51-72
  • [10] Basha MS(2015)Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption Inf Sci 318 111-122