Enhancing Data Management: An Integrated Solution for Database Backup, Recovery, Conversion, and Encryption Capabilities.

Authors

  • Siddharth Sutar Vishwakarma Institute of Information Technology, Pune
  • Kevin Jose Vishwakarma Institute of Information Technology, Pune
  • Vidya Gaikwad Vishwakarma Institute of Information Technology, Pune
  • Vaishali Mishra Vishwakarma Institute of Information Technology, Pune
  • Disha Wankhede Vishwakarma Institute of Information Technology, Pune
  • Madhuri Karnik Vishwakarma Institute of Information Technology, Pune

Keywords:

DBMS, SQL, MongoDB, Data Transformation, Cloud, Encryption

Abstract

In today’s world, there is a growing need for a flexible solution that can handle the complexities of SQL and MongoDB databases while providing reliable backup, recovery, conversion, and data protection in the constantly changing world of data management. The creation of an integrated backup, recovery, and conversion tool with encryption and decryption capabilities is described in this work. This application offers platform support for SQL and MongoDB databases, scheduling, backups, point-in-time recovery, and secure storage to meet the urgent needs of businesses and data professionals. Additionally, it provides smooth data transformation and schema mapping during conversion. The solution integrates strong encryption algorithms for data protection at rest and in transit and permits secure decryption utilising encryption keys and strategies like symmetric and Caesar cyphers. This improves data security. Essentially, the goal of our suggested technology is to improve and streamline data management, making it an essential resource in the current data-driven environment.

Downloads

Download data is not yet available.

References

H. KIM, H. Y. YEOM AND Y. SON, "AN EFFICIENT DATABASE BACKUP AND RECOVERY SCHEME USING WRITE-AHEAD LOGGING," 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), BEIJING, CHINA, 2020, PP. 405-413, DOI: 10.1109/CLOUD49709.2020.00062.

Matos and M. Correia, "NoSQL Undo: Recovering NoSQL databases by undoing operations," 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 2016, pp. 191-198, doi: 10.1109/NCA.2016.7778616.

Mousa, M. Karabatak and T. Mustafa, "Database Security Threats and Challenges," 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, 2020, pp. 1-5, doi: 10.1109/ISDFS49300.2020.9116436.

S. Gokulakrishnan and J. M. Gnanasekar, "Data Integrity and Recovery Management in Cloud Systems," 2020 Fourth International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2020, pp. 645-648, doi: 10.1109/ICISC47916.2020.9171066.

S. Bhattacharya, A. Roy, S. Sen and N. C. Debnath, "Distributed data recovery architecture based on schema segregation," 2017 IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada, 2017, pp. 1238-1243, doi: 10.1109/ICIT.2017.7915540.

G. B. Solanke and K. Rajeswari, "SQL to NoSQL transformation system using data adapter and analytics," 2017 IEEE International Conference on Technological Innovations in Communication, Control and Automation (TICCA), Chennai, India, 2017, pp. 59-63, doi: 10.1109/TICCA.2017.8344580.

M. Cai, T. Bai, M. Cheng and C. Xu, "A Protocol for Extending Analytics Capability of SQL Database," 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, China, 2016, pp. 110-115, doi: 10.1109/CCBD.2016.031.

C. Boisvert, K. Domdouzis and J. License, "A Comparative Analysis of Student SQL and Relational Database Knowledge Using Automated Grading Tools," 2018 International Symposium on Computers in Education (SIIE), Jerez, Spain, 2018, pp. 1-5, doi: 10.1109/SIIE.2018.8586684.

G. Vonitsanos, E. Dritsas, A. Kanavos, P. Mylonas and S. Sioutas, "Security and Privacy Solutions associated with NoSQL Data Stores," 2020 15th International Workshop on Semantic and Social Media Adaptation and Personalization (SMA, Zakynthos, Greece, 2020, pp. 1-5, doi: 10.1109/SMAP49528.2020.9248442.

J. Kumar and V. Garg, "Security analysis of unstructured data in NOSQL MongoDB database," 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, 2017, pp. 300-305, doi: 10.1109/IC3TSN.2017.8284495.

O. Abahussain and A. Alqaddoumi, "DBMS, NoSQL and Securing Data: the relationship and the recommendation," 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain, 2020, pp. 1-6, doi: 10.1109/3ICT51146.2020.9311958.

T. Hirano, Y. Kawai and Y. Koseki, "DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems," 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346255.

Y. Mahmoud and M. M. Abu-Saqer, "Modification of Select Operation Model for Multilevel Security: Medical Database Systems as an Application," 2020 International Conference on Assistive and Rehabilitation Technologies (iCareTech), Gaza, Palestine, 2020, pp. 47-50, doi: 10.1109/iCareTech49914.2020.00016.

-O. Truica, F. Radulescu, A. Boicea and I. Bucur, "Performance Evaluation for CRUD Operations in Asynchronously Replicated Document Oriented Database," 2015 20th International Conference on Control Systems and Computer Science, Bucharest, Romania, 2015, pp. 191-196, doi: 10.1109/CSCS.2015.32.

H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), Penang, Malaysia, 2016, pp. 1-6, doi: 10.1109/ICAICTA.2016.7803097.

M. Ha and Y. Shichkina, "The Query Translation from MySQL to MongoDB Taking into Account the Structure of the Database," 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia, 2021, pp. 383-386, doi: 10.1109/ElConRus51938.2021.9396591.

M. M. Patil, A. Hanni, C. H. Tejeshwar and P. Patil, "A qualitative analysis of the performance of MongoDB vs MySQL database based on insertion and retriewal operations using a web/android application to explore load balancing — Sharding in MongoDB and its advantages," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017, pp. 325-330, doi: 10.1109/I-SMAC.2017.8058365.

Hafsa, N. Alimi, A. Sghaier, M. Zeghid and M. Machhout, "A hardware-software co-designed AES-ECC cryptosystem," 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), Hammamet, Tunisia, 2017, pp. 50-54, doi: 10.1109/ASET.2017.7983665.

P. S. Murthy and V. Nagalakshmi, "Database Forensics and Security Measures to Defend from Cyber Threats," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, 2020, pp. 1302-1307, doi: 10.1109/ICISS49785.2020.9316042.

O. S. F. Shareef and A. M. Sagheer, "Implementing a Distributed Certificate Authority Using Elliptic Curve Cryptography for Big Data Environment," 2020 2nd Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2020, pp. 132-140, doi: 10.1109/AiCIS51645.2020.00031.

Shrimant, Gaikwad Vidya, Ravindranath, K. & Prasad, Gudapati Syam(2023) A mathematical model for secure Cloud-IoT communication: Introducing the revolutionary lightweight key mechanism, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1341–1354, DOI: 10.47974/JDMSC-1750

Prasad, Gudapati & Gaikwad, Vidya. (2018). A Survey on User Awareness of Cloud Security. International Journal of Engineering and Technology (UAE). 7. 131-135. 10.14419/ijet.v7i2.32.15386.

Gudapati, S.P., Gaikwad, V. (2021). Light-Weight Key Establishment Mechanism for Secure Communication Between IoT Devices and Cloud. In: Satapathy, S., Bhateja, V., Janakiramaiah, B., Chen, YW. (eds) Intelligent System Design. Advances in Intelligent Systems and Computing, vol 1171. Springer, Singapore. https://doi.org/10.1007/978-981-15-5400-1_55

Mrs. Disha Sushant Wankhede, Dr. Selvarani Rangasamy,"REVIEW ON DEEP LEARNING APPROACH FOR BRAIN TUMOR GLIOMA ANALYSIS" Journal of Information Technology in Industry, VOL. 9 NO. 1 (2021) pp. 395 - 408 , DOI: https://doi.org/10.17762/itii.v9i1.144

Disha Sushant Wankhede, R. Selvarani, Dynamic architecture based deep learning approach for glioblastoma brain tumor survival prediction, Neuroscience Informatics, Volume 2, Issue 4, 2022, 100062, ISSN 2772-5286, https://doi.org/10.1016/j.neuri.2022.100062. (https://www.sciencedirect.com/science/article/pii/S2772528622000243)

Mrs. Disha Sushant Wankhede, Dr. Selvarani Rangasamy, Dr. Chetan J. Shelke,”Risk Prediction of Brain Glioblastoma Multiforme Recurrence Using Deep Neural Networks “ Journal of Algebric Statistics ,Volum13 issue 3 ,2022, https://www.publishoa.com/index.php/journal/article/view/1198, e-ISSN: 1309-3452

Kurhade Anirudha, Moon Aditya,Pratham Shaantanu, Dudhane Akash, Lonari Gaurav, Gaikwad Vidya S, Sable Nilesh P., IOT SIMULATION AND CLOUD INTEGRATION SYSTEM, 2023/03129, 2023/6/28.

Thakare, P., Telang, A., Sonawane, H., Mantri, Y., Gaikwad, V., & Vishwakarma Institute of Information Technology. (2020). Secure File Storage on Cloud using Homomorphic Encryption. International Research Journal of Engineering and Technology (IRJET), 7(5). https://www.irjet.net/archives/V7/i5/IRJET-V7I5861.pdf

Karnik, M.P., Kodavade, D.V. (2023). A Survey on Controllable Abstractive Text Summarization. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 715. Springer, Cham. https://doi.org/10.1007/978-3-031-35507-3_30

Downloads

Published

30.11.2023

How to Cite

Sutar, S. ., Jose, K. ., Gaikwad, V. ., Mishra, V. ., Wankhede, D. ., & Karnik, M. . (2023). Enhancing Data Management: An Integrated Solution for Database Backup, Recovery, Conversion, and Encryption Capabilities. International Journal of Intelligent Systems and Applications in Engineering, 12(6s), 720–734. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4011

Issue

Section

Research Article