A Comparative Analysis of Cyber Vulnerabilities Across Relational, Document, and Cloud Databases
Keywords:
Relational databases, Document databases, Cloud databases, Security structures, EncryptionAbstract
In this comparative study, we examine the security structures of three prominent database types: relational databases, document databases, and cloud databases. Relational databases, the oldest and most widely used, rely on tables to store structured data, employing security measures like user authentication, authorization, and encryption.
References
R. B. Bobba, K. M. Rogers, Q. Wang, and H. Khurana, “Detecting false data injection attacks on DC state estimation,” Proceedings of the First
Workshop on Secure Control Systems, 2010.
T. T. Kim, and H. V. Poor, “Strategic Protection Against Data Injec- tion Attacks on Power Grids,” IEEE Transactions on Smart Grid, vol.2,
no.2, pp.326,333, June 2011.