JSON']JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database

被引:0
|
作者
Zhang, Lei [1 ,2 ]
Pang, Ke [2 ]
Xu, Jiangtao [1 ]
Niu, Bingxin [3 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin 300072, Peoples R China
[2] Tianjin Sino German Univ Appl Sci, Sch Software & Commun, Tianjin 300350, Peoples R China
[3] Hebei Univ Technol, Sch Artificial Intelligence, Hebei 300401, Peoples R China
关键词
Simultaneous control; Data conversion; Hybrid cloud database; Native [!text type='JSON']JSON[!/text; NoSQL; RDBMS;
D O I
10.1186/s13677-022-00302-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A data interaction transformation model, XYJSON, that is suitable for all data using current standard SQL syntax and JSON document data is proposed to solve the problem of increasing development workload and difficulty caused by using different control methods for corresponding types of databases under the cloud hybrid storage. A control program was studied to control relational and NoSQL data at the same time, by establishing a general conversion model between relational and NoSQL data and converting standard SQL statements into JSON. The performance of XYJSON was compared with that of the traditional mode. The results show that the performance difference between XYJSON and the traditional mode is small. In addition, a developer survey was conducted on XYJSON for user friendliness and compatibility. All developers rated XYJSON as excellent. The current cloud hybrid storage cannot use a unified control model to realize data control. XYJSON breaks through this bottleneck, making it easier and more efficient to control different types of databases under cloud hybrid storage.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A Provenance-Based Access Control Model for Securely Storing Data in Cloud
    Mirajkar, Shweta Balasaheb
    Khatawkar, S. D.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 906 - 909
  • [32] Context Aware Based Access Control Model in Cloud Data Center Environment
    Byun, Yun Sang
    Kwak, Jin
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 515 - 524
  • [33] A Hybrid Approach to Semi-Automatic Conversion of 3D Point Cloud Data to Building Information Model
    Jiang, Jianan
    Shen, Xuesong
    Shi, Jianyong
    Jiang, Ziang
    CONSTRUCTION RESEARCH CONGRESS 2020: INFRASTRUCTURE SYSTEMS AND SUSTAINABILITY, 2020, : 408 - 417
  • [34] An Extended CP-ABE based Access Control Model for Data Outsourced in the Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 73 - 78
  • [35] A Rockburst Proneness Evaluation Method Based on Multidimensional Cloud Model Improved by Control Variable Method and Rockburst Database
    Wang, Jiong
    Liu, Peng
    Ma, Lei
    He, Manchao
    LITHOSPHERE, 2022, 2021 (Special Issue 4)
  • [36] Trust based access control with hybrid cryptographic algorithm based data security on cloud for e-learning application
    Dinesh, E.
    Sivakumar, M.
    Rajalakshmi, R.
    Sivakumar, P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (05) : 7563 - 7573
  • [37] Control Strategy for Buck DC/DC Converter Based on Two-dimensional Hybrid Cloud Model
    Wang, Qing-Yu
    Gong, Ren-Xi
    Qin, Li-Wen
    Feng, Zhao-He
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2016, 11 (06) : 1684 - 1692
  • [38] An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud
    Alharbe, Nawaf
    Aljohani, Abeer
    Rakrouki, Mohamed Ali
    Khayyat, Mashael
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [39] A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
    Khatiwada, Pankaj
    Bhusal, Hari
    Chatterjee, Ayan
    Gerdes, Martin W.
    2020 16TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2020,
  • [40] Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System
    Wen-Min Li
    Xue-Lei Li
    Qiao-Yan Wen
    Shuo Zhang
    Hua Zhang
    Journal of Computer Science and Technology, 2017, 32 : 974 - 990