Database-as-a-Service (DBaaS) in Cloud Computing: Security Issues and Policies

Authors

  • Mohamed Buhary Fathima Sanjeetha South Eastern University of Sri Lanka
  • Prasanna Sumathipala Sri Lanka Institute of Information Technology
  • Manamalage Sandali Miurusari Siriwardane Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  • Rajakarunalage Jayani Prabhashini Kumari Rajakaruna Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

DOI:

https://doi.org/10.70112/ajcst-2025.14.1.4322

Keywords:

Database-as-a-Service (DBaaS), Security Challenges, Data Breaches, Encryption Techniques, Multi-Tenant Platforms

Abstract

The growing adoption of Database-as-a-Service (DBaaS) has revolutionized data management by offering scalability, cost-efficiency, and adaptability, particularly for multi-tenant platforms. However, significant security challenges remain unresolved. This study aims to identify and analyze the security concerns associated with DBaaS and propose effective policies and techniques to mitigate these risks. A systematic review of the literature and an evaluation of real-world implementations were conducted to investigate common security vulnerabilities and potential remedies. The research highlights key security threats, including data breaches, malicious insider activities, and inadequate access controls. It also underscores best practices, such as multi-layered security strategies and encryption techniques, to address these challenges. This study provides a framework for DBaaS providers and users to enhance the security and reliability of cloud databases by addressing critical security issues.

References

[1] M. N. Al-Refai, A. Haya, H. Fawareh, and H. H. Khafajeh, “Database as a Service (DBaaS) Challenges and Solutions,” in Proc. 22nd Int. Arab Conf. Inf. Technol. (ACIT), Muscat, Oman, 2021, pp. 1-6, doi: 10.1109/ACIT53391.2021.9677127.

[2] K. K. Hingwe and S. M. S. Bhanu, “Sensitive Data Protection of DBaaS Using OPE and FPE,” in Proc. 4th Int. Conf. Emerg. Appl. Inf. Technol., Kolkata, India, 2014, pp. 320-327.

[3] I. Astrova, A. Koschel, C. Eickemeyer, J. Kersten, and N. Offel, “DBaaS comparison: Amazon vs. Microsoft,” in Proc. Int. Conf. Inf. Soc. (i-Society), Dublin, Ireland, 2017, pp. 15-21.

[4] Gartner, “Top security and risk management trends for 2021,” 2021. [Online]. Available: https://www.gartner.com/smarterwithgartner/top-security-and-risk-management-trends-for-2021

[5] W. Shehri, “Cloud Database Sheri as a Service,” Int. J. Database Manag. Syst., vol. 5, no. 2, pp. 1-12, 2013.

[6] F. Mehak, R. Masood, Y. Ghazi, and M. A. Shibli, “Security aspects of database-as-a-service (DBaaS) in cloud computing,” in Proc. 11th Int. Bhurban Conf. Appl. Sci. Technol. (IBCAST), Islamabad, Pakistan, 2014, pp. 23-28.

[7] E. Ferrari, “Database as a Service: Challenges and solutions for privacy and security,” in Proc. 1st Int. Conf. Cloud Comput. (CLOUD’09), Beijing, China, 2009, pp. 517-520.

[8] Y. Januzaj, J. Ajdari, and B. Selimi, “DBMS as a Cloud service: Advantages and disadvantages,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 225-230, 2017.

[9] X. Zheng, “Database as a service-current issues and its future,” J. Softw. Eng. Appl., vol. 5, no. 11, pp. 1079-1086, 2012.

[10] J. Weis and J. Alves-Foss, “Securing database as a service: Issues and compromises,” J. Comput. Sci. Coll., vol. 28, no. 6, pp. 72-78, 2012.

[11] K. Munir, “Security model for cloud database as a service (DBaaS),” J. Inf. Secur., vol. 6, no. 1, pp. 13-20, 2015.

[12] A. Behl, “Emerging Security Challenges in Cloud Computing-An insight to Cloud security challenges and their mitigation,” in Proc. World Congr. Inf. Commun. Technol. (WICT), Mumbai, India, 2011, pp. 217-222.

[13] A. Kumar, H. Lee, and R. P. Singh, “Efficient and Secure Cloud Storage for Handling Big Data,” in Proc. 6th Int. Conf. New Trends Inf. Sci. Serv. Sci. Data Min. (ISSDM), Seoul, South Korea, 2012, pp. 162-166.

[14] M. Rassam, A. Alfarhan, and R. Alhussain, “Cloud Database Security Issues and Challenges: A Review,” J. Innov. Inf. Commun. Technol., vol. 1, no. 1, pp. 21-31, Nov. 2021.

[15] K. Munir, “Security model for mobile cloud database as a service (DBaaS),” in Cloud Security: Concepts, Methodologies, Tools, and Applications, IGI Global, 2019, pp. 760-769.

[16] M. S. Cholke and S. B. Natikar, “New Secure Concurrency Management Approach for Distributed and Concurrent Access of Encrypted Cloud Databases Using DBaaS,” Int. J. Innov. Eng. Res. Technol., vol. 1, pp. 1-4, 2019.

[17] S. Bauskar, “Navigating Database Security in Cloud Computing: Challenges and Solutions,” Int. J. Comput. Appl., vol. 975, pp. 88-87, 2019.

[18] S. Banothu, G. Janardhan, G. Sirisha, S. Shepuri, M. Karnam, and B. Allam, “A Secure Data Storage Approach for Online Examination Platform using Cloud DBaaS Service,” Scalable Comput. Pract. Exp., vol. 25, no. 5, pp. 3715-3724, Aug. 2024.

[19] M. Battula, “A Systematic Review on a Multi-tenant Database Management System in Cloud Computing,” in Proc. Int. Conf. Cogn. Robot. Intell. Syst. (ICC-ROBINS), Sydney, Australia, 2024, pp. 890-897.

[20] H. Liu, R. Li, Z. Zhang, and B. Tang, “Tao: Improving Resource Utilization while Guaranteeing SLO in Multi-tenant Relational Database-as-a-Service,” Proc. ACM Manag. Data, vol. 2, no. 4, pp. 1-26, Sep. 2024.

[21] E. M. Shiriaev, A. S. Nazarov, N. N. Kucherov, and M. G. Babenko, “Analytical review of confidential artificial intelligence: Methods and algorithms for deployment in cloud computing,” Program. Comput. Softw., vol. 50, no. 4, pp. 304-314, Aug. 2024.

[22] D. E. Wolf, L. Louw, and D. Palm, “An analysis of blockchain versus relational databases for digitalising information flows in global supply chains using the analytic network process,” Int. J. Prod. Res., vol. 62, no. 14, pp. 5016-5035, Jul. 2024.

[23] S. C. Misra and K. Doneria, “Application of cloud computing in financial services: An agent-oriented modelling approach,” J. Model. Manag., vol. 13, no. 4, pp. 994-1006, Nov. 2018.

[24] E. A. Shammar and A. T. Zahary, “The Internet of Things (IoT): A survey of techniques, operating systems, and trends,” Library Hi Tech, vol. 38, no. 1, pp. 5-66, Apr. 2020.

[25] H. Alabool, A. Kamil, N. Arshad, and D. Alarabiat, “Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review,” J. Syst. Softw., vol. 139, pp. 161-188, May 2018.

[26] P. Elango, K. Kuppusamy, and N. Prabhu, “Data Replication Using Data Mining Techniques,” Asian Journal of Computer Science and Technology, vol. 8, no. S1, pp. 107-109, Feb. 2019.

[27] S. De and J. Mishra, “A New Approach of Functional Dependency in a Neutrosophic Relational Database Model,” Asian Journal of Computer Science and Technology, vol. 8, no. 2, pp. 44-48, Apr. 2019.

[28] S. Mamatha and T. Sudha, “A Survey on Big Data Analytics Using HADOOP,” Asian Journal of Computer Science and Technology, vol. 8, no. S3, pp. 35-40, Apr. 2019.

[29] B. Kotte and T. S. Madhuri, “Providing Security to Ensure Biometric Identification System in Cloud,” Asian Journal of Computer Science and Technology, vol. 8, no. 3, pp. 1-5, Jul. 2019.

[30] G. Thangarasu, P. Dominic, M. C. Johnwiselin, and S. P. P. Kumar, “Fashions in Data Mining and Hidden Knowledge Innovation from Clinical Database,” Asian Journal of Computer Science and Technology, vol. 1, no. 2, pp. 36-39, Nov. 2012.

Downloads

Published

27-02-2025

How to Cite

Fathima Sanjeetha, M. B., Sumathipala, . P. ., Miurusari Siriwardane, M. S., & Prabhashini Kumari Rajakaruna, R. J. (2025). Database-as-a-Service (DBaaS) in Cloud Computing: Security Issues and Policies. Asian Journal of Computer Science and Technology , 14(1), 15–19. https://doi.org/10.70112/ajcst-2025.14.1.4322

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.