SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2019.6.122133

Keywords:

data security; SQL; NoSQL; NewSQL; Data Lake; Data Warehouse; Data Centric Security.

Abstract

The article deals with the security of universal data management systems. The analysis and classification of modern data management systems by different criteria has been made. Based on the analysis of the literature and the experience of creating corporate systems, two approaches to the organization of universal data management systems have been identified: the use of multimodel systems and integrated data management platforms. Based on the analysis of threats and data protection tools for database management systems SQL, NoSQL, NewSQL, Data Warehouse, Data Lake and data clouds, the main approaches to data protection of each product category have been identified. The current trends in the development of data management technologies and data security have been identified. The development of NoSQL, NewSQL systems and the exchange of functionalities between them has led to the development of systems, which have functions of many classes. The problems of data protection for multimodel database management systems and for integrated data platforms have been identified and ways to overcome the identified problems have been suggested. For a universal data management platform, it is not enough to combine security features of different types of DBMS but new approaches are needed. The Data Centric Security approach is suitable for integrated environments; it is focused on protecting critical data at all stages of their processing - from collection and transmission to analysis and deployment in data warehouses. The organization of access to data through logical data marts using semantic technologies, ontological data models provides the transformation of a set of different types of data into a single array by "data virtualization". The article has substantiated the relevance and feasibility of the use of cognitive technologies and artificial intelligence in the field of information security, which opened new opportunities for the creation of automated, "smart" security tools for data management systems. Such systems have the ability to self-analyse and configure. The use of machine learning technology allows to identify weaknesses in the database security system. The combination of intelligent security and management solutions with database technologies will allow developers to respond quickly to new challenges in the protection of integrated data management systems of various types.

Downloads

Download data is not yet available.

References

Venkat Gudyvada, Dana Rao, Vydzhaj Ragxavan, «Renessans SUBD: problema vybora». [Onlain] Available at: https://www.osp.ru/os/2016/03/13050249 [Dec. 7, 2019]. (in Russian).

Zvit «Bolshie dannye (Big Data)» (vsesvitnij rynok). [Onlain] Available at: http://www.tadviser.ru/index.php/Статья:Большие_данные_(Big_Data) [Dec. 7, 2019]. (in Ukrainian).

Smyrnov S.N., Bezopasnost system baz dannyx. M.: Gelios ARV, 352p, 2007. (in Russian).

Poltavceva M.A., Xabarov A.R., «Bezopasnost baz dannyx: problemy i perspektyvy», Programmnye produkty i systemy, No 3. pp.36-41, 2016. (in Russian).

Spasityelyeva S.O., Buriachok V.L. «Kompleksnyj zaxyst geterogennyx korporatyvnyx sxovyshh danyx», Suchasnyj zaxyst informaciyi: naukovo-texnichnyj zhurnal. No 1(29), pp.58-65, 2017. (in Ukrainian).

Guy, Harrison, «Next Generation Databases: NoSQLand Big Data», CA, USA p.235, 2015. (in English).

Pramodkumar Dzh. Sadaladzh, Martyn Fauler, Xarakterystyky NoSQL: novaya metodologiya razrabotky nerelyacionnyx baz dannyx. K.: Dyalektyka-Vyliams, 192 p. 2017. (in Russian).

List of NoSQL Database Management Systems. [Onlain] Available at: http://nosql-database.org/ [Dec. 7, 2019]. (in English).

Dzhygnesh Patel «Operacyonnye SUBD NoSQL: segodnya i zavtra», M.: Otkrytye systemy. SUBD, No 03, 2016. [Onlain] Available at: https://www.osp.ru/os/2016/03/ [Dec. 11, 2019]. (in Russian).

Ben Sharma, Ashish Thusoo, Architecting Data Lakes Publisher: O'Reilly Media, Inc. Release Date: April 2016. (in English).

Big Data, «Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. Cloud Security Alliance», 2016. [Onlain] Available at: https://downloads.cloudsecurityalliance.org/assets/research/big-data/BigData_Security_and _Privacy_Handbook.pdf [Dec. 7, 2019]. (in English).

Akchurin S., Koncepciya zashchity «Data centric security» Published on October 23, 2018. [Onlain] Available at: https://www.linkedin.com/pulse/концепция-защиты-data-centric-security-akchurin-sergei [Dec. 7, 2019]. (in Russian).

Gorshkov S., «Edinaya tochka dostupa k dannym predpriyatiya», Otkrytye systemy. SUBD 2018 No 04. [Onlain] Available at: https://www.osp.ru/os/2018/04/13054596/ [Dec. 11, 2019]. (in Russian).

Nevdax E., «Kognitivnye texnologii i informacionnaia bezopasnost», 2016. [Onlain] Available at: https://ru-bezh.ru/evgeniy-nevdah/kognitivnyie-texnologii-i-informaczionnaya-bezopasnost [Dec. 7, 2019]. (in Russian).

Barannik V. V., Belikova T. V., Kapko M. O., Gurzhij I. A., «Kompleksnyj metod avtomatychnogo fonosemantychnogo analizu tekstovoyi informaciyi na osnovi ocinky vagomyx semantychnyx odynyts v umovax informacijnogo protyborstva». Kiberbezpeka: osvita, nauka, texnika: naukovo-texnichnyj zhurnal, Vol. 3, No 3, pp.53-62, 2019. [Onlain] Available at: http://nbuv.gov.ua/UJRN/cest_2019_3_6 [Dec. 11, 2019]. https://doi.org/10.28925/2663-4023.2019.3.5362 (in Ukrainian).

Comprehensive Defense in Depth: Oracle Database Security Capabilities, What's New in Database Security. [Onlain] Available at: https://www.oracle.com/ru/database/technologies/security.html [Dec. 11, 2019]. (in English).

Downloads


Abstract views: 523

Published

2019-12-26

How to Cite

Spasiteleva, S., Zhdanovа Y., & Chychkan, I. (2019). SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(6), 122–133. https://doi.org/10.28925/2663-4023.2019.6.122133

Most read articles by the same author(s)