NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. As a result, numerous techniques were introduced to protect this data when it's in...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | ["eprint_typename_conference\_item" not defined] |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126766686&doi=10.1109%2fICCIT52419.2022.9711654&partnerID=40&md5=34999ba2d11fd6ec85ec9d7b8de19349 http://eprints.utp.edu.my/33291/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Petronas |
id |
my.utp.eprints.33291 |
---|---|
record_format |
eprints |
spelling |
my.utp.eprints.332912022-07-26T06:35:00Z NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases Imam, A.A. Basri, S. Gonzalez-Aparicio, M.T. Balogun, A.O. Kumar, G. Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. As a result, numerous techniques were introduced to protect this data when it's in use and in transit while leaving the at rest part (databases) in the hands of novice programmers without any enforcements. The NoSQL-Injection problem emerged due to this flexibility where malicious queries that mimic the legal queries are appended together for possible execution. In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. The database server decrypts the legal queries before effecting any changes. An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. Based on this, the proposed method has the aptitude to prevent the occurrence of NoSQLInjection attacks on NoSQL applications. © 2022 IEEE. Institute of Electrical and Electronics Engineers Inc. 2022 ["eprint_typename_conference\_item" not defined] NonPeerReviewed https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126766686&doi=10.1109%2fICCIT52419.2022.9711654&partnerID=40&md5=34999ba2d11fd6ec85ec9d7b8de19349 Imam, A.A. and Basri, S. and Gonzalez-Aparicio, M.T. and Balogun, A.O. and Kumar, G. (2022) NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases. [["eprint_typename_conference\_item" not defined]] http://eprints.utp.edu.my/33291/ |
institution |
Universiti Teknologi Petronas |
building |
UTP Resource Centre |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Petronas |
content_source |
UTP Institutional Repository |
url_provider |
http://eprints.utp.edu.my/ |
description |
Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. As a result, numerous techniques were introduced to protect this data when it's in use and in transit while leaving the at rest part (databases) in the hands of novice programmers without any enforcements. The NoSQL-Injection problem emerged due to this flexibility where malicious queries that mimic the legal queries are appended together for possible execution. In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. The database server decrypts the legal queries before effecting any changes. An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. Based on this, the proposed method has the aptitude to prevent the occurrence of NoSQLInjection attacks on NoSQL applications. © 2022 IEEE. |
format |
["eprint_typename_conference\_item" not defined] |
author |
Imam, A.A. Basri, S. Gonzalez-Aparicio, M.T. Balogun, A.O. Kumar, G. |
spellingShingle |
Imam, A.A. Basri, S. Gonzalez-Aparicio, M.T. Balogun, A.O. Kumar, G. NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
author_facet |
Imam, A.A. Basri, S. Gonzalez-Aparicio, M.T. Balogun, A.O. Kumar, G. |
author_sort |
Imam, A.A. |
title |
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
title_short |
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
title_full |
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
title_fullStr |
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
title_full_unstemmed |
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases |
title_sort |
noinjection: preventing unsafe queries on nosql-document-model databases |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2022 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126766686&doi=10.1109%2fICCIT52419.2022.9711654&partnerID=40&md5=34999ba2d11fd6ec85ec9d7b8de19349 http://eprints.utp.edu.my/33291/ |
_version_ |
1739833201909563392 |