{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T14:14:48Z","timestamp":1683296088268},"reference-count":37,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt\/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.<\/p>","DOI":"10.4018\/ijisp.2019040102","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T14:06:54Z","timestamp":1554386814000},"page":"14-31","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments"],"prefix":"10.4018","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6852-1206","authenticated-orcid":true,"given":"Mamdouh","family":"Alenezi","sequence":"first","affiliation":[{"name":"Prince Sultan University, Riyadh, Saudi Arabia"}]},{"given":"Muhammad","family":"Usama","sequence":"additional","affiliation":[{"name":"Bahria University, Karachi, Pakistan"}]},{"given":"Khaled","family":"Almustafa","sequence":"additional","affiliation":[{"name":"Prince Sultan University, Riyadh, Saudi Arabia"}]},{"given":"Waheed","family":"Iqbal","sequence":"additional","affiliation":[{"name":"University of the Punjab, Lahore, Pakistan"}]},{"given":"Muhammad Ali","family":"Raza","sequence":"additional","affiliation":[{"name":"University of the Punjab, Lahore, Pakistan"}]},{"given":"Tanveer","family":"Khan","sequence":"additional","affiliation":[{"name":"COMSATS University, Islamabad, Pakistan"}]}],"member":"2432","reference":[{"key":"IJISP.2019040102-0","doi-asserted-by":"crossref","unstructured":"Ahmadian, M. (2017). Secure query processing in cloud NoSQL. In 2017 IEEE International Conference on Consumer Electronics (ICCE) (pp. 90-93). IEEE.","DOI":"10.1109\/ICCE.2017.7889242"},{"key":"IJISP.2019040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.11.005"},{"key":"IJISP.2019040102-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.067"},{"key":"IJISP.2019040102-3","article-title":"Garbled role-based access control in the cloud.","author":"M.Alam","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing, 9(4), 1153-1166"},{"key":"IJISP.2019040102-4","unstructured":"Baccam, T. (2010). Oracle database security: what to look for and where to secure. Sans. Retrieved from https:\/\/www.sans.org\/reading-room\/analystsprogram\/oraclewhitepaper-201004"},{"key":"IJISP.2019040102-5","first-page":"224","article-title":"Order-preserving symmetric encryption.","author":"A.Boldyreva","year":"2009","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"IJISP.2019040102-6","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., & Shahriar, H. (2017). Data masking techniques for NoSQL database security: A systematic review. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 4467-4473). IEEE.","DOI":"10.1109\/BigData.2017.8258486"},{"key":"IJISP.2019040102-7","first-page":"129","article-title":"Secure database in cloud computing-cryptdb revisited.","volume":"3","author":"Z.Day\u0131o\u011flu","year":"2014","journal-title":"International Journal of Information Security Science"},{"key":"IJISP.2019040102-8","doi-asserted-by":"crossref","unstructured":"Gautam, A., Dhingra, R., Bedi, P., & Associates. (2015). Use of NoSQL Database for Handling Semi Structured Data: An Empirical Study of News RSS Feeds. In Emerging Research in Computing, Information, Communication and Applications (pp. 253-263). Springer.","DOI":"10.1007\/978-81-322-2550-8_24"},{"key":"IJISP.2019040102-9","unstructured":"Grim, M. W., & Wiersma, A. T. (2017). Security and Performance Analysis of Encrypted NoSQL Databases. University of Amsterdam."},{"key":"IJISP.2019040102-10","unstructured":"Han, J., Haihong, E., Le, G., & Du, J. (2011). Survey on NoSQL database. In 2011 6th international conference on Pervasive computing and applications (ICPCA) (pp. 363-366). IEEE."},{"key":"IJISP.2019040102-11","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2424998"},{"key":"IJISP.2019040102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.016"},{"key":"IJISP.2019040102-13","doi-asserted-by":"crossref","unstructured":"Jayathilake, D., Sooriaarachchi, C., Gunawardena, T., Kulasuriya, B., & Dayaratne, T. (2012). A study into the capabilities of NoSQL databases in handling a highly heterogeneous tree. In 2012 IEEE 6th International Conference on Information and Automation for Sustainability (ICIAfS) (pp. 106-111). IEEE.","DOI":"10.1109\/ICIAFS.2012.6419890"},{"key":"IJISP.2019040102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.01.001"},{"key":"IJISP.2019040102-15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2309211"},{"key":"IJISP.2019040102-16","first-page":"12","article-title":"Cryptography with chaos.","author":"G.Makris","year":"2012","journal-title":"Proceedings of the 5th Chaotic Modeling and Simulation International Conference"},{"key":"IJISP.2019040102-17","unstructured":"Meyer, & Schwenk., J. (2013). Lessons Learned From Previous SSL\/TLS Attacks-A Brief Chronology Of Attacks And Weaknesses. IACR Cryptology EPrint Archive, 49. doi:10.1.1.303.60"},{"key":"IJISP.2019040102-18","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452378"},{"key":"IJISP.2019040102-19","unstructured":"MongoDB. (2018, December 17). 10Gen Corporation. \u201cSharding\u201d. Retrieved from https:\/\/docs.mongodb.com\/manual\/sharding"},{"key":"IJISP.2019040102-20","unstructured":"MongoDB. (2018, December 17). Open Source Document Database. Retrieved from https:\/\/www.mongodb.com\/"},{"key":"IJISP.2019040102-21","unstructured":"MongoDB. (n.d.). Retrieved from https:\/\/www.mongodb.com\/"},{"key":"IJISP.2019040102-22","unstructured":"Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. (2013). A newer user authentication, file encryption and distributed server based cloud computing security architecture. Retrieved from http:\/\/arxiv.org\/abs\/1303.0598"},{"key":"IJISP.2019040102-23","doi-asserted-by":"crossref","unstructured":"Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., & Abramov, J. (2011). Security issues in nosql databases. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 541-547). IEEE.","DOI":"10.1109\/TrustCom.2011.70"},{"key":"IJISP.2019040102-24"},{"key":"IJISP.2019040102-25","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367606"},{"key":"IJISP.2019040102-26","doi-asserted-by":"publisher","DOI":"10.1108\/17440081311316398"},{"key":"IJISP.2019040102-27","first-page":"885","author":"A.Rafique","year":"2017","journal-title":"Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. In 2017"},{"key":"IJISP.2019040102-28","first-page":"5","article-title":"Big Data Security on Cloud Servers Using Data Fragmentation Technique and NoSQL Database.","author":"N. a.Santos","year":"2018","journal-title":"International Conference on Intelligent Interactive Multimedia Systems and Services"},{"key":"IJISP.2019040102-29","doi-asserted-by":"publisher","DOI":"10.1145\/2384716.2384773"},{"key":"IJISP.2019040102-30","doi-asserted-by":"crossref","unstructured":"Shih, M. H. (2017). Design and analysis of high performance crypt-NoSQL. In Dependable and Secure Computing (pp. 52-59).","DOI":"10.1109\/DESEC.2017.8073797"},{"key":"IJISP.2019040102-31","doi-asserted-by":"crossref","unstructured":"Sobhy, M. I., & Shehata, A.-E. R. (2001). Chaotic algorithms for data encryption. Proceedings 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'01) (Vol. 2, pp. 997-1000).","DOI":"10.1109\/ICASSP.2001.941085"},{"key":"IJISP.2019040102-32","doi-asserted-by":"crossref","unstructured":"Tian, X., Huang, B., & Wu, M. (2014). A transparent middleware for encrypting data in MongoDB. In 2014 IEEE Workshop on Electronics, Computer and Applications (pp. 906-909).","DOI":"10.1109\/IWECA.2014.6845768"},{"key":"IJISP.2019040102-33","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet.2011.5993686"},{"key":"IJISP.2019040102-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2009.12.033"},{"key":"IJISP.2019040102-35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98539-8_20"},{"key":"IJISP.2019040102-36","doi-asserted-by":"crossref","unstructured":"Zahid, A., Masood, R., & Shibli, M. A. (2014). Security of sharded NoSQL databases: A comparative analysis. In 2014 Conference on, Information Assurance and Cyber Security (CIACS) (pp. 1-8).","DOI":"10.1109\/CIACS.2014.6861323"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:23:45Z","timestamp":1651861425000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019040102","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}