logo

Security of Firebase Database

   

Added on  2022-11-29

5 Pages1252 Words216 Views
Data Science and Big Data
 | 
 | 
 | 
Running head: SECURITY OF FIREBASE DATABASE
Security of Firebase Database
Name of the Student
Name of the University
Author Note
Security of Firebase Database_1

SECURITY OF FIREBASE DATABASE
1
Firebase Database Security:
The firebase database is a real-time database and it is hosted through NoSQL database
(Li et al. 2018). The main advantage is that let the users to sync and store the data of the users
on real-time basis.
Here mainly three types of security has been leveraged for the security of firebase
database. These three securities are the Authentication, Authorization and the Data
Validation. The process of authentication is used for identifying the users of this database and
it is the first step of proper database security (He et al. 2017). The authorization is used for
controlling the activity of the users within the database this mainly includes how they will
access their data. The data validation is used for making the data to stay consistent which is
very much important.
The firebase database uses some of the very much important rule to secure the
database perfectly. The four types of rule for securing the database are the “.read” rule,
“.write” rule, “.validate” rule and “.indexOn” rule. The .read rule is security rule and it
provides the access reading from the database to clients. The .write tool is also a security rule
and it provides the access for writing directly to the firebase real-time database (Alsalemi et
al. 2017). The .validate is a rule which is used for conforming that the data is has been
written to the database successfully. The .indexOn rule helps to improve performance of the
query.
The data that are presented in the firebase database is secured through the firebase
database rules which provides declarative configuration of the database (Moroney 2017).
This indicates that rules are demonstrated in the separated way from the logic of the product.
This provides the security in the sense that the clients will be not be able to enforce security
Security of Firebase Database_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Biometric Authentication: A Review
|7
|1404
|100

Data System Requirements for ABC Clothing Company
|4
|540
|350

Biometrics: Security and Privacy Implications
|8
|1780
|86

Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions
|11
|2518
|88

Assignment Privacy Policy of Company
|4
|837
|28

Encryption and Authentication
|8
|1423
|83