• Conferences

research paper on mongodb

  • Registration Information
  • Student Grant Application
  • Diversity Grant Application
  • Grants for Black Computer Science Students
  • Technical Sessions
  • Sponsor Events
  • Call for Papers
  • Instructions for Presenters
  • Sponsorship
  • Past Symposia
  • Symposium Organizers
  • Conference Policies
  • Code of Conduct

Fault-Tolerant Replication with Pull-Based Consensus in MongoDB

Siyuan Zhou, MongoDB Inc.; Shuai Mu, Stony Brook University

In this paper, we present the design and implementation of strongly consistent replication in MongoDB. MongoDB provides linearizability and tolerates any minority of failures through a novel consensus protocol that derives from Raft. A major difference between our protocol and vanilla Raft is that MongoDB deploys a unique pull-based data synchronization model: a replica pulls new data from another replica. This pull-based data synchronization in MongoDB can be initiated by any replica and can happen between any two replicas, as opposed to vanilla Raft, where new data can only be pushed from the primary to other replicas. This flexible data transmission topology enabled by the pull-based model is strongly desired by our users since it has an edge on performance and monetary cost. This paper describes how this consensus protocol works, how MongoDB integrates it with the rest of the replication system, and the extensions of the replication protocol that support our rich feature set. Our evaluation shows that MongoDB effectively achieved the design goals and can replicate data efficiently and reliably.

Siyuan Zhou, MongoDB Inc.

Shuai mu, stony brook university.

NSDI '21 Open Access Sponsored by NetApp

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

research paper on mongodb

Presentation Video 

chrome icon

A Review on Various Aspects of MongoDb Databases

Content maybe subject to  copyright     Report

7  citations

View 1 citation excerpt

Cites background from "A Review on Various Aspects of Mong..."

... MongoDB is able to store larger amount of data compared to SQL (Structured Query Language) databases [9]. ...

4  citations

2  citations

... Fitur yang juga merupakan bagian dari fungsi intinya adalah kemampuan untuk melakukan skala secara horizontal, (Chauhan, 2019). ...

1  citations

112  citations

35  citations

View 2 reference excerpts

"A Review on Various Aspects of Mong..." refers background in this paper

... { _id:ObjectId(7df78ad8902c) Title:’MongoDB Overview’ Description:’ MongoDB is no sql database Comments: [ { user:’user1’, Message:’my first comment’, dateCreated: new Date(2011,1,20,2,15), }, { user:’user2’, Message: ‘my second comments’ dateCreated: new Date (2011,1,25,7,45), } } • Sample Document - ...

... Comments: [ { user:’user1’, Message:’my first comment’, dateCreated: new Date(2011,1,20,2,15), }, { user:’user2’, Message: ‘my second comments’ dateCreated: new Date (2011,1,25,7,45), } } • Sample Document - Above example shows the document structure of a blog site, which is simply a comma separated key value pair. ...

19  citations

Related Papers (3)

Ask Copilot

Related papers

A Survey on Security Threats and Mitigation Strategies for NoSQL Databases

MongoDB as a Use Case

  • Conference paper
  • First Online: 09 December 2023
  • Cite this conference paper

Book cover

  • Surabhi Dwivedi 10 ,
  • R. Balaji 10 ,
  • Praveen Ampatt 10 &
  • S. D. Sudarsan 10  

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14424))

Included in the following conference series:

  • International Conference on Information Systems Security

301 Accesses

With the advent of IoT devices, cloud computing, accessible mobile devices, social networking sites and other advancements in technology a huge amount of data is being generated. NoSQL databases were evolved to provide a better storage capability, scalability, improved performance for read and write operations for the enormous data generated by various systems which are continuously being read and written by large number of users. Initially it was believed to provide better security in comparison to the traditional relational database management system (RDBMS), but in due course of time NoSQL databases were also exposed to various security breaches and vulnerabilities. In this paper we studied in detail the various security vulnerabilities of MongoDB, along with the need to secure the interfaces being used to access MongoDB. We analyzed the prevention and mitigation strategies for the same. The study of this paper can be used as a best practice to secure NoSQL or MongoDB database. It suggests how to secure the queries and all the interfaces that are being used to access the database.

  • NoSQL Injection
  • Data Masking

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Brewer, E.A.: Towards robust distributed systems. In: PODC , vol. 7 (2000)

Google Scholar  

Db engines. https://db-engines.com/en/ranking . Accessed 02 Sept 2022

Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security Issues in NoSQL Databases. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011 (2011)

Sicari, S., Rizzardi, A., Coen-Porisini, A.: Security& privacy issues and challenges in NoSQL databases. Comput. Netw. Int. J. Comput. Telecommun. Netw. 206( C), 341 (2022)

Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NOSQL system vulnerabilities with big data. Int. J. Managing Inf. Technol. (IJMIT), 11 (4), 1–19 (2019)

Ron, A., Shulman-Peleg, A., Puzanov, A.: Analysis and mitigation of NoSQL injections. IEEE Secur. Priv. 14 (2), 30–39 (2016)

Zdnet. https://www.zdnet.com/article/chinese-companies-have-leaked-over-590-million-resumes-via-open-databases/ . Accessed 02 July 2023

Bleeping computer. https://www.bleepingcomputer.com/news/security/russian-streaming-platform-confirms-data-breach-affecting-75m-users/ . Accessed 09 July 2023

Bleeping computer. https://www.bleepingcomputer.com/news/security/over-275-million-records-exposed-by-unsecured-mongodb-database/ . Accessed 09 July 2023

Cpomagazine. https://www.cpomagazine.com/cyber-security/toyota-connected-service-decade-long-data-leak-exposed-2-15-million-customers/ . Accessed 18 July 2023

Bleeping computer. https://www.bleepingcomputer.com/news/security/redis-mongodb-and-elastic-2022-s-top-exposed-databases/ . Accessed 18 July 2023

Imam, A.A., Basri, S., González-Aparicio, M.T., Balogun, A.O., Kumar, G.: NoInjection: preventing unsafe queries on NoSQL-document-model databases. In: 2nd International Conference on Computing and Information Technology (ICCIT) (2022)

Ron, A., Shulman-Peleg, A., Bronshtein, E: No SQL, No Injection? Examining NoSQL Security

Hou, B., Qian, K., Li, L., Shi, Y., Tao, L., Liu, J.: MongoDB NoSQL Injection Analysis and Detection. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), 2016 (2016)

A survey on detection and prevention of SQL and NoSQL injection attack on server-side applications. Int. J. Comput. Appl. (0975 - 8887), 183 (2021)

Invicti. https://www.invicti.com/blog/web-security/what-is-nosql-injection/ . Accessed 07 Nov 2022

Spiegel, P.: NoSQL injection fun with objects and arrays (2022). https://owasp.org/www-pdf-archive/GOD16-NOSQL.pdf

Databases security issues - a short analysis on the emergent security problems generated by NoSQL databases. Economic Computation and Economic Cybernetics Studies and Research 53 (3) (2019)

Rodríguez, G.E., Torres, J.G., Flores, P., Benavides, D.E.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 166 , 106960 (2020)

OWASP. https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/01-Testing_for_Weak_SSL_TLS_Ciphers_Insufficient_Transport_Layer_Protection . Accessed 28 July 2023

Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_2

Chapter   Google Scholar  

Qualys. https://blog.qualys.com/product-tech/2013/03/19/rc4-in-tls-is-broken-now-what . Accessed 09 July 2023

Zugaj, W., Beichler, A.S.: Analysis of standard security features for selected NoSQL systems. Am. J. Inf. Sci. Technol. (2019)

Meow attack. https://www.bleepingcomputer.com/news/security/new-meow-attack-has-deleted-almost-4-000-unsecured-databases/ . Accessed 02 Oct 2023

Hackernoon. https://hackernoon.com/learnings-from-the-meow-bot-attack-on-our-mongodb-databases-y22q3zs8 . Accessed 12 Oct 2023

Techtarget. https://www.techtarget.com/searchsecurity/news/252486971/Meow-attacks-continue-thousands-of-databases-deleted . Accessed 9 Oct 2023

Osborn, S.L., Servos, D., Shermin, M.: Issues in access control and privacy for big data. In: Meyers, R.A. (eds.) Encyclopedia of Complexity and Systems Science, pp. 1–9. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-642-27737-5_752-1

MongoDB docs. https://www.mongodb.com/docs/drivers/go/current/fundamentals/auth/ . Accessed 22 June 2023

MongoDB manual. https://www.mongodb.com/docs/manual/ . Accessed 22 June 2023

Ajayi, O.O., Adebiyi, T.O.: Application of data masking in achieving information privacy. IOSR J. Eng. (IOSRJEN) 4 (2), 13–21 (2014)

Cuzzocrea, A., Shahriar, H.: Data masking techniques for NoSQL database security: a systematic review. In: 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA (2017)

Git hub Data masking. https://github.com/pkdone/mongo-data-masking . Accessed 06 July 2023

Mozilla docs. https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS . Accessed 18 July 2023

Lavrenovs, A., Melón, F.J.R.: HTTP security headers analysis of top one million websites. In: 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia (2018)

MongoDB manual. https://www.mongodb.com/docs/manual/core/security-transport-encryption/ . Accessed 04 July 2023

MongoDB manual, CSFLE. https://www.mongodb.com/docs/manual/core/csfle/ . Accessed 16 July 2023

CouchDB homepage. https://couchdb.apache.org/ . Accessed 19 June 2023

Download references

Author information

Authors and affiliations.

Centre for Development of Advanced Computing (C-DAC), 68-Electronic City, Bengaluru, 560100, India

Surabhi Dwivedi, R. Balaji, Praveen Ampatt & S. D. Sudarsan

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Surabhi Dwivedi .

Editor information

Editors and affiliations.

Griffith University, Gold Coast, QLD, Australia

Vallipuram Muthukkumarasamy

Centre for Development of Advanced Computing (C-DAC), Bangalore, India

Sithu D. Sudarsan

Indian Institute of Technology Bombay, Mumbai, India

Rudrapatna K. Shyamasundar

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Dwivedi, S., Balaji, R., Ampatt, P., Sudarsan, S.D. (2023). A Survey on Security Threats and Mitigation Strategies for NoSQL Databases. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_4

Download citation

DOI : https://doi.org/10.1007/978-3-031-49099-6_4

Published : 09 December 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-49098-9

Online ISBN : 978-3-031-49099-6

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

A study of normalization and embedding in MongoDB

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Research Areas

Recent activities, research papers, cryptography research group, encrypted search algorithms, leakage cryptanalysis.

All known efficient ESAs achieve a tradeoff between performance and information leakage. The design of leakage attacks is therefore an important way to ascertain whether an ESA is exploitable in practice or not.

Leakage analysis and suppression

Leakage analysis frameworks allow us to formally study and understand the leakage of ESAs, and leakage suppression techniques allow us to remove leakage patterns.

Archita Agarwal

Archita’s research bridges the gap between encrypted search and distributed computing.

Zachary Espiritu

Zachary’ s research focuses on both cryptographic design and cryptanalysis of encrypted search algorithms.

Marilyn George

Marilyn’s research focuses on understanding the efficiency and security trade-offs of the real-world use of cryptography.

Seny Kamara

Seny has worked extensively on the design and cryptanalysis of encrypted search algorithms.

Tarik Moataz

Tarik’s research interests are in the area of cryptography and computer security with a focus on encrypted search.

Archita received her Ph.D. in computer science from Brown University in 2021. Before joining MongoDB, she was an assistant professor of Computer Science at Denison University, Ohio. Her work focuses on bridging the gaps between encrypted search and distributed computing. Specifically, she designs and analyzes end-to-end encrypted, distributed, and concurrent systems. She was the first to design encrypted distributed dictionaries and key-value stores, two primitives that underlie encrypted distributed databases. Her work also highlights the fundamental connections between cryptography and distributed/concurrent systems, such as how security, consistency, and efficiency interact with each other. Archita is also interested in augmenting her encrypted database designs with additional privacy-preserving features, such as differentially private analytical queries and GDPR-compliant access requests.

Archita Agarwal's Scholar profile

Zachary received his concurrent Sc.M and Sc.B. in computer science from Brown University in 2021. Prior to MongoDB, Zachary worked with the Cloud Security Group and Encrypted Systems Lab at Brown University at the intersection of cryptography, data structures and algorithms, and computer systems. Zachary's research has focused on both cryptographic design and cryptanalysis of encrypted search algorithms. Zachary created a framework for designing encrypted aggregate queries, deployed Arca, a programming library for rapidly prototyping cryptographic schemes, and designed and implemented a system for public policy analytics over encrypted data. He has also designed and implemented attacks against multi-dimensional encrypted databases.

Zachary Espiritu's Scholar profile

Marilyn received her Ph.D. in computer science from Brown University’s Encrypted Systems Lab in 2022. Her research focuses on understanding the efficiency and security trade-offs associated with the real-world use of cryptography, with an emphasis on encrypted search. Her work addresses the theoretical limits of encrypted search algorithms and introduces new techniques for their design. Marilyn’s work showed, for the first time, how to design dynamic leakage suppression techniques, resulting in efficient zero and almost-zero leakage encrypted search algorithms. Marilyn is also interested in the legal and social aspects of secure systems. In the past, she has designed a GDPR compliance tool for legacy databases as well as an encrypted database for public policy studies. She has also introduced a game theoretic framework to augment secure protocols with contracts for rational participants.

Marilyn George's Scholar profile

Seny manages the Cryptography Research Group. He has worked extensively on the design and cryptanalysis of encrypted search algorithms, which are efficient algorithms for searching on end-to-end encrypted data. His work first showed how to search on encrypted data in optimal time, how to formalize the security of searchable symmetric encryption (SSE), how to optimally search on dynamic encrypted data, and how to cryptanalyze property preserving encryption. He maintains interests in various aspects of theory and systems, including applied and theoretical cryptography, data structures and algorithms, and technology policy.

Seny is also an Associate Professor of Computer Science at Brown University where he leads the Encrypted Systems Lab. Before that, he was a research scientist at Microsoft Research. In 2017, he co-founded Aroki Systems and served as its Chief Scientist until its acquisition by MongoDB. He has been appointed to two National Academies of Sciences committees on encryption and surveillance and has provided testimony to the U.S. House of Representatives Financial Services Committee and to the Committee on Space, Science, and Technology. He has given keynotes at the IACR’s Annual International Cryptology Conference (CRYPTO), the ACM’s Symposium on Principles of Distributed Computing (PODC), and the ACM’s Conference on Advances in Financial Technologies (AFT). In 2022, Seny and his collaborators won the ACM Conference on Computer and Communications Security’s (CCS) Test-of-Time Award for their work on dynamic searchable symmetric encryption.

Seny Kamara's Scholar profile

Tarik is a researcher in the Cryptography Research Group at MongoDB. Prior to joining MongoDB, he was a co-founder and Chief Technology Officer at Aroki Systems (acquired by MongoDB) and before that, he was a visiting scientist and a postdoctoral researcher at Brown University in the Encrypted Systems Lab (ESL). His research is in the area of cryptography and computer security with a focus on encrypted search. He works primarily on the design and cryptanalysis of encrypted search algorithms that offer different efficiency, security, and expressiveness trade-offs. His work introduced the first worst-case sublinear Boolean searchable symmetric encryption scheme, the first structured encryption-based encrypted relational database, the notion of leakage suppression along with the first volume-hiding structured encryption schemes, and the first volumetric leakage attacks against exact keyword search.

Tarik served on the organizing committee of the first workshop on the Theory and Practice of Encrypted Search (TPES) as well as ICERM’s workshop on Encrypted Search. He has also served on the program committees of IACR’s Annual International Cryptology Conference (CRYPTO), IACR’s Annual International Conference on the Theory and Applications of Cryptology (Eurocrypt), and the ACM’s Conference on Computer and Communications Security (CCS).

Tarik Moataz's Scholar profile

International Conference on Very Large DataBases (VLDB)

Zach's paper on multi-dimensional encrypted range schemes will appear at VLDB 2023.

Privacy-Enhancing Technologies Symposium (PETS)

Zach's paper on attacks against multi-dimensional encrypted range schemes will appear at PETS 2023.

ACM Conference on Advances in Financial Technologies (AFT)

Seny delivered a keynote at the conference.

Workshop on the Theory and Practice of Encrypted Search (TPES)

Tarik gave a talk on practical encrypted databases.

We organized the first edition of the Workshop on the Theory and Practice of Encrypted Search.

ACM Symposium on Principles of Distributed Computing (PODC)

Seny delivered a keynote at the Symposium.

Design and Analysis of a Stateless Database Encryption Scheme

In this work, we design the first encrypted document database scheme. A key focus of our work is on designing a scheme that is practical not only in terms of asymptotic and concrete efficiency but also with respect to real-world constraints that emerge when trying to build and deploy real database systems at scale for commercial use. These constraints present new technical challenges that have not been considered in the research literature before.

An Overview of MongoDB’s Queryable Encryption

In this work, we give an overview of Queryable Encryption, its design goals, threat model, security properties and performance.

Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search

This work proposes a theoretical framework with which leakage can be analyzed and better understood.

MAPLE: MArkov Process Leakage attacks on Encrypted Search

This work studies query equality leakage on dependent queries and presents two new attacks in this setting which can work either as known-distribution or known-sample attacks.

Injection-Secure Structured and Searchable Symmetric Encryption

We propose the first injection-secure multi-map encryption scheme and use it as a building block to design the first injection-secure searchable symmetric encryption (SSE) scheme.

IMAGES

  1. Introduction To MongoDB and Concepts.

    research paper on mongodb

  2. 什么是MongoDB?NoSQL数据库以简单的方式解释|OPC Router|OPC通讯平台

    research paper on mongodb

  3. (PDF) MongoDB NoSQL Injection Analysis and Detection

    research paper on mongodb

  4. Using MongoDB to build a fast and scalable content repository

    research paper on mongodb

  5. Architecture of MongoDB

    research paper on mongodb

  6. MongoDB

    research paper on mongodb

VIDEO

  1. Sync your iOS SwiftUI App with MongoDB Atlas using Atlas Device Sync

  2. Grouping in mongodb

  3. MongoDB Q4 FY2024 Earnings

  4. Diagnostic Thinking Course

  5. Accelerating MongoDB using Remote GPUs (2016)

  6. Rock Paper Scissor Game

COMMENTS

  1. (PDF) MongoDB

    This paper describes the advantages of MongoDB when compared to other NoSQL databases and its applications in sentiment analysis. Discover the world's research 25+ million members

  2. Performance analysis of NoSQL and relational databases with MongoDB and

    The paper is composed as follows: section 2, depicts few studies related to this area and in section 3, a comparison of queries used in MySQL and MongoDB is covered. Section 4 gives an overview of the datasets which are being used for performing queries in both MongoDB and MySQL and the methodology used are discussed.

  3. BDCC

    In this paper, the behavior of two of the major document-based NoSQL databases, MongoDB and document-based MySQL, was analyzed in terms of the complexity and performance of CRUD operations, especially in query operations. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature ...

  4. PDF A Review on Various Aspects of MongoDb Databases

    MongoDB is discussed and some key issues are framed. In future research can be done on any of these issues. So this paper opens some areas for research in MongoDB databases. Keywords — No-SQL, MongoDB, Database, RDBMS, Non-relational databases I. INTRODUCTION • MongoDB is an open-source document database that

  5. (PDF) A Comparative Study of MongoDB and Document-Based ...

    In this paper, the behavior of two of the major document-based NoSQL databases, MongoDB and document-based MySQL, was analyzed in terms of the complexity and performance of CRUD operations ...

  6. A Review on Various Aspects of MongoDb Databases

    A review of various aspects of MongoDB is discussed and some key issues are framed, which opens some areas for research in MongoDB databases. —MongoDB is most popular among the NoSQL databases. For building data warehouses, it is a great tool especially because of its ability to fully utilize so called "sharding-nothing cluster architecture." It is an open source database, which makes it ...

  7. MongoDB, Couchbase, and CouchDB: A Comparison

    In this paper we will touch bases with three of the most popular NoSQL databases: MongoDB, Couchbase and CouchDB. We will compare them using the OSSpal methodology and the YCSB framework in a quantitative and qualitative matter. ... Following the benchmarks, our evaluation and research also classify MongoDB as the best system, from the three ...

  8. PDF Tunable Consistency in MongoDB

    All data in MongoDB is stored in a binary form of JSON called BSON [3]. A MongoDB database consists of a set of collections, where a collection is a set of unique documents. MongoDB uti-lizes the WiredTiger storage engine, which is a transac-tional key value data store that manages the interface to a local, durable storage medium. Throughout ...

  9. MongoDB

    MongoDB has gained a significant importance and as of now it is one of the prominently utilized databases [9].The various advantages of MongoDB over RDBMS are as follows: (a) Schema less: It is a document database in which one collection holds different documents.Number of fields, content, and size of the document can differ from one document to another.

  10. Fault-Tolerant Replication with Pull-Based Consensus in MongoDB

    Abstract: In this paper, we present the design and implementation of strongly consistent replication in MongoDB. MongoDB provides linearizability and tolerates any minority of failures through a novel consensus protocol that derives from Raft. A major difference between our protocol and vanilla Raft is that MongoDB deploys a unique pull-based ...

  11. A comparative study: MongoDB vs. MySQL

    In this paper we will try to present a comparative study of non-relational databases and relational databases. We mainly focus our presentation on one implementation of the NoSQL database technology, namely MongoDB, and make a comparison with another implementation of relational databases, namely MySQL, and thus justifying why MongoDB is more efficient than MySQL. We will also present the ...

  12. PDF An Analysis and Overview of MongoDB Security

    In this paper, we focus our attention on MongoDB, a document-based NoSQL database. MongoDB has a number of security features ... MongoDB Challenge and Response (MongoDB-CR). SCRAM-SHA-1 has a number of advantages over MongoDB-CR such as a tunable work factor, per-user random salts, a stronger hash function (SHA-1 rather than ...

  13. A Review on Various Aspects of MongoDb Databases

    MongoDB is most popular among the NoSQL databases. For building data warehouses, it is a great tool especially because of its ability to fully utilize so called "sharding-nothing cluster architecture." It is an open source database, which makes it ideal for building high performance data warehouses. In this paper, a review of various aspects of MongoDB is discussed and some key issues are ...

  14. A Survey on Security Threats and Mitigation Strategies for NoSQL

    This study is based on extensive analysis of 18 quality research papers, MongoDB manuals and experiments. Section 2 explains the similar study done by the other authors and the motivation to write this paper; Sect. 3 discusses various NoSQL database-based security breach incidences that happened during the last five years.

  15. A study of normalization and embedding in MongoDB

    With the advancement in the database technology NoSQL databases are becoming more and more popular now a days. The cloud-based NoSQL database MongoDB is one of them. As one can know the data modeling strategies for relational and non-relational databases differ drastically. Modeling of data in MongoDB database depends on the data and characteristics of MongoDB. Due to variation in data models ...

  16. PDF Research Paper MongoDB with Privacy Access Control

    policy. MongoDB is documents based databases. Different from other relational databases, arbitrary type data can be stored in a document in MongoDB. However, existing MongoDB products provide poor privacy and security protection. In this, we proposed a privacy access policy, by taking some credential from user and encrypting it

  17. Resources

    This white paper, co-authored by MongoDB and Capgemini Invent, addresses the challenges automotive manufacturers face in updating the intricate software systems embedded in modern vehicles. ... Kieran Hines is a principal analyst in Celent's Banking practice and is based in London. His research focuses on the impact of technology-driven ...

  18. The MongoDB Cryptography Research Group

    Prior to joining MongoDB, he was a co-founder and Chief Technology Officer at Aroki Systems (acquired by MongoDB) and before that, he was a visiting scientist and a postdoctoral researcher at Brown University in the Encrypted Systems Lab (ESL). His research is in the area of cryptography and computer security with a focus on encrypted search.

  19. The MongoDB Cryptography Research Group

    Prior to joining MongoDB, he was a co-founder and Chief Technology Officer at Aroki Systems (acquired by MongoDB) and before that, he was a visiting scientist and a postdoctoral researcher at Brown University in the Encrypted Systems Lab (ESL). His research is in the area of cryptography and computer security with a focus on encrypted search.