Improving security in NoSQL document databases through model-driven modernization

被引:0
作者
Alejandro Maté
Jesús Peral
Juan Trujillo
Carlos Blanco
Diego García-Saiz
Eduardo Fernández-Medina
机构
[1] University of Alicante,Lucentia Research Group, Department of Software and Computing Systems
[2] University of Cantabria,ISTR Research Group, Department of Computer Science and Electronics
[3] University of Castilla-La Mancha,GSyA Research Group, Institute of Information Technologies and Systems, Information Systems and Technologies Department
来源
Knowledge and Information Systems | 2021年 / 63卷
关键词
NoSQL databases; Security; Modernization process; Ontology;
D O I
暂无
中图分类号
学科分类号
摘要
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and unstructured data. Unfortunately, most developments over NoSQL technologies consider security as an afterthought, putting at risk personal data of individuals and potentially causing severe economic loses as well as reputation crisis. In order to avoid these situations, companies require an approach that introduces security mechanisms into their systems without scrapping already in-place solutions to restart all over again the design process. Therefore, in this paper we propose the first modernization approach for introducing security in NoSQL databases, focusing on access control and thereby improving the security of their associated information systems and applications. Our approach analyzes the existing NoSQL solution of the organization, using a domain ontology to detect sensitive information and creating a conceptual model of the database. Together with this model, a series of security issues related to access control are listed, allowing database designers to identify the security mechanisms that must be incorporated into their existing solution. For each security issue, our approach automatically generates a proposed solution, consisting of a combination of privilege modifications, new roles and views to improve access control. In order to test our approach, we apply our process to a medical database implemented using the popular document-oriented NoSQL database, MongoDB. The great advantages of our approach are that: (1) it takes into account the context of the system thanks to the introduction of domain ontologies, (2) it helps to avoid missing critical access control issues since the analysis is performed automatically, (3) it reduces the effort and costs of the modernization process thanks to the automated steps in the process, (4) it can be used with different NoSQL document-based technologies in a successful way by adjusting the metamodel, and (5) it is lined up with known standards, hence allowing the application of guidelines and best practices.
引用
收藏
页码:2209 / 2230
页数:21
相关论文
共 45 条
  • [11] Dhavachelvan P(2015)Universal designated verifier transitive signatures for graph-based big data Inf Sci 318 144-156
  • [12] Compagna L(2012)Study of security mechanism based on hadoop Inf Secur Commun Privacy 6 042-20
  • [13] El Khoury P(2003)Conceptual modelling and ontology: possibilities and pitfalls J Database Manag 14 1-103
  • [14] Krausová A(2019)Comparing traditional conceptual modeling with ontology-driven conceptual modeling: an empirical study Inf Syst 81 92-undefined
  • [15] Massacci F(1985)Early history of the kappa statistic Biometrics 41 795-undefined
  • [16] Zannone N(undefined)undefined undefined undefined undefined-undefined
  • [17] van de Riet RP(undefined)undefined undefined undefined undefined-undefined
  • [18] Basin D(undefined)undefined undefined undefined undefined-undefined
  • [19] Doser J(undefined)undefined undefined undefined undefined-undefined
  • [20] Lodderstedt T(undefined)undefined undefined undefined undefined-undefined