Improving security in NoSQL document databases through model-driven modernization

被引:0
|
作者
Alejandro Maté
Jesús Peral
Juan Trujillo
Carlos Blanco
Diego García-Saiz
Eduardo Fernández-Medina
机构
[1] University of Alicante,Lucentia Research Group, Department of Software and Computing Systems
[2] University of Cantabria,ISTR Research Group, Department of Computer Science and Electronics
[3] University of Castilla-La Mancha,GSyA Research Group, Institute of Information Technologies and Systems, Information Systems and Technologies Department
来源
关键词
NoSQL databases; Security; Modernization process; Ontology;
D O I
暂无
中图分类号
学科分类号
摘要
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structured and unstructured data. Unfortunately, most developments over NoSQL technologies consider security as an afterthought, putting at risk personal data of individuals and potentially causing severe economic loses as well as reputation crisis. In order to avoid these situations, companies require an approach that introduces security mechanisms into their systems without scrapping already in-place solutions to restart all over again the design process. Therefore, in this paper we propose the first modernization approach for introducing security in NoSQL databases, focusing on access control and thereby improving the security of their associated information systems and applications. Our approach analyzes the existing NoSQL solution of the organization, using a domain ontology to detect sensitive information and creating a conceptual model of the database. Together with this model, a series of security issues related to access control are listed, allowing database designers to identify the security mechanisms that must be incorporated into their existing solution. For each security issue, our approach automatically generates a proposed solution, consisting of a combination of privilege modifications, new roles and views to improve access control. In order to test our approach, we apply our process to a medical database implemented using the popular document-oriented NoSQL database, MongoDB. The great advantages of our approach are that: (1) it takes into account the context of the system thanks to the introduction of domain ontologies, (2) it helps to avoid missing critical access control issues since the analysis is performed automatically, (3) it reduces the effort and costs of the modernization process thanks to the automated steps in the process, (4) it can be used with different NoSQL document-based technologies in a successful way by adjusting the metamodel, and (5) it is lined up with known standards, hence allowing the application of guidelines and best practices.
引用
收藏
页码:2209 / 2230
页数:21
相关论文
共 50 条
  • [21] A Model-Driven approach to Information Security Compliance
    Correia, Anacleto
    Goncalves, Antonio
    Filomena Teodoro, M.
    [J]. APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2017, 1836
  • [22] Towards a Model-driven based Security Framework
    Abdallah, Rouwaida
    Yakymets, Nataliya
    Lanusse, Agnes
    [J]. MODELSWARD 2015 PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2015, : 639 - 645
  • [23] Model-driven security based on a Web services security architecture
    Nakamura, Y
    Tatsubori, M
    Imamura, T
    Ono, K
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, VOL 1, PROCEEDINGS, 2005, : 7 - 15
  • [24] Model typing for improving reuse in model-driven engineering
    Steel, J
    Jézéquel, JM
    [J]. MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3713 : 84 - 96
  • [25] Model-driven, view-based evolution of relational databases
    Dominguez, Eladio
    Lloret, Jorge
    Rubio, Angel L.
    Zapata, Maria A.
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, 5181 : 822 - +
  • [26] Model-driven Development of OData Services: An Application to Relational Databases
    Ed-douibi, Hamza
    Canovas Izquierdo, Javier Luis
    Cabot, Jordi
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2018,
  • [27] Model-driven security management of embedded service systems
    Illner, S
    Pohl, A
    Krumm, H
    [J]. IECON 2005: THIRTY-FIRST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2005, : 2655 - 2660
  • [28] Model-driven business process security requirement specification
    Wolter, Christian
    Menzel, Michael
    Schaad, Andreas
    Miseldine, Philip
    Meinel, Christoph
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) : 211 - 223
  • [29] Model-driven security engineering of service oriented systems
    Breu, Ruth
    Hafner, Michael
    Innerhofer-Oberperfler, Frank
    Wozak, Florian
    [J]. INFORMATION SYSTEMS AND E-BUSINESS TECHNOLOGIES, 2008, 5 : 59 - +
  • [30] Model-Driven Extraction and Analysis of Network Security Policies
    Martinez, Salvador
    Garcia-Alfaro, Joaquin
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Cabot, Jordi
    [J]. MODEL-DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, 2013, 8107 : 52 - 68