- Cyber Security Challenges and Opportunities in the Context of Pakistan - 2015-03-04
- Papers presented in ICOSST held at UET Lahore - 2014-12-18
- A Journal Paper Accepted in The computer Journal, Oxford Journals - 2014-12-08
- SpringerOpen journal Paper published - 2014-11-11
- NUST Intra Research Conference - 2014-11-08
Secure Unstructured Databases
Databases are at the core of successful business and are considered to be the most important aspect in the achievement and prosperity of companies. Most of the operations of large organizations completely dependent on the functioning, performance, efficiency and security of databases. Security and protection of databases cannot be neglected as companies heavily rely on data to support their daily operations. Many organizations are now concerned about the changing nature, complexity, and larger scale of outside and inside attacks that have far more damaging impact on businesses because the theft of customer data or corporate data, such as trade secrets, could result in billions of dollars of monetary loss, fines and lawsuits, and irreparable damage to an organization's reputation. Moreover, with the advancement in technology, horizontal scalability, distributed technology and efficiency now become primary concerns for various types of applications like Web 2.0, social networking, cloud based applications, mobile computing etc. Such applications are the reason why NoSQL and OO databases are now well on their way to being the next generation databases. But primary focuses of these databases are scalability and performance; migration of data to these database technologies will be hard pressed to ensure that right people are viewing the data. There is a need to address the security issues of unstructured databases in terms of confidentiality, authentication and authorization. Holistic solutions are needed to cultivate in the roots of unstructured databases that cover all security aspects in a comprehensive way.
Active researchers in this field are following: