Securing DynamoDB: In-Depth Exploration of Approaches, Overcoming Challenges, and Implementing Best Practices for Robust Data Protection

Authors

  • Rimsha Sajid Faculty of Computer Science and Information Technology, Superior University, Lahore, 54000, Pakistan.
  • Gohar Mumtaz Faculty of Computer Science and Information Technology, Superior University, Lahore, 54000, Pakistan.
  • Hijab Zehra Zaidi Department of Computer Science, University of Engineering and Technology (UET), Lahore, 54000, Pakistan.
  • Zeeshan Mubeen Riphah International University, Lahore, 54000, Pakistan.

Keywords:

DynamoDB Security, AWS Security, Encryption, Identity and Access Management (IAM), Access Control Policies, Authentication, Fined- Grained Access

Abstract

Protecting data and system integrity is critical for any database, and especially critical for flexible, distributed systems like Dynamo. Dynamo is a highly flexible and distributed database system specifically created to cater to the requirements of contemporary web-scale applications. As with any database system, ensuring security is overriding to protect sensitive data and hold the integrity of the system. This paper explorer a range of methods for enhancing the security of DynamoDB, covering access control policies, encryption methods, auditing and monitoring systems, data integrity measures, and authentication mechanism.

Downloads

Published

2024-09-01

How to Cite

Rimsha Sajid, Gohar Mumtaz, Hijab Zehra Zaidi, & Zeeshan Mubeen. (2024). Securing DynamoDB: In-Depth Exploration of Approaches, Overcoming Challenges, and Implementing Best Practices for Robust Data Protection. Journal of Computing & Biomedical Informatics, 7(02). Retrieved from https://jcbi.org/index.php/Main/article/view/549