Current Data Security Issues of NoSQL Databases
|
|
|
- Joseph Crawford
- 10 years ago
- Views:
Transcription
1 1 Current Data Security Issues of NoSQL Databases January 2014 PAGE 1 PAGE 1 1 Fidelis Cybersecurity 1601 Trapelo Road, Suite 270 Waltham, MA 02451
2 Abstract NoSQL databases, sometimes referred as Not-- Only-- SQL databases, have recently gained much attention and popularity because of their demonstrated high scalability and performance. The primary advantage of NoSQL databases is that they are designed to efficiently store significant amounts of unstructured data. Facing the "Big Data" problem that has challenged most traditional relational database management systems (RDBMS), major Web 2.0 companies have developed or adopted different flavors of NoSQL databases for their growing data and infrastructure needs, including Amazon (Dynamo), Google (BigTable), LinkedIn (Voldemort), Face book (Cassandra), etc. From their inception, NoSQL databases have been designed for solving the Big Data issue by utilizing distributed, collaborating hosts to achieve satisfactory performance in data storage and retrieval. Other equally important database requirements, such as data security and consistency, have not been fully addressed. Following a previous study published in 2011 [Ref.1] that identified several NoSQL security issues, this white paper summarizes an open-- source research on recent NoSQL improvements on data security issues, as dictated by the PCI-- DSS compliance. With the help of third-- party-- security solutions, some of current NoSQL databases seem able to achieve the PCI-- DSS compliance. However, the potential data inconsistency among replications may impede a wide acceptance of NoSQL by much less-- tolerable financial applications. It is generally conceived for the foreseeable future NoSQL and RDBMS are co-- deployed to process different data flows in the ways they are best designed to do. Potentially, NoSQL databases may replace RDBMS once they are continuously improved to provide sufficient data security. PAGE 2 PAGE 2
3 Relational and NoSQL Databases There are three basic requirements for databases management systems, confidentiality, integrity and availability. The stored data must be available when it is needed (availability), but only to authorized entities (confidentiality), and only modified by authorized entities (integrity). Traditional relational database management systems (RDBMS), like Oracle, SQL and MySQL, have been well-- developed to meet the three requirements. In addition, enterprise RDBMS are further required to have ACID properties, Atomic, Consistency, Isolation, and Durability, that guarantee that database transactions are processed reliably [Ref. 2]. With such desirable properties, RDBMS have been widely used as the dominant data storage choice. RDBMS now are facing major performance problems in processing exponential growth of unstructured data, such as documents, e-- mail, multi-- media or social media. Thus a new breed of non-- relational, cloud-- based distributed databases, called NoSQL, has emerged to satisfy the unprecedented needs for scalability, performance and storage. Currently there are about 150 different NoSQL databases available [Ref. 3]. They are designed to achieve the desired scalability and performance by sharing a BASE transaction concept (Basically Available, Soft state, and eventually consistent). Under this concept, committed transactions are not written to database immediately to achieve data consistency as in RDBMS. Instead, the database just needs to reach a consistent state eventually among the clustering hosts. Based on the data storage model, NoSQL databases generally can be categorized into the following four groups [Ref. 4 and 5], Key-- Values Databases: Store un-- interpreted arbitrary data values into a system that can be recalled later using a key (hash). This schema less data model allows for easy scaling and very simple APIs for implementations. Column Databases: Store data in a similar key-- value fashion, except the key is a combination of column, row, and/or timestamp, which points to one or multiple columns (Column Family). The column family used here is like a table commonly found in a relational database. Document Databases: Store documents that consist of one or more self-- contained named fields in each document, like JSON or BSON format. The structure of documents is dynamic that allows for free modification with the ability to add or remove fields of existing documents. Indexing on the named fields enables fast data retrieval. PAGE 3 PAGE 3
4 Graph Databases: Store data in a flexible graph model that scales across multiple machines. This model is suitable for data with relations that are best represented as a graph (elements interconnected with an undetermined number of relations between them), such as social relations, public transport links, road maps or network topologies. Illustrated in the diagram below are the characteristics of RDBMS and NoSQL databases being scaled up in both data size and data complexity. While RDBMS are limited in both aspects, NoSQL databases with simpler data models, e.g., key- - value and column are more easily scaled up in the data size. Fig. Relative scalability in data size and complexity of RDBMS and NoSQL The following table shows a sample list of well-- known companies that uses NoSQL databases for production needs. Young internet media and social network companies are more readily to accept NoSQL because of their needs for data flexibility and scalability. For example, Netflix in 2013 migrated completely its streaming services from Oracle to NoSQL (Cassandra) to improve availability [Ref. 6]. Other well-- established companies are relatively slower in transitioning to NoSQL, possibly burdened by legacy data storage and/or applications, in addition to still lingering concerns about NoSQL data security. PAGE 4 PAGE 4
5 Table1. Examples of major companies using NoSQL databases Company Name NoSQL Name NoSQL Storage Type Adobe HBase Column Amazon Dynamo SimpleDB Key-- Value Document BestBuy Riak Key-- Value ebay Cassandra MongoDB Column Document Facebook Cassandra Neo4j Column Graph Google BigTable Column LinkedIn Voldemort Key-- Value LotsOfWords CouchDB Document MongoHQ MongoDB Document Mozilla HBase Riak Column Key-- Value Netflix SimpleDB HBase Cassandra Document Column Column Twitter Cassandra Column Current NoSQL Data Security Issues Very recent data breaches occurred at MongoHQ (Oct 2013) [Ref. 7] and LinkedIn (July 2012) [Ref. 8] underscores the importance of NoSQL data security as more and more companies are bracing for the new family of products. Although the above two incidents are caused by weak encryption of passwords, and not directly linked to any known NoSQL vulnerability, they point to a fact that NoSQL are becoming targets of attackers who seek valuable information. NoSQL database may become even more susceptible to exploits once attackers overcome the learning curve, and are able to identify hidden security or software weaknesses. PAGE 5 PAGE 5
6 Okman et al in 2011 published a comprehensive study on security issues of NoSQL databases [Ref. 1], which discussed common security issues on two popular NoSQL, Cassandra (version 0.8) and MongoDB (version unknown). As most NoSQL databases are still work-- in-- progress products, three years later it is worthy to take another look and re-- evaluate their recent developments. The current version of Apache Cassandra is 2.0 (Enterprise version 3.2 is offered by DataStax), and it is version 2.4 for MongoDB. Since enhanced database security always comes at the expense of database performance, there is no surprise that most default security settings for Cassandra are set to either none or minimum [Ref. 9]; and MongoDB's current manual states "The most effective way to reduce risk for MongoDB is to run your entire MongoDB deployment in a trusted environment" [Ref. 10]. 1. Data at Rest -- [Cassandra] The latest Cassandra (Enterprise 3.2) provides an optional feature for Transparent Data Encryption (TDE) to protect data that is flushed out from the memory (memtable) and written to disk. To some extent, this feature can be enabled to protect sensitive data. However, since the encryption certificate is stored locally, a secured file system is necessary before TDE is turned on. In addition, the commit log of Cassandra, a file where committed data is appended to, is not encrypted at all. [MongoDB] Data files in MongoDB are never encrypted, and there is no method provided to accomplish this. If encryption is needed, the application layer should perform the data encryption before writing to database. Strong file system security is also recommended. [Third Party Tools] To help NoSQL databases solve the critical deficiency in data-- at-- rest security, a few third-- party tools have emerged to provide transparent data encryption and the associated key management, such as Gazzang [Ref. 11], Zettaset [Ref. 12] and IBM InfoSphere Guardium [Ref. 13]. The solutions provided by Gazzang and Zettaset are specifically targeted for distributed cloud-- based NoSQL and Hadoop systems. IBM InfoSphere Guardium, on the other hand, is suitable for a wide range of RDBMS and NoSQL databases. 2. Data in Motion (Client-- Node Communications) -- [Cassandra] By default, the client-- node communication is not encrypted. SSL can be turned on by editing the corresponding settings under client_encryption_options in the cassandra.yaml file after generating valid server certificates. PAGE 6 PAGE 6
7 [MongoDB] The default distribution of MongoDB does not support SSL client-- node communication. In order to use SSL, it is required to either recompile MongoDB with the "-- -- ssl" option, or use the MongoDB Enterprise version. Additional steps to generate keys are needed for configuring client/server for SSL communication. 3. Data in Motion (Inter-- Node Communications) -- [Cassandra] By default the inter-- node communication is not encrypted either. If needed, available SSL encryption options are "all" (all inter-- node), "dc" (between datacenters), and "rack" (between racks). Inter-- node SS communication can be configured by editing the corresponding settings under server_encryption_options in the cassandra.yaml file. [MongoDB] Inter-- node encryption communication is not supported in MongoDB. 4. Authentication -- [Cassandra] By default the authenticator setting of basic Cassandra is AllowAllAuthenticator, which means essentially there is no authentication. The other available option is PasswordAuthenticator, in which user names and passwords (hashed but unsalted) are stored in the system_auth.credentials table. Enterprise Cassandra can further provide Kerberos authentication, which requires setting up separate Kerberos servers and installing Kerberos client software on all joining Cassandra hosts. [MongoDB] Authentication is also disabled by default. Basic MongoDB does provide support for authentication on a per-- database level. Users exist in the context of a single logical database. MongoDB Enterprise supports an additional Kerberos service for authentication. 5. Authorization -- Due to the schema-- less nature of NoSQL's data models, fine-- grained data access controls at the row or column level, as provided by RDBMS like Oracle, are not available with current NoSQL databases. Some of them do implement some sort of authorization if needed. [Cassandra ] The default choice is AllowAllAuthorizer, which essentially provides no authorization and allows any action by any user. If CassandraAuthorizer is selected, then privileged administrators can grant any of the privileges (ALTER, AUTHORIZE, CREATE, DROP, MODIFY, SELECT) on any resources (ALL KEYSPACES, KEYSPACE, TABLE) to a selected user, by executing CQL (Cassandra Query Language) statements. PAGE 7 PAGE 7
8 [MongoDB] Disabled by default, MongoDB provisions authorization on a per-- database level by using a role-- based approach. Available roles are limited to the following, read, readwrite, dbadmin, useradmin, clusteradmin, readanydatabase, readwriteanydatabase, useradminanydatabase, and dbaadminanydatabase. 6. Audit Security logging and monitoring is also required by the PCI-DSS compliance (Requirement 10), to determine the "who, what, where and when" of users accessing a data processing resource, such as a database. [Cassandra] Auditing is available in Enterprise Cassandra as a log4j-- based integration, and a per-- node basis. To get the maximum audit information, turning on auditing on every node is recommended. Filters are available for logging, using a combination of the following categories, ADMIN, ALL, AUTH, DML, DDL, DCL, and QUERY. [MongoDB] MongoDB is far behind in implementing the desired security logging and monitoring. Most monitoring and reporting tools currently distributed with MongoDB are related to database performance, mainly for showing the running state of a MongoDB instance. There is an HTTP Console for each MongoDB instance to show information about the system and connecting clients. However, if security is not enabled for the MongoDB instance, which is by default, no authorization is needed to access this interface, resulting in a potential vulnerability. 7. Data Consistency -- Because of the shared BASE design among NoSQL databases, inherent data inconsistency among clustering nodes becomes possibly. This may explain why NoSQL databases have not well made their way into processing critical financial transactions. The potential data inconsistency can be shown in the following series of diagrams, PAGE 8 PAGE 8
9 Fig. 2 A user enters information into a social network site Fig. 3 Shortly the information is updated, but hasn't been consistently replicated PAGE 9 PAGE 9
10 Fig. 4 Read inconsistency could happen if stale data is retrieved Since NoSQL databases do not guarantee strong data consistency, it usually falls on developers to design applications that can work with the eventual consistency model, and to weigh tradeoffs between data consistency and performance impact. Cassandra does provide a range of configurable write and read consistency levels (CL) to meet particular application needs, as shown in Fig. 5 [Ref. 14]. PAGE 10 PAGE 10
11 Fig. 5 Configurable write and read consistency levels available in Cassandra 8. NoSQL Injection Exploits Just like their traditional RDMBS counterparts, NoSQL databases are susceptible for injection attacks, especially those heavily use server-- side JavaScript and PHP to enhance database performance. Take MongoDB for example, its internal operator "$where", designed to be used as a filter like the "where" clause in SQL, can also takes sophisticated JavaScript functions to filter data. An attacker thus can pass arbitrary code or commands into the $where operator as part of the query. Other vulnerable MongoDB operations include db.eval(), mapreduce, and group, which also permit to run arbitrary JavaScript expressions on the server. The next release of Open Web Application Security Project (OWASP) Test Guide (v4), currently still in draft, is to include new procedures for testing NoSQL injections [Ref. 15]. Although the draft test uses MongoDB as the target for example, other NoSQL databases that built upon JavaScript and/or PHP engines may possess similar vulnerabilities. Typically, NoSQL injection attacks will execute where the attack string is parsed, evaluated, or concatenated into a NoSQL API call. Attackers PAGE 11 PAGE 11
12 just need to be familiar with the syntax, data model, and underlying programming language of the target database in order to design specific exploits. The following examples demonstrate how JavaScript NoSQL injections can be crafted against a vulnerable MongoDB instance. [JavaScript NoSQL Injection #1] To demonstrate a potential NoSQL injection against MongoDB, consider the following two valid, equivalent JavaScript statements to retrieve a collection of data that meet the (credits < debits) condition, 1. db.mycollection.find( { $where: "this.credits < this.debits" } ); 2. db.mycollection.find( { $where: function() { return obj.credits - obj.debits < 0; } } ); If a dynamic threshold that takes a user input is desired, the second statement can be re-- written as follows, 3. db.mycollection.find( { $where: function() { return obj.credits - obj.debits < $userinput; } } ); This may expose a vulnerability where an attacker could overwrite the $userinput variable with arbitrary code, such as $userinput = "0;var date=new Date(); do{curdate = new Date();}while(curDate-date<10000)" If sanitization check fails to screen the $userinput value, now upon concatenation the third statement becomes the following form that could trigger a DOS attack and cause the MongoDB instance to execute at 100% CPU usage for 10 second! 4. db.mycollection.find( { $where: function() { return obj.credits - obj.debits < 0;var date=new Date(); do{curdate = new Date();}while(curDate-date<10000); } } ); [JavaScript NoSQL Injection #2] If developers are not careful enough in security coding, it is also possible for an attacker to pass malicious code directly from a malformed URL [Ref. 16]. The following is a generic JavaScript query function to perform a search based on a provided 'year' criterion, input_value. function() { PAGE 12 PAGE 12
13 var search_year = input_value; return this.publicationyear == search_year this.filmingyear == search_year this.recordingyear == search_year; } The application developer may code this application using PHP, and the source code that includes building the above function might look like the following, before being passed to a MongoDB instance, $query = 'function() {var search_year = \''. $_GET['year']. '\';'. 'return this.publicationyear == search_year '. ' this.filmingyear == search_year '. ' this.recordingyear == search_year;}'; $cursor = $collection->find(array('$where' => $query)); This code builds the function ad-- hoc by concatenating the value of the request parameter year, and then pass it to MongoDB. This code is vulnerable to a server-- side JavaScript injection attack. For example, an attacker could formulate the following URL call to cause an effective DoS attack against the system: Conclusions Based on this open-- source research, the following conclusions can be drawn; 1. NoSQL databases are desirable and popular among Web-- based companies, due to their demonstrated advantages in data flexibility, scalability and performance. 2. Security issues of NoSQL in general remain to be improved. There are only a few NoSQL (e.g., Cassandra) that currently meet the data security requirements of PCI-- DSS, e.g., data-- at-- rest and data-- in-- motion. However, enhanced security is expected to come at the expense of performance 3. More server-- side JavaScript injection vulnerabilities are expected from NoSQL databases, because many of them are running JavaScript engines to achieve high performance. PAGE 13 PAGE 13
14 4. Working with NoSQL databases, application developers have much greater responsibility in ensuring reliable transactions and data consistency. In addition, they also have to adhere more closely to the standards and practices of security coding. 5. Relational and NoSQL databases are best co-- deployed to process different data flows to achieve the optimal combined features from both families. PAGE 14 PAGE 14
15 Author Dr. Ming-- Shih Wong is a Senior Cyber Security Engineer for Incident Response & Forensics for Fidelis Cybersecurity Solutions. He has years of experience in conducting advanced projects for Air Force Intelligence, Surveillance and Reconnaissance (AFISR) and Defense Advanced Research Project Agency (DARPA). He has also participated in several major commercial data-- breach Incident Response and Remediation engagements that involve noteworthy companies in payment card and technology industries. As a member of the Fidelis First Response team, he collaborates with forensics and SOC experts in optimizing search strategies for investigation of key indicators of compromise (IOC), utilizing advanced tools like Splunk, ArcSight, open-- source log analyzers, or even customized databases. He has also extended his database management foundation to cover PCI security standards and compliance, including data security at rest and data security in motion. He provides expertise in the following data analytics and remediation areas, database security management, breach-- indicator investigation, PCI data security standards and compliance, network and host intrusion detections. References 1. L. Okman, N. Gal-- Oz, Y. Gonen, E. Gudes, and J. Abramov, "Security Issues in NoSQL Databases", 2011 International Joint Conference of IEEE TrustCom-- 11/IEEE ICESS-- 11/FACT database.org/ "The Four Categories of NoSQL", four-- categories-- of-- nosql-- databases. 6. "Netflix Relies on NoSQL", relies-- on-- nosql/ 7. "Hosting Service MongoDB Suffers Major Security Breach That Explains PAGE 15 PAGE 15
16 Buffer's Hack Over the Weekend", service-- mongohq-- suffers-- major-- security-- breach-- that-- explains-- buffers-- hack-- over- - the-- weekend/ 8. "LinkedIn Suffer Data Breach", us-- linkedin-- breach-- idusbre "DataStax Enterprise 3.2 Documentation", "MongoDB Security Introduction", introduction 11. "Data Encryption and Key Management for the Cloud", security 12. "Hadoop Strict Encryption for (Big) Data-- At-- Rest", strict-- encryption-- for-- big-- data-- at/ "NoSQL Does Not Have to Mean No Security -- Data security and compliance best practices for NoSQL data systems", DF 14. "Cassandra Replication & Consistency", to-- cassandra-- replicatio-- and-- consistency 15. "Testing for NoSQL Injection", injection 16. "Server-- Side JavaScript Injections", us-- 11/Sullivan/BH_US_11_Sullivan_Server_Side_WP.pdf PAGE 16 PAGE 16
NoSQL Database Systems and their Security Challenges
NoSQL Database Systems and their Security Challenges Morteza Amini [email protected] Data & Network Security Lab (DNSL) Department of Computer Engineering Sharif University of Technology September 25 2
Why NoSQL? Your database options in the new non- relational world. 2015 IBM Cloudant 1
Why NoSQL? Your database options in the new non- relational world 2015 IBM Cloudant 1 Table of Contents New types of apps are generating new types of data... 3 A brief history on NoSQL... 3 NoSQL s roots
SQL VS. NO-SQL. Adapted Slides from Dr. Jennifer Widom from Stanford
SQL VS. NO-SQL Adapted Slides from Dr. Jennifer Widom from Stanford 55 Traditional Databases SQL = Traditional relational DBMS Hugely popular among data analysts Widely adopted for transaction systems
Analytics March 2015 White paper. Why NoSQL? Your database options in the new non-relational world
Analytics March 2015 White paper Why NoSQL? Your database options in the new non-relational world 2 Why NoSQL? Contents 2 New types of apps are generating new types of data 2 A brief history of NoSQL 3
Introduction to Apache Cassandra
Introduction to Apache Cassandra White Paper BY DATASTAX CORPORATION JULY 2013 1 Table of Contents Abstract 3 Introduction 3 Built by Necessity 3 The Architecture of Cassandra 4 Distributing and Replicating
Server-Side JavaScript Injection Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team July 2011
Server-Side JavaScript Injection Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team July 2011 Abstract This whitepaper is presented in support of the BlackHat USA 2011 talk,
Lecture Data Warehouse Systems
Lecture Data Warehouse Systems Eva Zangerle SS 2013 PART C: Novel Approaches in DW NoSQL and MapReduce Stonebraker on Data Warehouses Star and snowflake schemas are a good idea in the DW world C-Stores
INTRODUCTION TO CASSANDRA
INTRODUCTION TO CASSANDRA This ebook provides a high level overview of Cassandra and describes some of its key strengths and applications. WHAT IS CASSANDRA? Apache Cassandra is a high performance, open
Cloud Scale Distributed Data Storage. Jürmo Mehine
Cloud Scale Distributed Data Storage Jürmo Mehine 2014 Outline Background Relational model Database scaling Keys, values and aggregates The NoSQL landscape Non-relational data models Key-value Document-oriented
NoSQL Data Base Basics
NoSQL Data Base Basics Course Notes in Transparency Format Cloud Computing MIRI (CLC-MIRI) UPC Master in Innovation & Research in Informatics Spring- 2013 Jordi Torres, UPC - BSC www.jorditorres.eu HDFS
So What s the Big Deal?
So What s the Big Deal? Presentation Agenda Introduction What is Big Data? So What is the Big Deal? Big Data Technologies Identifying Big Data Opportunities Conducting a Big Data Proof of Concept Big Data
NoSQL Databases. Nikos Parlavantzas
!!!! NoSQL Databases Nikos Parlavantzas Lecture overview 2 Objective! Present the main concepts necessary for understanding NoSQL databases! Provide an overview of current NoSQL technologies Outline 3!
Highly available, scalable and secure data with Cassandra and DataStax Enterprise. GOTO Berlin 27 th February 2014
Highly available, scalable and secure data with Cassandra and DataStax Enterprise GOTO Berlin 27 th February 2014 About Us Steve van den Berg Johnny Miller Solutions Architect Regional Director Western
Can the Elephants Handle the NoSQL Onslaught?
Can the Elephants Handle the NoSQL Onslaught? Avrilia Floratou, Nikhil Teletia David J. DeWitt, Jignesh M. Patel, Donghui Zhang University of Wisconsin-Madison Microsoft Jim Gray Systems Lab Presented
Overview of Databases On MacOS. Karl Kuehn Automation Engineer RethinkDB
Overview of Databases On MacOS Karl Kuehn Automation Engineer RethinkDB Session Goals Introduce Database concepts Show example players Not Goals: Cover non-macos systems (Oracle) Teach you SQL Answer what
Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric
Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric Table of Contents Table of Contents... 2 Overview... 3 PIN Transaction Security Requirements... 3 Payment Application
Slave. Master. Research Scholar, Bharathiar University
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper online at: www.ijarcsse.com Study on Basically, and Eventually
Lambda Architecture. Near Real-Time Big Data Analytics Using Hadoop. January 2015. Email: [email protected] Website: www.qburst.com
Lambda Architecture Near Real-Time Big Data Analytics Using Hadoop January 2015 Contents Overview... 3 Lambda Architecture: A Quick Introduction... 4 Batch Layer... 4 Serving Layer... 4 Speed Layer...
wow CPSC350 relational schemas table normalization practical use of relational algebraic operators tuple relational calculus and their expression in a declarative query language relational schemas CPSC350
Comparing SQL and NOSQL databases
COSC 6397 Big Data Analytics Data Formats (II) HBase Edgar Gabriel Spring 2015 Comparing SQL and NOSQL databases Types Development History Data Storage Model SQL One type (SQL database) with minor variations
Introduction to NOSQL
Introduction to NOSQL Université Paris-Est Marne la Vallée, LIGM UMR CNRS 8049, France January 31, 2014 Motivations NOSQL stands for Not Only SQL Motivations Exponential growth of data set size (161Eo
NoSQL Database Options
NoSQL Database Options Introduction For this report, I chose to look at MongoDB, Cassandra, and Riak. I chose MongoDB because it is quite commonly used in the industry. I chose Cassandra because it has
HDB++: HIGH AVAILABILITY WITH. l TANGO Meeting l 20 May 2015 l Reynald Bourtembourg
HDB++: HIGH AVAILABILITY WITH Page 1 OVERVIEW What is Cassandra (C*)? Who is using C*? CQL C* architecture Request Coordination Consistency Monitoring tool HDB++ Page 2 OVERVIEW What is Cassandra (C*)?
NoSQL Databases. Institute of Computer Science Databases and Information Systems (DBIS) DB 2, WS 2014/2015
NoSQL Databases Institute of Computer Science Databases and Information Systems (DBIS) DB 2, WS 2014/2015 Database Landscape Source: H. Lim, Y. Han, and S. Babu, How to Fit when No One Size Fits., in CIDR,
A COMPARATIVE STUDY OF NOSQL DATA STORAGE MODELS FOR BIG DATA
A COMPARATIVE STUDY OF NOSQL DATA STORAGE MODELS FOR BIG DATA Ompal Singh Assistant Professor, Computer Science & Engineering, Sharda University, (India) ABSTRACT In the new era of distributed system where
Composite Data Virtualization Composite Data Virtualization And NOSQL Data Stores
Composite Data Virtualization Composite Data Virtualization And NOSQL Data Stores Composite Software October 2010 TABLE OF CONTENTS INTRODUCTION... 3 BUSINESS AND IT DRIVERS... 4 NOSQL DATA STORES LANDSCAPE...
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Making Sense ofnosql A GUIDE FOR MANAGERS AND THE REST OF US DAN MCCREARY MANNING ANN KELLY. Shelter Island
Making Sense ofnosql A GUIDE FOR MANAGERS AND THE REST OF US DAN MCCREARY ANN KELLY II MANNING Shelter Island contents foreword preface xvii xix acknowledgments xxi about this book xxii Part 1 Introduction
Structured Data Storage
Structured Data Storage Xgen Congress Short Course 2010 Adam Kraut BioTeam Inc. Independent Consulting Shop: Vendor/technology agnostic Staffed by: Scientists forced to learn High Performance IT to conduct
X4-2 Exadata announced (well actually around Jan 1) OEM/Grid control 12c R4 just released
General announcements In-Memory is available next month http://www.oracle.com/us/corporate/events/dbim/index.html X4-2 Exadata announced (well actually around Jan 1) OEM/Grid control 12c R4 just released
Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related
Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related Summary Xiangzhe Li Nowadays, there are more and more data everyday about everything. For instance, here are some of the astonishing
extensible record stores document stores key-value stores Rick Cattel s clustering from Scalable SQL and NoSQL Data Stores SIGMOD Record, 2010
System/ Scale to Primary Secondary Joins/ Integrity Language/ Data Year Paper 1000s Index Indexes Transactions Analytics Constraints Views Algebra model my label 1971 RDBMS O tables sql-like 2003 memcached
Databases 2 (VU) (707.030)
Databases 2 (VU) (707.030) Introduction to NoSQL Denis Helic KMI, TU Graz Oct 14, 2013 Denis Helic (KMI, TU Graz) NoSQL Oct 14, 2013 1 / 37 Outline 1 NoSQL Motivation 2 NoSQL Systems 3 NoSQL Examples 4
Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation
Facebook: Cassandra Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/24 Outline 1 2 3 Smruti R. Sarangi Leader Election
A Survey of Distributed Database Management Systems
Brady Kyle CSC-557 4-27-14 A Survey of Distributed Database Management Systems Big data has been described as having some or all of the following characteristics: high velocity, heterogeneous structure,
Applications for Big Data Analytics
Smarter Healthcare Applications for Big Data Analytics Multi-channel sales Finance Log Analysis Homeland Security Traffic Control Telecom Search Quality Manufacturing Trading Analytics Fraud and Risk Retail:
An Approach to Implement Map Reduce with NoSQL Databases
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Page No. 13635-13639 An Approach to Implement Map Reduce with NoSQL Databases Ashutosh
No-SQL Databases for High Volume Data
Target Conference 2014 No-SQL Databases for High Volume Data Edward Wijnen 3 November 2014 The New Connected World Needs a Revolutionary New DBMS Today The Internet of Things 1990 s Mobile 1970 s Mainfram
Database Management System Choices. Introduction To Database Systems CSE 373 Spring 2013
Database Management System Choices Introduction To Database Systems CSE 373 Spring 2013 Outline Introduction PostgreSQL MySQL Microsoft SQL Server Choosing A DBMS NoSQL Introduction There a lot of options
NoSQL Databases. Polyglot Persistence
The future is: NoSQL Databases Polyglot Persistence a note on the future of data storage in the enterprise, written primarily for those involved in the management of application development. Martin Fowler
NOSQL VS RDBMS - WHY THERE IS ROOM FOR BOTH
NOSQL VS RDBMS - WHY THERE IS ROOM FOR BOTH Cory Nance [email protected] Travis Losser [email protected] Reenu Iype [email protected] Gary Harmon [email protected]
Practical Cassandra. Vitalii Tymchyshyn [email protected] @tivv00
Practical Cassandra NoSQL key-value vs RDBMS why and when Cassandra architecture Cassandra data model Life without joins or HDD space is cheap today Hardware requirements & deployment hints Vitalii Tymchyshyn
Sentimental Analysis using Hadoop Phase 2: Week 2
Sentimental Analysis using Hadoop Phase 2: Week 2 MARKET / INDUSTRY, FUTURE SCOPE BY ANKUR UPRIT The key value type basically, uses a hash table in which there exists a unique key and a pointer to a particular
Enabling SOX Compliance on DataStax Enterprise
Enabling SOX Compliance on DataStax Enterprise Table of Contents Table of Contents... 2 Introduction... 3 SOX Compliance and Requirements... 3 Who Must Comply with SOX?... 3 SOX Goals and Objectives...
Preparing Your Data For Cloud
Preparing Your Data For Cloud Narinder Kumar Inphina Technologies 1 Agenda Relational DBMS's : Pros & Cons Non-Relational DBMS's : Pros & Cons Types of Non-Relational DBMS's Current Market State Applicability
www.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team Agenda Eventual Consistency REST APIs and CSRF NoSQL Injection SSJS Injection NoSQL databases
Understanding NoSQL on Microsoft Azure
David Chappell Understanding NoSQL on Microsoft Azure Sponsored by Microsoft Corporation Copyright 2014 Chappell & Associates Contents Data on Azure: The Big Picture... 3 Relational Technology: A Quick
Big Systems, Big Data
Big Systems, Big Data When considering Big Distributed Systems, it can be noted that a major concern is dealing with data, and in particular, Big Data Have general data issues (such as latency, availability,
NOSQL INTRODUCTION WITH MONGODB AND RUBY GEOFF LANE <[email protected]> @GEOFFLANE
NOSQL INTRODUCTION WITH MONGODB AND RUBY GEOFF LANE @GEOFFLANE WHAT IS NOSQL? NON-RELATIONAL DATA STORAGE USUALLY SCHEMA-FREE ACCESS DATA WITHOUT SQL (THUS... NOSQL) WIDE-COLUMN / TABULAR
these three NoSQL databases because I wanted to see a the two different sides of the CAP
Michael Sharp Big Data CS401r Lab 3 For this paper I decided to do research on MongoDB, Cassandra, and Dynamo. I chose these three NoSQL databases because I wanted to see a the two different sides of the
How To Write A Database Program
SQL, NoSQL, and Next Generation DBMSs Shahram Ghandeharizadeh Director of the USC Database Lab Outline A brief history of DBMSs. OSs SQL NoSQL 1960/70 1980+ 2000+ Before Computers Database DBMS/Data Store
Understanding NoSQL Technologies on Windows Azure
David Chappell Understanding NoSQL Technologies on Windows Azure Sponsored by Microsoft Corporation Copyright 2013 Chappell & Associates Contents Data on Windows Azure: The Big Picture... 3 Windows Azure
NOSQL DATABASES AND CASSANDRA
NOSQL DATABASES AND CASSANDRA Semester Project: Advanced Databases DECEMBER 14, 2015 WANG CAN, EVABRIGHT BERTHA Université Libre de Bruxelles 0 Preface The goal of this report is to introduce the new evolving
Advanced Data Management Technologies
ADMT 2014/15 Unit 15 J. Gamper 1/44 Advanced Data Management Technologies Unit 15 Introduction to NoSQL J. Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE ADMT 2014/15 Unit 15
MongoDB in the NoSQL and SQL world. Horst Rechner [email protected] Berlin, 2012-05-15
MongoDB in the NoSQL and SQL world. Horst Rechner [email protected] Berlin, 2012-05-15 1 MongoDB in the NoSQL and SQL world. NoSQL What? Why? - How? Say goodbye to ACID, hello BASE You
Cassandra A Decentralized Structured Storage System
Cassandra A Decentralized Structured Storage System Avinash Lakshman, Prashant Malik LADIS 2009 Anand Iyer CS 294-110, Fall 2015 Historic Context Early & mid 2000: Web applicaoons grow at tremendous rates
Introduction to Multi-Data Center Operations with Apache Cassandra and DataStax Enterprise
Introduction to Multi-Data Center Operations with Apache Cassandra and DataStax Enterprise White Paper BY DATASTAX CORPORATION October 2013 1 Table of Contents Abstract 3 Introduction 3 The Growth in Multiple
nosql and Non Relational Databases
nosql and Non Relational Databases Image src: http://www.pentaho.com/big-data/nosql/ Matthias Lee Johns Hopkins University What NoSQL? Yes no SQL.. Atleast not only SQL Large class of Non Relaltional Databases
An Open Source NoSQL solution for Internet Access Logs Analysis
An Open Source NoSQL solution for Internet Access Logs Analysis A practical case of why, what and how to use a NoSQL Database Management System instead of a relational one José Manuel Ciges Regueiro
Oracle Big Data SQL Technical Update
Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical
Big Data Development CASSANDRA NoSQL Training - Workshop. March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI
Big Data Development CASSANDRA NoSQL Training - Workshop March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI ISIDUS TECH TEAM FZE PO Box 121109 Dubai UAE, email training-coordinator@isidusnet M: +97150
BIG DATA TOOLS. Top 10 open source technologies for Big Data
BIG DATA TOOLS Top 10 open source technologies for Big Data We are in an ever expanding marketplace!!! With shorter product lifecycles, evolving customer behavior and an economy that travels at the speed
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
MongoDB Security Guide
MongoDB Security Guide Release 2.6.11 MongoDB, Inc. December 09, 2015 2 MongoDB, Inc. 2008-2015 This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 United States License
Open Source Technologies on Microsoft Azure
Open Source Technologies on Microsoft Azure A Survey @DChappellAssoc Copyright 2014 Chappell & Associates The Main Idea i Open source technologies are a fundamental part of Microsoft Azure The Big Questions
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
How To Scale Out Of A Nosql Database
Firebird meets NoSQL (Apache HBase) Case Study Firebird Conference 2011 Luxembourg 25.11.2011 26.11.2011 Thomas Steinmaurer DI +43 7236 3343 896 [email protected] www.scch.at Michael Zwick DI
The NoSQL Ecosystem, Relaxed Consistency, and Snoop Dogg. Adam Marcus MIT CSAIL [email protected] / @marcua
The NoSQL Ecosystem, Relaxed Consistency, and Snoop Dogg Adam Marcus MIT CSAIL [email protected] / @marcua About Me Social Computing + Database Systems Easily Distracted: Wrote The NoSQL Ecosystem in
NoSQL. Thomas Neumann 1 / 22
NoSQL Thomas Neumann 1 / 22 What are NoSQL databases? hard to say more a theme than a well defined thing Usually some or all of the following: no SQL interface no relational model / no schema no joins,
Big Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
Open source large scale distributed data management with Google s MapReduce and Bigtable
Open source large scale distributed data management with Google s MapReduce and Bigtable Ioannis Konstantinou Email: [email protected] Web: http://www.cslab.ntua.gr/~ikons Computing Systems Laboratory
DBA'S GUIDE TO NOSQL APACHE CASSANDRA
DBA'S GUIDE TO NOSQL APACHE CASSANDRA THE ENLIGHTENED DBA Smashwords Edition Copyright 2014 The Enlightened DBA This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform Page 1 of 16 Table of Contents Table of Contents... 2 Introduction... 3 NoSQL Databases... 3 CumuLogic NoSQL Database Service...
MapReduce with Apache Hadoop Analysing Big Data
MapReduce with Apache Hadoop Analysing Big Data April 2010 Gavin Heavyside [email protected] About Journey Dynamics Founded in 2006 to develop software technology to address the issues
BRAC. Investigating Cloud Data Storage UNIVERSITY SCHOOL OF ENGINEERING. SUPERVISOR: Dr. Mumit Khan DEPARTMENT OF COMPUTER SCIENCE AND ENGEENIRING
BRAC UNIVERSITY SCHOOL OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGEENIRING 12-12-2012 Investigating Cloud Data Storage Sumaiya Binte Mostafa (ID 08301001) Firoza Tabassum (ID 09101028) BRAC University
Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam [email protected]
Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam [email protected] Agenda The rise of Big Data & Hadoop MySQL in the Big Data Lifecycle MySQL Solutions for Big Data Q&A
Scalable Architecture on Amazon AWS Cloud
Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies [email protected] 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect
BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &
BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & Innovation 04-08-2011 to the EC 8 th February, Luxembourg Your Atos business Research technologists. and Innovation
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Introduction to Hadoop. New York Oracle User Group Vikas Sawhney
Introduction to Hadoop New York Oracle User Group Vikas Sawhney GENERAL AGENDA Driving Factors behind BIG-DATA NOSQL Database 2014 Database Landscape Hadoop Architecture Map/Reduce Hadoop Eco-system Hadoop
Evaluation of NoSQL databases for large-scale decentralized microblogging
Evaluation of NoSQL databases for large-scale decentralized microblogging Cassandra & Couchbase Alexandre Fonseca, Anh Thu Vu, Peter Grman Decentralized Systems - 2nd semester 2012/2013 Universitat Politècnica
Big Data and Scripting Systems build on top of Hadoop
Big Data and Scripting Systems build on top of Hadoop 1, 2, Pig/Latin high-level map reduce programming platform interactive execution of map reduce jobs Pig is the name of the system Pig Latin is the
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges Prerita Gupta Research Scholar, DAV College, Chandigarh Dr. Harmunish Taneja Department of Computer Science and
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Referential Integrity in Cloud NoSQL Databases
Referential Integrity in Cloud NoSQL Databases by Harsha Raja A thesis submitted to the Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Engineering
Big Data Course Highlights
Big Data Course Highlights The Big Data course will start with the basics of Linux which are required to get started with Big Data and then slowly progress from some of the basics of Hadoop/Big Data (like
White paper. The Big Data Security Gap: Protecting the Hadoop Cluster
The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and
Introduction to Multi-Data Center Operations with Apache Cassandra, Hadoop, and Solr WHITE PAPER
Introduction to Multi-Data Center Operations with Apache Cassandra, Hadoop, and Solr WHITE PAPER By DataStax Corporation August 2012 Contents Introduction...3 The Growth in Multiple Data Centers...3 Why
Cloud Computing at Google. Architecture
Cloud Computing at Google Google File System Web Systems and Algorithms Google Chris Brooks Department of Computer Science University of San Francisco Google has developed a layered system to handle webscale
Study and Comparison of Elastic Cloud Databases : Myth or Reality?
Université Catholique de Louvain Ecole Polytechnique de Louvain Computer Engineering Department Study and Comparison of Elastic Cloud Databases : Myth or Reality? Promoters: Peter Van Roy Sabri Skhiri
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
