Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 2 , PP: 191-198, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management

Shyam S. Gupta 1 * , Pankaj Kumar 2 , Rajeev Shrivastava 3 , Satyabrata Jena 4 , Tushar Kumar Pandey 5 , Ankita Nigam 6

  • 1 Associate Professor, Department of Computer Science and Engineering, Amity School of Engineering and Technology (ASET), Amity University, Gwalior -474005 Madhya Pradesh, India. - (ssgupta@gwa.amity.edu)
  • 2 Professor, Department of Pharmacology, Adesh Institute of Pharmacy and Biomedical sciences, Adesh University, NH-7, Barnala Road, Bathinda - (pankaj1981sameer@gmail.com)
  • 3 Principal, Princeton Institute of Engineering & Technology for Women Hyderabad, Telangana, India - (rajeev2440130@gmail.com)
  • 4 Associate Professor, Department of Pharmaceutics, Bhaskar Pharmacy College, Yenkapally, Moinabad, Hyderabad, Telangana - (lifepharmacyguidance2023@gmail.com)
  • 5 Junior Engineer (Computer Science), Dr. Rajendra Prasad Central Agricultural University, Pusa, Samastipur, Bihar - (tusharkumarpandey@gmail.com)
  • 6 Professor, Department of CSE, Princeton Institute of Engineering and Technology for Women, Hyderabad, India - (ankita270481@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.130215

    Received: January 22, 2024 Revised: Mrach 23, 2024 Accepted: May 08, 2024
    Abstract

    The term "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management" refers to a book that studies novel techniques for tackling problems related to digital data. The integration of three complicated methods—DQO, DSS, and RAI—is the major focus of attention in this piece of writing. DQO makes use of machine learning to optimize query processing on the fly to meet fluctuating workloads. This is done to accommodate such workloads. To address issues pertaining to the scale of distributed systems, distributed storage systems (DSS) convey data in an effective manner by utilizing consistent hashing. The RAI algorithm adjusts the index architecture in response to the query patterns to achieve real-time flexibility. In this way, the process of looking for information that is frequently asked about is sped up. The methodology that has been suggested is superior to six different ways that are often used in terms of its adaptability, scalability, and real-time capabilities. This article will give a thorough model for improving data management in computer systems. The objective of this essay is to present the model.

    Keywords :

    Adaptability, Algorithms , Databases , Data Retrieval , Cyber Security , Enhancement , Innovations , Management , Optimization , Scalability , Real-time

    References

    [1]    R. Han, L. K. John, and J. Zhan, "Benchmarking big data systems: a review," IEEE Transactions on Services Computing, vol. 11, no. 3, pp. 580–597, 2018.

    [2]    P. Sawadogo and J. Darmont, "On data lake architectures and metadata management," Journal of Intelligent Information Systems, vol. 56, no. 1, pp. 97–120, 2021.

    [3]    J. Lu and I. Holubová, "Multi-model databases: a new journey to handle the variety of data," ACM Computing Surveys, vol. 52, no. 3, pp. 1–38, 2019.

    [4]    S. Bimonte, E. Gallinucci, P. Marcel, and S. Rizzi, "Logical design of multi-model data warehouses," Knowledge and Information Systems, vol. 65, no. 3, pp. 1067–1103, 2022.

    [5]    Rabeb Touati , Dr. Imen Ferchichi , Dr. Imen Messaoudi , Dr.Afef Elloumi Oueslati , Dr. Zied Lachiri, Pre-Cursor microRNAs from Different Species classification based on features extracted from the image, Journal of Cybersecurity and Information Management, Vol. 3 , No. 1 , (2020) : 05-13 (Doi   :  https://doi.org/10.54216/JCIM.030101)

    [6]    Sayali Karmode, Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey, Journal of Cybersecurity and Information Management, Vol. 3 , No. 1 , (2020) : 21-28 (Doi   :  https://doi.org/10.54216/JCIM.030103)

    [7]    Edwin Ramirez-Asis, Romel Percy Melgarejo Bolivar, Leonid Alemán Gonzales, Sushovan Chaudhury, Ramgopal Kashyap, Walaa F. Alsanie, G. K. Viju, "A Lightweight Hybrid Dilated Ghost Model-Based Approach for the Prognosis of Breast Cancer," Computational Intelligence and Neuroscience, vol. 2022, Article ID 9325452, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/9325452

    [8]    X. Wang, M. J. Carey, and V. J. Tsotras, "Subscribing to big data at scale," Distributed and Parallel Databases, vol. 40, no. 2-3, pp. 475–520, 2022.

    [9]    E. Guliyev, "Comparative Analysis of Multi-Model Databases," Univerzita Karlova, Prague, Czech Republic, 2022.

    [10] S. Bimonte, E. Gallinucci, P. Marcel, and S. Rizzi, "Data variety, come as you are in multi-model data warehouses," Information Systems, vol. 104, Article ID 101734, 2022.

    [11] J. Zhang, K. Zhou, G. Li et al., "CDBTune+: an efficient deep reinforcement learning-based automatic cloud database tuning system," The VLDB Journal, vol. 30, no. 6, pp. 959–987, 2021.

    [12] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [13] Mustafa Tanriverdi, A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain, Journal of Cybersecurity and Information Management, Vol. 4 , No. 2 : Special No.-RIDAPPH , (2020) : 31-37 (Doi   :  https://doi.org/10.54216/JCIM.040203)

    [14] Parth Rustagi , Rohit Sroa , Priyanshu Sinha , Ashish Sharma4 , Sandeep Tayal, HomeTec Software for Security Aspects of Smart Home Devices Based on IoT, Journal of Cybersecurity and Information Management, Vol. 5 , No. 1 , (2021) : 5-16 (Doi   :  https://doi.org/10.54216/JCIM.050101)

    [15] F. Ye, Y. Li, X. Wang, N. Nedjah, P. Zhang, and H. Shi, "Parameters tuning of multi-model database based on deep reinforcement learning," Journal of Intelligent Information Systems, pp. 1–24, 2022.

    [16] N. Zaniewicz and A. Salamończyk, "Comparison of MongoDB, Neo4j and ArangoDB databases using the developed data generator for NoSQL databases," Studia Informatica. System and information technology, vol. 26, no. 1, pp. 61–72, 2022.

    [17] S. Mydhili, S. Periyanayagi, S. Baskar, P. M. Shakeel, and P. Hariharan, "Retracted article: machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things," Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 2023–2035, 2020.

    [18] Kanika Sharma , Achyut Shankar , Prabhishek Singh, Information Security Assessment in Big Data Environment using Fuzzy Logic, Journal of Cybersecurity and Information Management, Vol. 5 , No. 1 , (2021) : 29-42 (Doi   :  https://doi.org/10.54216/JCIM.050103)

    [19] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [20] R. Wu and E. Keogh, "Current time series anomaly detection benchmarks are flawed and are creating the illusion of progress," IEEE Transactions on Knowledge and Data Engineering, vol. 35, p. 1

    Cite This Article As :
    S., Shyam. , Kumar, Pankaj. , Shrivastava, Rajeev. , Jena, Satyabrata. , Kumar, Tushar. , Nigam, Ankita. Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 191-198. DOI: https://doi.org/10.54216/JCIM.130215
    S., S. Kumar, P. Shrivastava, R. Jena, S. Kumar, T. Nigam, A. (2024). Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management. Journal of Cybersecurity and Information Management, (), 191-198. DOI: https://doi.org/10.54216/JCIM.130215
    S., Shyam. Kumar, Pankaj. Shrivastava, Rajeev. Jena, Satyabrata. Kumar, Tushar. Nigam, Ankita. Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management. Journal of Cybersecurity and Information Management , no. (2024): 191-198. DOI: https://doi.org/10.54216/JCIM.130215
    S., S. , Kumar, P. , Shrivastava, R. , Jena, S. , Kumar, T. , Nigam, A. (2024) . Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management. Journal of Cybersecurity and Information Management , () , 191-198 . DOI: https://doi.org/10.54216/JCIM.130215
    S. S. , Kumar P. , Shrivastava R. , Jena S. , Kumar T. , Nigam A. [2024]. Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management. Journal of Cybersecurity and Information Management. (): 191-198. DOI: https://doi.org/10.54216/JCIM.130215
    S., S. Kumar, P. Shrivastava, R. Jena, S. Kumar, T. Nigam, A. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management," Journal of Cybersecurity and Information Management, vol. , no. , pp. 191-198, 2024. DOI: https://doi.org/10.54216/JCIM.130215