Enhancing Data Management: An Integrated Solution for Database Backup, Recovery, Conversion, and Encryption Capabilities.
Keywords:
DBMS, SQL, MongoDB, Data Transformation, Cloud, EncryptionAbstract
In today’s world, there is a growing need for a flexible solution that can handle the complexities of SQL and MongoDB databases while providing reliable backup, recovery, conversion, and data protection in the constantly changing world of data management. The creation of an integrated backup, recovery, and conversion tool with encryption and decryption capabilities is described in this work. This application offers platform support for SQL and MongoDB databases, scheduling, backups, point-in-time recovery, and secure storage to meet the urgent needs of businesses and data professionals. Additionally, it provides smooth data transformation and schema mapping during conversion. The solution integrates strong encryption algorithms for data protection at rest and in transit and permits secure decryption utilising encryption keys and strategies like symmetric and Caesar cyphers. This improves data security. Essentially, the goal of our suggested technology is to improve and streamline data management, making it an essential resource in the current data-driven environment.
Downloads
References
H. KIM, H. Y. YEOM AND Y. SON, "AN EFFICIENT DATABASE BACKUP AND RECOVERY SCHEME USING WRITE-AHEAD LOGGING," 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), BEIJING, CHINA, 2020, PP. 405-413, DOI: 10.1109/CLOUD49709.2020.00062.
Matos and M. Correia, "NoSQL Undo: Recovering NoSQL databases by undoing operations," 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 2016, pp. 191-198, doi: 10.1109/NCA.2016.7778616.
Mousa, M. Karabatak and T. Mustafa, "Database Security Threats and Challenges," 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, 2020, pp. 1-5, doi: 10.1109/ISDFS49300.2020.9116436.
S. Gokulakrishnan and J. M. Gnanasekar, "Data Integrity and Recovery Management in Cloud Systems," 2020 Fourth International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2020, pp. 645-648, doi: 10.1109/ICISC47916.2020.9171066.
S. Bhattacharya, A. Roy, S. Sen and N. C. Debnath, "Distributed data recovery architecture based on schema segregation," 2017 IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada, 2017, pp. 1238-1243, doi: 10.1109/ICIT.2017.7915540.
G. B. Solanke and K. Rajeswari, "SQL to NoSQL transformation system using data adapter and analytics," 2017 IEEE International Conference on Technological Innovations in Communication, Control and Automation (TICCA), Chennai, India, 2017, pp. 59-63, doi: 10.1109/TICCA.2017.8344580.
M. Cai, T. Bai, M. Cheng and C. Xu, "A Protocol for Extending Analytics Capability of SQL Database," 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, China, 2016, pp. 110-115, doi: 10.1109/CCBD.2016.031.
C. Boisvert, K. Domdouzis and J. License, "A Comparative Analysis of Student SQL and Relational Database Knowledge Using Automated Grading Tools," 2018 International Symposium on Computers in Education (SIIE), Jerez, Spain, 2018, pp. 1-5, doi: 10.1109/SIIE.2018.8586684.
G. Vonitsanos, E. Dritsas, A. Kanavos, P. Mylonas and S. Sioutas, "Security and Privacy Solutions associated with NoSQL Data Stores," 2020 15th International Workshop on Semantic and Social Media Adaptation and Personalization (SMA, Zakynthos, Greece, 2020, pp. 1-5, doi: 10.1109/SMAP49528.2020.9248442.
J. Kumar and V. Garg, "Security analysis of unstructured data in NOSQL MongoDB database," 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, 2017, pp. 300-305, doi: 10.1109/IC3TSN.2017.8284495.
O. Abahussain and A. Alqaddoumi, "DBMS, NoSQL and Securing Data: the relationship and the recommendation," 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain, 2020, pp. 1-6, doi: 10.1109/3ICT51146.2020.9311958.
T. Hirano, Y. Kawai and Y. Koseki, "DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems," 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Fukushima, Japan, 2021, pp. 1-8, doi: 10.1109/DSC49826.2021.9346255.
Y. Mahmoud and M. M. Abu-Saqer, "Modification of Select Operation Model for Multilevel Security: Medical Database Systems as an Application," 2020 International Conference on Assistive and Rehabilitation Technologies (iCareTech), Gaza, Palestine, 2020, pp. 47-50, doi: 10.1109/iCareTech49914.2020.00016.
-O. Truica, F. Radulescu, A. Boicea and I. Bucur, "Performance Evaluation for CRUD Operations in Asynchronously Replicated Document Oriented Database," 2015 20th International Conference on Control Systems and Computer Science, Bucharest, Romania, 2015, pp. 191-196, doi: 10.1109/CSCS.2015.32.
H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), Penang, Malaysia, 2016, pp. 1-6, doi: 10.1109/ICAICTA.2016.7803097.
M. Ha and Y. Shichkina, "The Query Translation from MySQL to MongoDB Taking into Account the Structure of the Database," 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia, 2021, pp. 383-386, doi: 10.1109/ElConRus51938.2021.9396591.
M. M. Patil, A. Hanni, C. H. Tejeshwar and P. Patil, "A qualitative analysis of the performance of MongoDB vs MySQL database based on insertion and retriewal operations using a web/android application to explore load balancing — Sharding in MongoDB and its advantages," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017, pp. 325-330, doi: 10.1109/I-SMAC.2017.8058365.
Hafsa, N. Alimi, A. Sghaier, M. Zeghid and M. Machhout, "A hardware-software co-designed AES-ECC cryptosystem," 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), Hammamet, Tunisia, 2017, pp. 50-54, doi: 10.1109/ASET.2017.7983665.
P. S. Murthy and V. Nagalakshmi, "Database Forensics and Security Measures to Defend from Cyber Threats," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, 2020, pp. 1302-1307, doi: 10.1109/ICISS49785.2020.9316042.
O. S. F. Shareef and A. M. Sagheer, "Implementing a Distributed Certificate Authority Using Elliptic Curve Cryptography for Big Data Environment," 2020 2nd Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2020, pp. 132-140, doi: 10.1109/AiCIS51645.2020.00031.
Shrimant, Gaikwad Vidya, Ravindranath, K. & Prasad, Gudapati Syam(2023) A mathematical model for secure Cloud-IoT communication: Introducing the revolutionary lightweight key mechanism, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1341–1354, DOI: 10.47974/JDMSC-1750
Prasad, Gudapati & Gaikwad, Vidya. (2018). A Survey on User Awareness of Cloud Security. International Journal of Engineering and Technology (UAE). 7. 131-135. 10.14419/ijet.v7i2.32.15386.
Gudapati, S.P., Gaikwad, V. (2021). Light-Weight Key Establishment Mechanism for Secure Communication Between IoT Devices and Cloud. In: Satapathy, S., Bhateja, V., Janakiramaiah, B., Chen, YW. (eds) Intelligent System Design. Advances in Intelligent Systems and Computing, vol 1171. Springer, Singapore. https://doi.org/10.1007/978-981-15-5400-1_55
Mrs. Disha Sushant Wankhede, Dr. Selvarani Rangasamy,"REVIEW ON DEEP LEARNING APPROACH FOR BRAIN TUMOR GLIOMA ANALYSIS" Journal of Information Technology in Industry, VOL. 9 NO. 1 (2021) pp. 395 - 408 , DOI: https://doi.org/10.17762/itii.v9i1.144
Disha Sushant Wankhede, R. Selvarani, Dynamic architecture based deep learning approach for glioblastoma brain tumor survival prediction, Neuroscience Informatics, Volume 2, Issue 4, 2022, 100062, ISSN 2772-5286, https://doi.org/10.1016/j.neuri.2022.100062. (https://www.sciencedirect.com/science/article/pii/S2772528622000243)
Mrs. Disha Sushant Wankhede, Dr. Selvarani Rangasamy, Dr. Chetan J. Shelke,”Risk Prediction of Brain Glioblastoma Multiforme Recurrence Using Deep Neural Networks “ Journal of Algebric Statistics ,Volum13 issue 3 ,2022, https://www.publishoa.com/index.php/journal/article/view/1198, e-ISSN: 1309-3452
Kurhade Anirudha, Moon Aditya,Pratham Shaantanu, Dudhane Akash, Lonari Gaurav, Gaikwad Vidya S, Sable Nilesh P., IOT SIMULATION AND CLOUD INTEGRATION SYSTEM, 2023/03129, 2023/6/28.
Thakare, P., Telang, A., Sonawane, H., Mantri, Y., Gaikwad, V., & Vishwakarma Institute of Information Technology. (2020). Secure File Storage on Cloud using Homomorphic Encryption. International Research Journal of Engineering and Technology (IRJET), 7(5). https://www.irjet.net/archives/V7/i5/IRJET-V7I5861.pdf
Karnik, M.P., Kodavade, D.V. (2023). A Survey on Controllable Abstractive Text Summarization. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 715. Springer, Cham. https://doi.org/10.1007/978-3-031-35507-3_30
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.