A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case

被引:0
|
作者
Dwivedi, Surabhi [1 ]
Balaji, R. [1 ]
Ampatt, Praveen [1 ]
Sudarsan, S. D. [1 ]
机构
[1] Ctr Dev Adv Comp C DAC, 68 Elect City, Bengaluru 560100, India
来源
关键词
NoSQL; MongoDB; NoSQL Injection; Data Masking;
D O I
10.1007/978-3-031-49099-6_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the advent of IoT devices, cloud computing, accessible mobile devices, social networking sites and other advancements in technology a huge amount of data is being generated. NoSQL databases were evolved to provide a better storage capability, scalability, improved performance for read and write operations for the enormous data generated by various systems which are continuously being read and written by large number of users. Initially it was believed to provide better security in comparison to the traditional relational database management system (RDBMS), but in due course of time NoSQL databases were also exposed to various security breaches and vulnerabilities. In this paper we studied in detail the various security vulnerabilities of MongoDB, along with the need to secure the interfaces being used to access MongoDB. We analyzed the prevention and mitigation strategies for the same. The study of this paper can be used as a best practice to secure NoSQL or MongoDB database. It suggests how to secure the queries and all the interfaces that are being used to access the database.
引用
下载
收藏
页码:57 / 76
页数:20
相关论文
共 21 条
  • [1] A survey on RDBMS and NoSQL Databases MySQL vs MongoDB
    Palanisamy, Sowndarya
    SuvithaVani, P.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 55 - +
  • [2] Model Driven Extraction of NoSQL Databases Schema: Case of MongoDB
    Brahim, Amal Ait
    Ferhat, Rabah Tighilt
    Zurfluh, Gilles
    KDIR: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT - VOL 1: KDIR, 2019, : 145 - 154
  • [3] LoRaWAN security survey: Issues, threats and possible mitigation techniques
    Noura, Hassan
    Hatoum, Tarif
    Salman, Ola
    Yaacoub, Jean-Paul
    Chehab, Ali
    INTERNET OF THINGS, 2020, 12
  • [4] Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey
    Pandey, Gaurav Kumar
    Gurjar, Devendra Singh
    Nguyen, Ha H.
    Yadav, Suneel
    IEEE ACCESS, 2022, 10 : 112858 - 112897
  • [5] Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors
    Oyler, Alex
    Saiedian, Hossein
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4330 - 4340
  • [6] The PEV Security Challenges to the Smart Grid: Analysis of Threats and Mitigation Strategies
    Carryl, Clyde
    Ilyas, Mohammad
    Mahgoub, Imad
    Rathod, Monika
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 300 - 305
  • [7] Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends
    Friha O.
    Ferrag M.A.
    Maglaras L.
    Shu L.
    IEEE Internet of Things Magazine, 2022, 5 (03): : 82 - 90
  • [8] A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
    Alouffi, Bader
    Hasnain, Muhammad
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Ayaz, Muhammad
    IEEE ACCESS, 2021, 9 : 57792 - 57807
  • [9] Cybersecurity of photovoltaic systems: challenges, threats, and mitigation strategies: a short survey
    Harrou, Fouzi
    Taghezouit, Bilal
    Bouyeddou, Benamar
    Sun, Ying
    FRONTIERS IN ENERGY RESEARCH, 2023, 11
  • [10] Security and Privacy in the Smart Home: A Survey of Issues and Mitigation Strategies
    Kuyucu, Meral Korkmaz
    Bahtiyar, Serif
    Ince, Gokhan
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 113 - 118