International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-10,Issue-5  ( May, 2022 )
Past issues
  1. Volume-10,Issue-4  ( Apr, 2022 )
  2. Volume-10,Issue-3  ( Mar, 2022 )
  3. Volume-10,Issue-2  ( Feb, 2022 )
  4. Volume-10,Issue-1  ( Jan, 2022 )
  5. Volume-9,Issue-12  ( Dec, 2021 )
  6. Volume-9,Issue-11  ( Nov, 2021 )
  7. Volume-9,Issue-10  ( Oct, 2021 )
  8. Volume-9,Issue-9  ( Sep, 2021 )
  9. Volume-9,Issue-8  ( Aug, 2021 )
  10. Volume-9,Issue-7  ( Jul, 2021 )

Statistics report
Aug. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 113
Paper Published : 1372
No. of Authors : 3469
  Journal Paper

Paper Title :
The Effects of Weak Authentication towards Data Privacy in NOSQL Databases

Author :Theodore Natanael Damanik, Jason Aljenovachristli, Rixon Hansel Patricius, Wayne Octaviano Braganca, James Purnama, Maulahikmah Galinium, Kho I eng

Article Citation :Theodore Natanael Damanik ,Jason Aljenovachristli ,Rixon Hansel Patricius ,Wayne Octaviano Braganca ,James Purnama ,Maulahikmah Galinium ,Kho I eng , (2022 ) " The Effects of Weak Authentication towards Data Privacy in NOSQL Databases " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 7-9, Volume-10,Issue-2

Abstract : Abstract - NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed for modern web-scale databases. Although, nowadays, it is used to handle big data and many real-time web applications. They can handle enormous amount of unstructured data and structured data. As a result, developers will be able to be more nimble. NoSQL database developers, for example, may deploy code updates more quickly than relational database developers. However, security remains a very difficult issue even with NoSQL databases, as the security concerns inherent in previous databases have not been resolved in NoSQL. The most common example is that their password storage mechanism is weak, meaning it can be decrypted easily. This means that NoSQL databases have weaknesses and one of them is authentication weakness. This paper evaluates how strong the authentication aspect towards different kinds of attacks on a NoSQL database. Keywords - NoSQL; Security; Evaluation; Privacy; Authentication; Database

Type : Research paper

Published : Volume-10,Issue-2


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 27
| Published on 2022-04-28
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World