A Comparative Analysis of Cyber Vulnerabilities Across Relational, Document, and Cloud Databases

Authors

  • Shibam Karmakar,Dr. Soma Saha ,Dr. Ganeshan R

Keywords:

Relational databases, Document databases, Cloud databases, Security structures, Encryption

Abstract

In this comparative study, we examine the security structures of three prominent database types: relational databases, document databases, and cloud databases. Relational databases, the oldest and most widely used, rely on tables to store structured data, employing security measures like user authentication, authorization, and encryption.

References

R. B. Bobba, K. M. Rogers, Q. Wang, and H. Khurana, “Detecting false data injection attacks on DC state estimation,” Proceedings of the First

Workshop on Secure Control Systems, 2010.

T. T. Kim, and H. V. Poor, “Strategic Protection Against Data Injec- tion Attacks on Power Grids,” IEEE Transactions on Smart Grid, vol.2,

no.2, pp.326,333, June 2011.

Downloads

Published

2024-11-11

How to Cite

Shibam Karmakar,Dr. Soma Saha ,Dr. Ganeshan R. (2024). A Comparative Analysis of Cyber Vulnerabilities Across Relational, Document, and Cloud Databases . Journal of Computational Analysis and Applications (JoCAAA), 33(07), 1877–1882. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/2203

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.