Development of a Process for Migration of Data from Relational to Non-Relational Database

Authors

  • Fahad Noor Asia Pacific University of Technology and Innovation Technology Park Malaysia, Kuala Lumpur, Malaysia Author
  • Dhason Padmakumar Asia Pacific University of Technology and Innovation Technology Park Malaysia, Kuala Lumpur, Malaysia Author
  • Dr. Sivakumar Vengusamy Asia Pacific University of Technology and Innovation Technology Park Malaysia, Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.61841/xganxy68

Keywords:

NoSQL Data Migration, NoSQL Security Issues, NoSQL Reliability Issues, NoSQL Reliability Techniques.

Abstract

 As we know the world is moving towards the cloud computing very fast, it has become the need of every sector. Cloud computing is one of the rapid growing and fast adapting technology so data confidentiality and other issues are also growing and it needs to be resolved and deal on prior basis. The purpose of this paper is to identify reliability issues of cloud based applications in mass media sector of Malaysia and how world have suffered due this problem and as well as how Malaysia can suffer in future if they not constantly work on this domain. This paper consists of various incidents and thorough those we can identify the importance of cloud computing security 

Downloads

Download data is not yet available.

References

[1] Agrawal, S. et al. (2015) „Survey on Mongodb : An Open-’, 6(12), pp. 1–11.

[2] Boicea, A., Radulescu, F. and Agapin, L. I. (2012) „MongoDB vs Oracle - database comparison‟. doi:

10.1109/EIDWT.2012.32.

[3] Chauhan, D. (2017) „Using the Advantages of NOSQL : A Case Study on MongoDB‟, (February).

[4] Database, C. and Sipos, R. (2017) „Migration from relational to NoSQL database Migration from relational to

NoSQL database‟. doi: 10.1088/1757-899X/263/4/042055.

[5] Hanine Mohamed, Bendarag Abdesadik, B. O. (2015) „Data Migration Methodology from Relational to No

SQL Databases‟, 9(12), pp. 2566–2570.

[6] Jia, T. et al. (2016) „Model Transformation and Data Migration from Relational Database to MongoDB‟. doi:

10.1109/BigDataCongress.2016.16.

[7] Klettke, M. and Scherzinger, S. (2017) „Schema Extraction and Structural Outlier Detection for JSON-based

NoSQL Data Stores‟, 1, pp. 425–444.

[8] Loureno J R, C. B. and C. P. (2015) „Choosing the right nosql database for the job‟, a quality attribute

evaluation Journal of Big Data 2 18.

[9] M. Alam, S. W. K. (2006) „Migration from relational database to object oriented database‟, Journal of

Computer Science, 2(10), pp. 781–784.

[10] Noiumkar, P. and Chomsiri, T. (2014) „A Comparison the Level of Security on Top 5 Open Source NoSQL

Databases‟.

[11] Okman, L. et al. (2011) „Security Issues in NoSQL Databases‟. doi: 10.1109/TrustCom.2011.70.

[12] Oliveira Fábio, Oliveira Abílio, A. B. (2018) „Migration of Relational Databases to NoSQL - Methods of

Analysis Fábio Oliveira Abílio Oliveira Bráulio Alturas’, 9(2), pp. 227–235. doi: 10.2478/mjss-2018-0042.

[13] Robbins, R. J. (1995) „Database Fundamentals‟, pp. 1–31.

[14] Ron, A. et al. (2015) „No SQL , No Injection ? Examining NoSQL Security‟.

[15] Sahafizadeh, E. and Nematbakhsh, M. A. (2015) „A Survey on Security Issues in Big Data and NoSQL‟, 4(4),

pp. 68–72.

[16] Sathyadevan, S., Muraleedharan, N. and Rajan, S. P. (2015) „Enhancement of Data Level Security in

MongoDB‟, pp. 199–200. doi: 10.1007/978-3-319-11227-5.

[17] Vasilchuk, O. I. et al. (2018) „The Creation of Scalable Tools for Solving Big Data Analysis Problems Based

on the MongoDB Database‟.

[18] Verma, M. P. and Id, E. (2017) „Overview of Indexes Used in NOSQL Databases of MongoDB Architecture‟,

(June), pp. 1057–1059.

[19] Walek, B. and Klimes, C. (2012) „A methodology for Data Migration between Dif- ferent Database

Management Systems‟, 6(5), pp. 536–541.

[20] Yangui, R. and Nabli, A. (2017) „ETL Based Framework for NoSQL Warehousing‟, 1, pp. 40–53. doi:

10.1007/978-3-319-65930-5.

[21] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760.

[22] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The

Empirical Economics Letters, Vol.18; No. 3, March 2019.

[23] Metaheuristic techniques”, International Journal of Business Intelligence Research, - Volume 5, Issue 1,

April-2014. URL: https://dl.acm.org/citation.cfm?id=2628938; DOI: 10.4018/ijbir.2014010105, which is in C

category of ABDC List.

[24] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT)and the Internet of People

(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-9785.

[25] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An

Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN Online:

2350-1111 (Online). URL: http://www.i3cpublications.org/M-IJTS-061801.pdf

[26] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in Financial

Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, Page no: 159-164.

[27] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization Approach”,

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.

[28] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision Making”,

International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-2013.

[29] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic

Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and

Communication Engineering, Volume 3, Issue 3, March-2014.

[30] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical Study”,

International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.

[31] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud

Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)

[32] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment generation in

the field of UPVC widows” (ICSMS2019).

[33] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across

emerging countries”, International Conference on Sustainability Management and Strategy” (ICSMS2018).

[34] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International

Conference on Business Management and Information Systems” (ICBMIS2015).

[35] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International

Conference on Mathematics in Engineering & Business Management (ICMEB 2012).

[36] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear

Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering &

Business Management (ICMEB 2012).

[37] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision Making

”, 2011 IEEE International Conference on Computational Intelligence and Computing Research (2011 IEEE

ICCIC).

[38] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome the

Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing Research

(2011 IEEE ICCIC).

[39] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing and

Communication Technologies. (SCCT-2015)

[40] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for

Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019

[41] Dr.P.Mary Jeyanthi , “Customer Value Management (CVM) – Thinking Inside the box” – ISBN : 978-93-

87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.

[42] Jeyanthi, P. M., & Shrivastava, S. K. (2019). The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.

Downloads

Published

31.10.2019

How to Cite

Noor, F., Padmakumar, D., & Vengusamy, S. (2019). Development of a Process for Migration of Data from Relational to Non-Relational Database. International Journal of Psychosocial Rehabilitation, 23(4), 1261-1272. https://doi.org/10.61841/xganxy68