Academic literature on the topic 'Database-as-a-Service (DBaaS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Database-as-a-Service (DBaaS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Database-as-a-Service (DBaaS)"

1

KashifMunir, and Lawan A. Mohammed. "AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2018): 01–12. https://doi.org/10.5281/zenodo.1489022.

Full text
Abstract:
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
APA, Harvard, Vancouver, ISO, and other styles
2

KashifMunir, and Lawan A. Mohammed. "AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2023): 11. https://doi.org/10.5281/zenodo.7551252.

Full text
Abstract:
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
APA, Harvard, Vancouver, ISO, and other styles
3

Suruchi, Shah. "A REVIEW ON DATABASE SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 842–52. https://doi.org/10.5281/zenodo.13922361.

Full text
Abstract:
Cloud computing is a system that offers many resources that may be customized, allowing for decentralized data management and storage. Cloud technologies have revolutionized concepts of data storage and access in organizations thus offering organizations flexible and efficient solutions. Cloud services such as DBaaS allows user to utilize sophisticated capabilities of databases without the responsibility of conventional databases. But with cloud computing, there is a great concern of security since issues such as data privacy, access control and compliance to regulatory requirements are paramount. This paper also explores the cloud computing architectural model, the differences between DBaaS and conventional cloud offerings, and the security risks of DBaaS. Much as it discusses the key areas of database security like data confidentiality, data integrity, and data availability, it provides information on security threats like the SQL injection or data breaches. Besides, it provides guidance on vulnerability management and incident handling in a context of cloud computing. To this end, this paper focuses on the conceptual clarification of the cloud database security best practices and the shared responsibility model between the providers and the users.
APA, Harvard, Vancouver, ISO, and other styles
4

Munir, Kashif, and Lawan A. Mohammed. "Authentication Scheme for Database as a Service (DBAAS) Solutions." International Journal on Cloud Computing: Services and Architecture 8, no. 1/2/3/4/5 (2018): 11–22. http://dx.doi.org/10.5121/ijccsa.2018.8502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Estrela, Vania V. "Biomedical Cyber-Physical Systems in the Light of Database as a Service (DBaaS) Paradigm." Medical Technologies Journal 4, no. 3 (2020): 577. http://dx.doi.org/10.26415/2572-004x-vol4iss3p577-577.

Full text
Abstract:
Background: A database (DB) to store indexed information about drug delivery, test, and their temporal behavior is paramount in new Biomedical Cyber-Physical Systems (BCPSs). The term Database as a Service (DBaaS) means that a corporation delivers the hardware, software, and other infrastructure required by companies to operate their databases according to their demands instead of keeping an internal data warehouse.
 Methods: BCPSs attributes are presented and discussed. One needs to retrieve detailed knowledge reliably to make adequate healthcare treatment decisions. Furthermore, these DBs store, organize, manipulate, and retrieve the necessary data from an ocean of Big Data (BD) associated processes. There are Search Query Language (SQL), and NoSQL DBs. 
 Results: This work investigates how to retrieve biomedical-related knowledge reliably to make adequate healthcare treatment decisions. Furthermore, Biomedical DBaaSs store, organize, manipulate, and retrieve the necessary data from an ocean of Big Data (BD) associated processes.
 Conclusion: A NoSQL DB allows more flexibility with changes while the BCPSs are running, which allows for queries and data handling according to the context and situation. A DBaaS must be adaptive and permit the DB management within an extensive variety of distinctive sources, modalities, dimensionalities, and data handling according to conventional ways.
APA, Harvard, Vancouver, ISO, and other styles
6

König, Arnd Christian, Yi Shan, Karan Newatia, Luke Marshall, and Vivek Narasayya. "Solver-In-The-Loop Cluster Resource Management for Database-as-a-Service." Proceedings of the VLDB Endowment 16, no. 13 (2023): 4254–67. http://dx.doi.org/10.14778/3625054.3625062.

Full text
Abstract:
In Database-as-a-Service (DBaaS) clusters, resource management is a complex optimization problem that assigns tenants to nodes, subject to various constraints and objectives. Tenants share resources within a node, however, their resource demands can change over time and exhibit high variance. As tenants may accumulate large state, moving them to a different node becomes disruptive, making intelligent placement decisions crucial to avoid service disruption. Placement decisions need to account for dynamic changes in tenant resource demands, different causes of service disruption, and various placement constraints, giving rise to a complex search space. In this paper, we show how to bring combinatorial solvers to bear on this problem, formulating the objective of minimizing service disruption as an optimization problem amenable to fast solutions. We implemented our approach in the Service Fabric cluster manager codebase. Experiments show significant reductions in constraint violations and tenant moves, compared to the previous state-of-the-art, including the unmodified Service Fabric cluster manager, as well as recent research on DBaaS tenant placement.
APA, Harvard, Vancouver, ISO, and other styles
7

Vieira, Marcelo Aires, Elivaldo Lozer Fracalossi Ribeiro, Daniela Barreiro Claro, and Babacar Mane. "Integration Model between Heterogeneous Data Services in a Cloud." JUCS - Journal of Universal Computer Science 27, no. 4 (2021): 387–412. http://dx.doi.org/10.3897/jucs.67046.

Full text
Abstract:
With the growth of cloud services, many companies have begun to persist and make their data available through services such as Data as a Service (DaaS) and Database as a Service (DBaaS). The DaaS model provides on-demand data through an Application Programming Inter- face (API), while DBaaS model provides on-demand database management systems. Different data sources require efforts to integrate data from different models. These model types include unstructured, semi-structured, and structured data. Heterogeneity from DaaS and DBaaS makes it challenging to integrate data from different services. In response to this problem, we developed the Data Join (DJ) method to integrate heterogeneous DaaS and DBaaS sources. DJ was described through canonical models and incorporated into a middleware as a proof-of-concept. A test case and three experiments were performed to validate our DJ method: the first experiment tackles data from DaaS and DBaaS in isolation; the second experiment associates data from different DaaS and DBaaS through one join clause; and the third experiment integrates data from three sources (one DaaS and two DBaaS) based on different data type (relational, NoSQL, and NewSQL) through two join clauses. Our experiments evaluated the viability, functionality, integration, and performance of the DJ method. Results demonstrate that DJ method outperforms most of the related work on selecting and integrating data in a cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Vieira, Marcelo Aires, Elivaldo Lozer Fracalossi Ribeiro, Daniela Barreiro Claro, and Babacar Mane. "Integration Model between Heterogeneous Data Services in a Cloud." JUCS - Journal of Universal Computer Science 27, no. (4) (2021): 387–412. https://doi.org/10.3897/jucs.67046.

Full text
Abstract:
With the growth of cloud services, many companies have begun to persist and make their data available through services such as Data as a Service (DaaS) and Database as a Service (DBaaS). The DaaS model provides on-demand data through an Application Programming Inter- face (API), while DBaaS model provides on-demand database management systems. Different data sources require efforts to integrate data from different models. These model types include unstructured, semi-structured, and structured data. Heterogeneity from DaaS and DBaaS makes it challenging to integrate data from different services. In response to this problem, we developed the Data Join (DJ) method to integrate heterogeneous DaaS and DBaaS sources. DJ was described through canonical models and incorporated into a middleware as a proof-of-concept. A test case and three experiments were performed to validate our DJ method: the first experiment tackles data from DaaS and DBaaS in isolation; the second experiment associates data from different DaaS and DBaaS through one join clause; and the third experiment integrates data from three sources (one DaaS and two DBaaS) based on different data type (relational, NoSQL, and NewSQL) through two join clauses. Our experiments evaluated the viability, functionality, integration, and performance of the DJ method. Results demonstrate that DJ method outperforms most of the related work on selecting and integrating data in a cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Da Silveira Segalin, Vinicius, Carina Friedrich Dorneles, and Mario Antonio Ribeiro Dantas. "DBaaS Multitenancy, Auto-tuning and SLA Maintenance in Cloud Environments: a Brief Survey." iSys - Brazilian Journal of Information Systems 11, no. 2 (2018): 30–42. http://dx.doi.org/10.5753/isys.2018.362.

Full text
Abstract:
Cloud computing is a paradigm that presents many advantages to both costumers and service providers, such as low upfront investment, pay-per-use and easiness of use, delivering/enabling scalable services using Internet technologies. Among many types of services we have today, Database as a Service (DBaaS) is the one where a database is provided in the cloud in all its aspects. Examples of aspects related to DBaaS utilization are data storage, resources management and SLA maintenance. In this context, an important feature, related to it, is resource management and performance, which can be done in many different ways for several reasons, such as saving money, time, and meeting the requirements agreed between client and provider, that are defined in the Service Level Agreement (SLA). A SLA usually tries to protect the costumer from not receiving the contracted service and to ensure that the provider reaches the profit intended. In this paper it is presented a classification based on three main parameters that aim to manage resources for enhancing the performance on DBaaS and guarantee that the SLA is respected for both user and provider sides benefit. The proposal is based upon a survey of existing research work efforts.
APA, Harvard, Vancouver, ISO, and other styles
10

Ferrari, Paolo, Emiliano Sisinni, Alessandro Depari, et al. "On the Performance of Cloud Services and Databases for Industrial IoT Scalable Applications." Electronics 9, no. 9 (2020): 1435. http://dx.doi.org/10.3390/electronics9091435.

Full text
Abstract:
In the Industry 4.0 the communication infrastructure is derived from the Internet of Things (IoT), and it is called Industrial IoT or IIoT. Smart objects deployed on the field collect a large amount of data which is stored and processed in the Cloud to create innovative services. However, differently from most of the consumer applications, the industrial scenario is generally constrained by time-related requirements and its needs for real-time behavior (i.e., bounded and possibly short delays). Unfortunately, timeliness is generally ignored by traditional service provider, and the Cloud is treated as a black box. For instance, Cloud databases (generally seen as “Database as a service”—DBaaS) have unknown or hard-to-compare impact on applications. The novelty of this work is to provide an experimental measurement methodology based on an abstract view of IIoT applications, in order to define some easy-to-evaluate metrics focused on DBaaS latency (no matter the actual implementation details are). In particular, the focus is on the impact of DBaaS on the overall communication delays in a typical IIoT scalable context (i.e., from the field to the Cloud and the way back). In order to show the effectiveness of the proposed approach, a real use case is discussed (it is a predictive maintenance application with a Siemens S7 industrial controller transmitting system health status information to a Cloudant DB inside the IBM Bluemix platform). Experiments carried on in this use case provide useful insights about the DBaaS performance: evaluation of delays, effects of involved number of devices (scalability and complexity), constraints of the architecture, and clear information for comparing with other implementations and for optimizing configuration. In other words, the proposed evaluation strategy helps in finding out the peculiarities of Cloud Database service implementations.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Database-as-a-Service (DBaaS)"

1

LIMA, Marcelo Ferreira de. "Soluções para DBaaS com dados encriptados: mapeando arquiteturas." Universidade Federal de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/16369.

Full text
Abstract:
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-04-07T12:42:11Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) MarceloLima-MestradoCIn-2015.pdf: 2673877 bytes, checksum: 7fed7c87bd80e3d1226642662bc3f739 (MD5)<br>Made available in DSpace on 2016-04-07T12:42:11Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) MarceloLima-MestradoCIn-2015.pdf: 2673877 bytes, checksum: 7fed7c87bd80e3d1226642662bc3f739 (MD5) Previous issue date: 2015-08-11<br>Com a popularização crescente do modelo de computação em nuvem oferecendo serviços em cada uma das camadas de Software-as-a-Service (SaaS), Platform-asa- Service (PaaS) e Infrastructure-as-a-Service (IaaS), começaram a surgir provedores que disponibilizam o serviço específico de Database-as-a-Service (DBaaS), cuja ideia básica é disponibilizar bancos de dados na nuvem. Entretanto, a inviabilidade de execução de operações, consultas e alterações, sobre dados encriptados em serviços DBaaS é um fator que afasta os clientes da possibilidade de levar seus dados para a nuvem. Proprietários de dados e provedores de nuvem anseiam por sistemas criptográficos completamente homomórficos como uma solução. Mas não existe qualquer perspectiva a curto ou médio prazo de que estes sistemas possam ser computacionalmente viáveis. Atualmente pesquisas buscam construir soluções que utilizam sistemas criptográficos viáveis que possibilitem a execução de operações sobre dados encriptados no provedor de DBaaS. Um estudo, precursor e destacado, baseia sua solução em uma arquitetura Proxy, modelo que não é unanimidade para este tipo de solução. Esta pesquisa, baseada em mapeamento sistemático, busca iniciar uma discussão mais profunda sobre modelos de arquitetura para DBaaS e apresenta como principais contribuições: (i) um catálogo de estudos com propostas de soluções, organizado por modelo de arquitetura, (ii) a determinação de uma tendência na escolha de arquiteturas, considerando o estado da arte, (iii) uma investigação de um direcionamento concreto, apontando vantagens e desvantagens, com base nos estudos catalogados, sobre a adoção da arquitetura Proxy em soluções encriptadas de computação em nuvem para DBaaS e (iv) apontar uma lista consistente de questões em aberto acerca das soluções para banco de dados encriptados, com base em dados extraídos dos estudos catalogados.<br>With the growing popularity of cloud computing model, offering services in each of the layers of Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS), began to emerge providers that provide the specific service Database-as-a-Service (DBaaS), whose basic idea is to provide databases in the cloud. However, the impossibility of executing operations, queries and changes on encrypted data in DBaaS services is a factor that keeps customers the possibility to bring your data to the cloud. Owners of data and cloud providers crave fully homomorphic cryptosystems as a solution. But there is no prospect in the short or medium term that these systems can be computationally feasible. Currently research seek to build solutions using viable cryptographic systems that allow the execution of operations on encrypted data on DBaaS provider. One study, precursor and highlighted, bases its solution on a Proxy architecture model, that is no unanimity for this type of solution. This research, based on systematic mapping, search start a deeper discussion of architectural models for DBaaS and presents as main contributions: (i) a catalog of studies with proposed solutions, organized by architectural model, (ii) the determination of a tendency in choosing architectures, considering the state of the art and (iii) an investigation of a concrete direction, pointing advantages and disadvantages, based on cataloged studies, on the adoption of Proxy architecture over cloud computing encrypted solutions to DBaaS and (iv) point to a consistent list of open questions about the solutions for encrypted database, based on data extracted from cataloged studies.
APA, Harvard, Vancouver, ISO, and other styles
2

Parisi, Luca. "Progettazione e realizzazione di una piattaforma DBAAS per Jackrabbit/JCR." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7787/.

Full text
Abstract:
Lo scopo di questa tesi è presentare un progetto per la realizzazione di una piattaforma DBAAS per il database Jackrabbit. Per piattaforma DBAAS si intende un sistema in grado di offrire ai clienti un database su richiesta (DataBase As A Service), e di amministrare automaticamente i database per conto dei clienti. Il progetto viene realizzato in un primo momento tramite un prototipo della piattaforma, in cui vengono effettuati test intensivi per controllare ogni funzionalità della piattaforma. Il prototipo viene sviluppato in un singolo host, nel quale è possibile simulare tutte le operazioni base della piattaforma DBAAS, come se fosse il sistema finale. In un secondo momento, il progetto sarà realizzato nella sua versione finale, con tutto l'hardware necessario a garantire un servizio ottimale. Questa tesi contiene la base per realizzare il sistema finale, che può essere realizzato in modi diversi a seconda delle scelte che farà il progettista. Ad esempio, è possibile comprare tutto l'hardware necessario e implementare la piattaforma DBAAS in-house, oppure si può scegliere di affidare tutta la gestione hardware ad un servizio di hosting.
APA, Harvard, Vancouver, ISO, and other styles
3

Correia, Filipe Miguel Silva. "Privacy-Enhanced Query Processing in a Cloud-Based Encrypted DBaaS (Database as a Service)." Master's thesis, 2018. http://hdl.handle.net/10362/130557.

Full text
Abstract:
In this dissertation, we researched techniques to support trustable and privacy enhanced solutions for on-line applications accessing to “always encrypted” data in remote DBaaS (data-base-as-a-service) or Cloud SQL-enabled backend solutions. Although solutions for SQL-querying of encrypted databases have been proposed in recent research, they fail in providing: (i) flexible multimodal query facilities includ ing online image searching and retrieval as extended queries to conventional SQL-based searches, (ii) searchable cryptographic constructions for image-indexing, searching and retrieving operations, (iii) reusable client-appliances for transparent integration of multi modal applications, and (iv) lack of performance and effectiveness validations for Cloud based DBaaS integrated deployments. At the same time, the study of partial homomorphic encryption and multimodal searchable encryption constructions is yet an ongoing research field. In this research direction, the need for a study and practical evaluations of such cryptographic is essential, to evaluate those cryptographic methods and techniques towards the materialization of effective solutions for practical applications. The objective of the dissertation is to design, implement and perform experimental evaluation of a security middleware solution, implementing a client/client-proxy/server appliance software architecture, to support the execution of applications requiring on line multimodal queries on “always encrypted” data maintained in outsourced cloud DBaaS backends. In this objective we include the support for SQL-based text-queries enhanced with searchable encrypted image-retrieval capabilities. We implemented a prototype of the proposed solution and we conducted an experimental benchmarking evaluation, to observe the effectiveness, latency and performance conditions in support ing those queries. The dissertation addressed the envisaged security middleware solution, as an experimental and usable solution that can be extended for future experimental testbench evaluations using different real cloud DBaaS deployments, as offered by well known cloud-providers.<br>Nesta dissertação foram investigadas técnicas para suportar soluções com garantias de privacidade para aplicações que acedem on-line a dados que são mantidos sempre cifrados em nuvens que disponibilizam serviços de armazenamento de dados, nomeadamente soluções do tipo bases de dados interrogáveis por SQL. Embora soluções para suportar interrogações SQL em bases de dados cifradas tenham sido propostas anteriormente, estas falham em providenciar: (i) capacidade de efectuar pesquisas multimodais que possam incluir pesquisa combinada de texto e imagem com obtenção de imagens online, (ii) suporte de privacidade com base em construções criptograficas que permitam operações de indexacao, pesquisa e obtenção de imagens como dados cifrados pesquisáveis, (iii) suporte de integração para aplicações de gestão de dados em contexto multimodal, e (iv) ausência de validações experimentais com benchmarking dobre desempenho e eficiência em soluções DBaaS em que os dados sejam armazenados e manipulados na sua forma cifrada. A pesquisa de soluções de privacidade baseada em primitivas de cifras homomórficas parciais, tem sido vista como uma possível solução prática para interrogação de dados e bases de dados cifradas. No entanto, este é ainda um campo de investigação em desenvolvimento. Nesta direção de investigação, a necessidade de estudar e efectuar avaliações experimentais destas primitivas em bibliotecas de cifras homomórficas, reutilizáveis em diferentes contextos de aplicação e como solução efetiva para uso prático mais generalizado, é um aspeto essencial. O objectivo da dissertação e desenhar, implementar e efectuar avalições experimentais de uma proposta de solução middleware para suportar pesquisas multimodais em bases de dados mantidas cifradas em soluções de nuvens de armazenamento. Esta proposta visa a concepção e implementação de uma arquitectura de software client/client-proxy/server appliance para suportar execução eficiente de interrogações online sobre dados cifrados, suportando operações multimodais sobre dados mantidos protegidos em serviços de nuvens de armazenamento. Neste objectivo incluímos o suporte para interrogações estendidas de SQL, com capacidade para pesquisa e obtenção de dados cifrados que podem incluir texto e pesquisa de imagens por similaridade. Foi implementado um prototipo da solução proposta e foi efectuada uma avaliação experimental do mesmo, para observar as condições de eficiencia, latencia e desempenho do suporte dessas interrogações. Nesta avaliação incluímos a análise experimental da eficiência e impacto de diferentes construções criptográficas para pesquisas cifradas (searchable encryption) e cifras parcialmente homomórficas e que são usadas como componentes da solução proposta. A dissertaçao aborda a soluçao de seguranca projectada, como uma solução experimental que pode ser estendida e utilizavel para futuras aplcações e respetivas avaliações experimentais. Estas podem vir a adoptar soluções do tipo DBaaS, oferecidos como serviços na nuvem, por parte de diversos provedores ou fornecedores.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Database-as-a-Service (DBaaS)"

1

Mehak, Faria, Rahat Masood, Yumna Ghazi, Muhammad Awais Shibli, and Sharifullah Khan. "Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing." In Computer Communications and Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10530-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Munir, Kashif. "Security Model for Mobile Cloud Database as a Service (DBaaS)." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch038.

Full text
Abstract:
There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
3

Munir, Kashif. "Security Model for Mobile Cloud Database as a Service (DBaaS)." In Security Management in Mobile Cloud Computing. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0602-7.ch008.

Full text
Abstract:
There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
4

M. Laxmaiah, Dr, B. Kumara Swamy, and Avudurthi Saikiran. "CLOUD DATABASES." In Futuristic Trends in Computing Technologies and Data Sciences Volume 3 Book 9. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bgct9p5ch4.

Full text
Abstract:
In recent times, cloud computing has emerged as one of the most versatile technologies, and as a result, databases have also transitioned to the cloud. In this context, we will delve into the intricacies of Database as a Service (DBaaS) and explore its functioning. This article encompasses all the essential details regarding Database as a Service (DBaaS). The operation of the database as a service and its issues are explored using an appropriate approach. Database as a Service (DBaaS) delves into the architecture of cloud-based databases and its collaborative functionality with nodes. This paper will highlight key considerations when choosing the optimal Database as a Service (DBaaS) solution. It will assess the advantages and disadvantages of DBaaS to assist in making an informed decision about its adoption. Numerous e-commerce enterprises have already embraced DBaaS, experiencing its advantages firsthand.
APA, Harvard, Vancouver, ISO, and other styles
5

Gahi, Youssef, Imane El Alaoui, and Mouhcine Guennoun. "An End to End Cloud Computing Privacy Framework Using Blind Processing." In Research Anthology on Privatizing and Securing Data. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8954-0.ch019.

Full text
Abstract:
Database-as-a-service (DBaaS) is a trend allowing organizations to outsource their databases and computations to external parties. However, despite the many advantages provided by this service in terms of cost reduction and efficiency, DBaaS raises many security issues regarding data privacy and access control. The protection of privacy has been addressed by several research contributions proposing efficient solutions such as encrypted databases and blind queries over encrypted data, called blind processing. In this latter context, almost all proposed schemes consider an architecture of a single user (the data owner) that requests the database server for encrypted records while he is the only one capable of decrypting. From a practical perspective, a database system is set up to support not only a single user but multiple users initiating multiple queries. However, managing various accesses to an encrypted database introduces several challenges by itself, like key sharing, key revocation, and data re-encryption. In this article, we propose a simple and efficient blind processing protocol that allows multiple users to query the same encrypted data and decrypt the retrieved results without getting access to the secret key.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Database-as-a-Service (DBaaS)"

1

Lehner, Wolfgang, and Kai-Uwe Sattler. "Database as a service (DBaaS)." In 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icde.2010.5447723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Refai, M. N., ALmajali Haya, Hamed fawareh, and Hayel H. khafajeh. "Database as a Service (DBaaS) Challenges and Solutions." In 2021 22nd International Arab Conference on Information Technology (ACIT). IEEE, 2021. http://dx.doi.org/10.1109/acit53391.2021.9677127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Munir, Kashif. "Security model for cloud database as a service (DBaaS)." In 2015 International Conference on Cloud Technologies and Applications (CloudTech). IEEE, 2015. http://dx.doi.org/10.1109/cloudtech.2015.7336974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carvalho, Leonardo Rebouças de, Bruno Kamienski, and Aleteia Araujo. "How FaaS with DBaaS performs in different regions: an evaluation by the Orama Framework." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2023. http://dx.doi.org/10.5753/wscad.2023.235852.

Full text
Abstract:
Studies indicate that cloud services based on the serverless paradigm, such as Function-as-a-Service (FaaS) should become the main mechanisms of the next generation of cloud computing. Given this perspective, public cloud providers have made efforts to expand the coverage of their services in order to meet this need. However, the effort needed to maintain equivalence between different regions highlights the importance of studying the behavior of FaaS environments in different regions of providers. This work presents a study aided by the Orama framework in order to evaluate the performance of the main FaaS integrated with Database-as-a-Service (DBaaS) services in five regions spread across the globe. The results indicate that the Alibaba provider was able to guarantee good equivalence between its regions, in addition to a lower average execution time. AWS and GCP had similar results, although the error rate on AWS was the highest on average. Azure, on the other hand, had the worst performance, with the highest average execution time, in addition to significant failure rates.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography