Companion Proceedings of The10th International Conference on Utility and Cloud Computing 2017
DOI: 10.1145/3147234.3148133
|View full text |Cite
|
Sign up to set email alerts
|

A Review of MongoDB and Singularity Container Security in regards to HIPAA Regulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…OpenFlow is configur ed for communication among network entities. OpenFlow supports TLS v1.2 and above and PKI can be used to establish certificate validity chains [31]. Th e framework uses ovs-pki script to create an initial PKI structure [32].…”
Section: Design Of the Studymentioning
confidence: 99%
“…OpenFlow is configur ed for communication among network entities. OpenFlow supports TLS v1.2 and above and PKI can be used to establish certificate validity chains [31]. Th e framework uses ovs-pki script to create an initial PKI structure [32].…”
Section: Design Of the Studymentioning
confidence: 99%
“…Concerning attacks, a NoSQL injection attack on MongoDB is studied in the study [14]. A detailed study on authentication, authorization, encryption and auditing of MongoDB can be found in the study [15], and a comparison of its security features with those of Oracle and MySQL is outlined by the study [16]. Both of these publications cover a good deal of standard out of the box security features, yet not all the features considered in our publication.…”
Section: Related Workmentioning
confidence: 99%
“…The cloud storage cannot use the data as plaintext as the data will be needed to be transferred over a network and if it is transferred as plaintext, it gives rise to security issues. Hence, Cloud technology has an approach of employing multiple third-party servers for the data storage instead of using a single dedicated server as used in traditional data storage networks [3][4] [5]. In this, the location of data storage is not known to the data owner or the actual data user and it is only the concern of the cloud storage provider, and the provider alone can secure the data which is not completely trusted by the users.…”
Section: Introductionmentioning
confidence: 99%