Skip to main content

Designing a Secure Data Retrieval Strategy Using NoSQL Database

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10109))

Abstract

Data collection from distributed cloud storage through SaaS application requires efficient execution of the overall process. This type of cloud computing mechanism can be furnished through shared resources, improved service levels and minimal management effort. Data retrieval from cloud storage by different users through shared resources environment may blend data from different data requests in a single place. Here lies the need of efficient data retrieval strategy among different users that will help in secure data retrieval. When sensitive information is transmitted over the Internet there is high chance of information leakage. So, to prevent security attack like interference attack during query execution becomes a big challenge. This work explores a novel data retrieval strategy in extremely robust and linearly scalable high performance NoSQL database like Cassandra and presents a brief security analysis while retrieving stored data in shared environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Factor, M., et al.: Secure logical isolation for multi-tenancy in cloud storage. In: IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), IEEE (2013)

    Google Scholar 

  2. Liu, D., et al.: Scheduling tasks with Markov-chain based constraints. In: 17th Euromicro Conference on Real-Time Systems (ECRTS 2005), IEEE (2005)

    Google Scholar 

  3. Singh, J., et al.: Integrating messaging middleware and information flow control. In: 2015 IEEE International Conference on Cloud Engineering (IC2E), IEEE (2015)

    Google Scholar 

  4. Pasquier, T., et al.: Data-centric access control for cloud computing. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, ACM (2016)

    Google Scholar 

  5. Saha, S., Das, R., Datta, S., Neogy, S.: A cloud security framework for a data centric WSN application. In: Proceedings of the 17th International Conference on Distributed Computing and Networking, p. 39. ACM (2016)

    Google Scholar 

Download references

Acknowledgments

This work is supported by Information Technology Research Academy (ITRA), Government of India under, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayantani Saha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Saha, S., Parbat, T., Neogy, S. (2017). Designing a Secure Data Retrieval Strategy Using NoSQL Database. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2017. Lecture Notes in Computer Science(), vol 10109. Springer, Cham. https://doi.org/10.1007/978-3-319-50472-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50472-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50471-1

  • Online ISBN: 978-3-319-50472-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics