MongoDB in a Cloud Environment

Authors

  • Santosh Kumar Singh Assistant Professor, Bosco Technical Training Society GGSIPU, Delhi, India Author
  • Priyanka Dubey Assistant Professor, AMITY University, Gurugram, Haryana India Author
  • Gyanendra Kumar Shukla Research Scholar, AMITY University, Gurugram, Haryana India Author

DOI:

https://doi.org/10.48165/dbitdjr.2024.1.01.03

Keywords:

Cloud, MongoDB, Access Control, Security, Database

Abstract

With more and more businesses adopting cloud computing, cloud-based database  adoption is becoming a common practice. A well-liked NoSQL database,  MongoDB is ideal for cloud deployment because of its scalable and adaptable data  storage features. The purpose of this study is to examine the advantages and factors  to be taken into account while implementing MongoDB in a cloud environment.  The cloud environment presents several advantages for MongoDB deployment,  such as high availability, scalability, and integration capabilities. To guarantee a  successful and effective implementation, enterprises must carefully take into  account elements like data security, network connectivity, and cost management.  Organizations may make well-informed decisions and fully utilize MongoDB in  the cloud by being aware of the advantages and factors related to MongoDB hosted  on the cloud. 

References

Satish, K. S. (2024). Cloud Mongo Database-Applying Security and Encryption to NoSQL DB.

Luz, A., Jonathan, H., & Olaoye, G. (2024). Exploring Quantum Algorithms for Cluster Efficiency (No. 12995).

Satish, K. S. (2024). CYBERSECURITY IN A HYPERCONNECTED WORLD

Luz, A., & Oluwaseyi, J. (2024). Examining Quantum Techniques for Cluster Effectiveness.

Frank, E., Luz, A., & Jonathan, H. (2024). Machine Learning Algorithms for Optimal Routing in MANETs.

Satish, K. S., & Das, M. S. Review of Cloud Computing and Data Security. IJAEMA (The International Journal of Analytical and Experimental Modal Analysis), 10, 1-8.

Luz, A., & Kayode, S. O. (2024). How organizational culture influences employee experience, including aspects such as values, norms, and practices.

Satish, K. S., & Das, M. S. (2019). Multi-Tier Authentication Scheme to Enhance Security in Cloud Computing. IJRAR (International Journal of Research and Analytical Reviews), 6, 1-8.

Dr. Santosh Kumar Singh “Blockchain-Based Model for Cloud Computing Security”, “International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol 12, Issue 8, pp. 7-19, DOI: 10.17148/

IJARCCE.2023.12802

https://ijarcce.com/papers/blockchain-based-mod el-for-cloud-computing-security/

Dr. Santosh Kumar Singh, Dr. Varun Tiwari, Dr. Vikas Rao Vadi “Blockchain Creation Using Java Programming Language “International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-12, Issue 4, April 2023, ISSN: 2278-1021, pp. 1082-1086, DOI: 10.17148/IJARCCE.2023.124188

https://ijarcce.com/papers/blockchain-creation-using-ja va-programming-language/

Dr. Santosh Kumar Singh, Dr. Varun Tiwari, Dr. Vikas Rao Vadi “Smart Contract Using Solidity (Remix – Ethereum IDE) “International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-12, Issue 2, Feb 2023, ISSN: 2278-1021, pp. 243-249, DOI 10.17148/IJARCCE.2023.12253

https://ijarcce.com/papers/smart-contract-using-solidi ty-remix-ethereum-ide/

Singh, S. K.., & Vadi, V. R... (Jan 2023). Use of Blockchain in Crypto-Currency to secure cloud forensic trails. Trinity Journal of Management, IT & Media (TJMITM), 14(1), 1–8. https://doi.org/10.48165/tjmitm.2023.1401.

https://acspublisher.com/journals/index.php/tjmitm/arti cle/view/3334

Santosh Kumar Singh, Dr. Vikas Rao Vadi “Evolutionary Transformation of Blockchain Technology, www.ijert.org, ISSN – 2278-0181, Vol. 10, Issue – 1, pp. 26-30, January 2022.

https://www.ijert.org/research/evolutionary-transforma tion-of-blockchain-technology-IJERTCONV10IS01008. pdf

Singh, S. K.., Vadi, V. R.., Tiwari, A., & Pandey, P. K. (2021). Security Aspect of Blockchain Technology. Trinity Journal of Management, IT & Media (TJMITM), 12(1), 39–44. https://doi.org/10.48165/tjmitm.2021.1106

https://acspublisher.com/journals/index.php/tjmitm/arti cle/view/399

Singh, S. K., Vadi, V. R., & Singh, S. (2021). Multi-keyword parallel ciphertext retrieval method. Trinity Journal of Management, IT & Media (TJMITM), 12(1), 1–3. https:// doi.org/10.48165/tjmitm.2021.1101

https://acspublisher.com/journals/index.php/tjmitm/issue/ view/26

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. Rajesh Kumar Tiwari (2020) UCON-Based Data Protection Protocol for Cloud Environment. Journal of Critical Reviews, 7 (18), 2480-2486. doi:10.31838/JCR.07.18.310 (Scopus Indexed).

http://jcreview.com/?mno=115632

Santosh Kumar Singh, Dr. P. K. Manjhi and Dr. R. K. Tiwari “Cloud Computing Security Using Steganography” Journal of Emerging Technologies and Innovative Research, (JETIR), Volume VI, Issue VI, 6th June 2K19www.jetir.org ISSN 2349-5162, pp. 923-927, (UGC Approved Journal).

Singh, S. K., Manjhi, P. K., Tiwari, R. K., & Vadi, V. R. (2018). Cloud Computing and Security Issues in the Cloud. Trinity Journal of Management, IT & Media, 9(1), 22–27.

a. https://doi.org/10.48165/tjmitm.2018.0905 (CITE) i. https://acspublisher.com/journals/tjmitm/current-is sues/

Santosh Kumar Singh, Dr. P. K. Manjhi and Dr. R. K. Tiwari, Dr. V. R. Vadi “A Secure Communication Scheme for Cloud Environment” International Journal of Computer Engineering and Applications, (IJCEA), Volume XII, Issue IV, April 18www.ijcea.com ISSN 2321-3469, pp. 97-106, (UGC Approved Journal).

Santosh Kumar Singh, P. K. Manjhi and Dr. R.K. Tiwari “ELLIPTIC CURVE CRYPTOGRAPHY IN CLOUD COMPUTING SECURITY” International Journal of Computer Engineering and Applications, (IJCEA), Volume XII, Issue III, March 18www.ijcea.com ISSN 2321-3469, pp. 179-183, (UGC Approved Journal).

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R. K. Tiwari “Data Security using RSA Algorithm in Cloud Computing “International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-5, Issue 8, Aug2016, ISSN: 2278-1021, pp.11-16, DOI 10.17148/

IJARCCE.2016.5803.

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari “An Efficient and Secure Protocol for Ensuring Data Storage

Security in Cloud Computing Using ECC” International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-5, Issue 7, July 2016, ISSN: 2278-1021, pp. 5-15, DOI 10.17148/

IJARCCE.2016.5702.

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R. K. Tiwari “An Approach towards Data Security in the Cloud Computing Using AES” International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-5, Issue 6, June 2016, ISSN: 2278-1021, pp. 22-29, DOI 10.17148/IJARCCE.2016.5605.

Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari “Cloud Computing Security Applied by Homomorphic Encryption” International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE), Vol-5, Issue 5, May 2016, ISSN: 2278-1021, pp. 891-896, DOI 10.17148/

IJARCCE.2016.55218.

Santosh Kumar Singh, Dr. P.K. Manjhi and Dr. R. K. Tiwari “Cloud Computing Security and Trust Enhancement by using OTP”, International Journal of Innovative Research in Computer and Communication Engineering, (IJIRCCE), Vol.4, Issues5, and ISSN: 2320-9798, DOI: 10.15680/

IJIRCCE.2016. 0405069, May 2016.

Downloads

Published

2024-09-17

How to Cite

MongoDB in a Cloud Environment. (2024). Don Bosco Institute of Technology Delhi Journal of Research (DBITDJR), 1(1), 13–18. https://doi.org/10.48165/dbitdjr.2024.1.01.03