International Journal of
Computer Engineering Research

  • Abbreviation: Int. J. Comput. Eng. Res.
  • Language: English
  • ISSN: 2141-6494
  • DOI: 10.5897/IJCER
  • Start Year: 2010
  • Published Articles: 33

Review

A practical guideline for implementing an extra security layer on an intra-cloud private MongoDB Database using encryption

Kevin Tshimanga
  • Kevin Tshimanga
  • School of Computer Science, Faculty of Engineering and Computer Science, University of Wollongong in Dubai, Dubai, United Arab Emirates.
  • Google Scholar
Patrick Mukala
  • Patrick Mukala
  • School of Computer Science, Faculty of Engineering and Computer Science, University of Wollongong in Dubai, Dubai, United Arab Emirates.
  • Google Scholar
Godwill Ilunga
  • Godwill Ilunga
  • School of Computer Science, Faculty of Engineering and Computer Science, University of Wollongong in Dubai, Dubai, United Arab Emirates.
  • Google Scholar


  •  Received: 07 September 2023
  •  Accepted: 28 December 2023
  •  Published: 31 March 2024

References

Alliance CS (2020). Top threats to cloud computing Egregious eleven deep dive. Cloud Security Alliance 1(0).

 

Date JC (2004). Une introduction aux systèmes de bases de données. Boston: Pearson/Addison Wesley.

 

Deepika SN (2015). Database security Threats and security techniques. International Journal of Information Sciences and Techniques, 5.

 

Kumar V, Chaisiri S, Ko R (2017a). A data-centric view of cloud security. In Data Security in Cloud Computing. Institution of Engineering and Technology pp. 1-17.
Crossref

 

Kumar V, Chaisiri S, Ko R (2017b). Data Security in Cloud Computing. Institution of Engineering and Technology.
Crossref

 

MongoDB. Client-side field level encryption guide.

 

Mè L (2006). Sécurité des systèmes information.

 

Powell D, Stroud R (2003). Conceptual model and architecture of maftia. Technical Report Series-University of Newcastle upon Tyne Computing Science.