CFP last date
22 December 2025
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 22 December 2025

Submit your paper
Know more
Random Articles
Reseach Article

Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture

by Suhair Amer, Ankita Maharajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 50
Year of Publication: 2025
Authors: Suhair Amer, Ankita Maharajan
10.5120/ijca2025925875

Suhair Amer, Ankita Maharajan . Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture. International Journal of Computer Applications. 187, 50 ( Oct 2025), 59-66. DOI=10.5120/ijca2025925875

@article{ 10.5120/ijca2025925875,
author = { Suhair Amer, Ankita Maharajan },
title = { Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2025 },
volume = { 187 },
number = { 50 },
month = { Oct },
year = { 2025 },
issn = { 0975-8887 },
pages = { 59-66 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number50/evaluating-the-performance-scalability-and-flexibility-of-diverse-database-architecture/ },
doi = { 10.5120/ijca2025925875 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-10-23T00:18:35.951713+05:30
%A Suhair Amer
%A Ankita Maharajan
%T Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 50
%P 59-66
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a comparative analysis of eleven database systems, including MySQL, NoSQL, Oracle, PostgreSQL, Teradata, and others, examining their performance, scalability, flexibility, and cost-effectiveness. The study categorizes the systems into relational, non-relational, and hybrid models to evaluate their suitability for modern data-driven applications. Findings reveal that Oracle and Teradata provide exceptional performance for large enterprise workloads, while PostgreSQL offers a balanced combination of reliability, adaptability, and open-source accessibility. NoSQL systems demonstrate strong scalability and flexibility for handling unstructured and large-scale data, whereas legacy platforms like Supra PDM and Versant maintain specialized roles in specific domains. Overall, the analysis emphasizes that effective database selection depends on aligning system capabilities with application requirements, data complexity, and organizational scale.

References
  1. MySQL. (n.d., para 1). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/MySQL
  2. Giacomo, M. D. (2005). MySQL: Lessons learned on a digital library. IEEE Software, 22(3), 10-13. Retreived from: doi:http://library.semo.edu:2275/10.1109/MS.2005.71
  3. MySQL. In MySQL. Retrieved from https://dev.mysql.com/doc/mysql-security-excerpt/5.7/en/security-guidelines.html
  4. George, B., & Valeva, A. (2006). A database security course on a shoestring. Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education - SIGCSE 06. doi: 10.1145/1121341.1121347
  5. Tomic, S. T., & Janata, P. (2007). Ensemble: A web-based system for psychology survey and experiment management. Behavior Research Methods, 39(3), 635-50. Retrieved from https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/204303959?accountid=38003
  6. Michael “Monty” Widenius, and David Axmark. MySQL Reference Manual : Documentation from the Source. Sebastopol, Or̀eilly & Assciates, 2002.
  7. NoSQL. (n.d., para1, para2, para3). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/NoSQL#cite_note-6
  8. Leonardo Aniello, Silvia Bonomi, Marta Breno, and Roberto Baldoni. 2013. Assessing data availability of Cassandra in the presence of non-accurate membership. In Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing (DISCCO '13). Association for Computing Machinery, New York, NY, USA, Article 2, 1–6. https://doi.org/10.1145/2506155.2506157
  9. Lane, A. (2012, February 6). A Response To NoSQL Security Concerns. Retrieved from https://www.darkreading.com/application-security/database-security/a-response-to-nosql-security-concerns/d/d-id/1137044.
  10. Monger, M. D., Mata-Toledo, R., & Gupta, P. (2012). TEMPORAL DATA MANAGEMENT IN NOSQL DATABASES. Journal of Information Systems & Operations Management, 6(2), 1-7. Retrieved from https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/1346772131?accountid=38003
  11. L. Okman, N. Gal-Oz, Y. Gonen, E. Gudes and J. Abramov, "Security Issues in NoSQL Databases," 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, 2011, pp. 541-547.
  12. Oracle Database. (2019). Retrieved from https://www.oracle.com/database/
  13. Oracle Database Security. (2019). Retrieved from https://www.oracle.com/database/security/
  14. Oracle Advanced Security Transparent Data Encryption. (2018, March). Retrieved from https://www.oracle.com/technetwork/database/options/advanced-security/overview/advanced-security-tde-faq-2995212.pdf
  15. Advanced Security. (2019). Retrieved from https://www.oracle.com/database/technologies/security/advanced-security.html
  16. Oracle Key Vault. (2019). Retrieved from https://www.oracle.com/a/tech/docs/dbsec/okv/faq-security-key-vault-2019-05-01.pdf
  17. Database Auditing. (2019). Retrieved from https://www.oracle.com/database/technologies/security/db-auditing.html
  18. Audit Vault and Database Firewall. (2019). Retrieved from https://www.oracle.com/database/technologies/security/audit-vault-firewall.html
  19. Real Application Security and Virtual Private Database. (2019). Retrieved from https://www.oracle.com/database/technologies/security/virtual-private-db.html
  20. Docs.oracle.com. (2019). Introduction to Oracle Database. [online] Retreived from: https://docs.oracle.com/cd/E11882_01/server.112/e40540/intro.htm#CNCPT965
  21. Shaul, J., & Ingram, A. (2007). Practical Oracle Security : Your Unauthorized Guide to Relational Database Security. Rockland, MA: Syngress. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=e000xna&AN=227541&site=ehost-live
  22. Krebsonsecurity.com. (2019). Data Breach at Oracle’s MICROS Point-of-Sale Division — Krebs on Security. Retreived from: https://krebsonsecurity.com/2016/08/data-s breach-at-oracles-micros-point-of-sale-division/
  23. PointBase Database Server. (n.d.). Retrieved from http://books.gigatux.nl/mirror/beaweblogic8.1/0672324873_ch10lev1sec2.html
  24. SQL Security and Privileges. (n.d.). Retrieved from http://www.cs.toronto.edu/~nn/csc309-20085/guide/pointbase/docs/html/htmlfiles/authorizationFIN.html
  25. PointBase System Guide. (2004). Retrieved, from https://docs.oracle.com/cd/E19253-01/817-7465/817-7465.pdf
  26. Artiges, M., & Marin, J. (2004). Bea WebLogic server 8.1 unleashed. Indianapolis, IN: Sams.
  27. About: What is PostgreSQL. (2019). Retrieved from https://www.postgresql.org/about/
  28. Preventing Server Spoofing. (2019). Retrieved from https://www.postgresql.org/docs/12/preventing-server-spoofing.html
  29. Encryption Options. (2019). Retrieved from https://www.postgresql.org/docs/12/encryption-options.html
  30. Momjian, B. (2001). PostgreSQL: introduction and concepts. Boston: Addison-Wesley.
  31. Li, Y., Ma, L., Shen, L., Lv, J., & Zhang, P. (2019). Open source software security vulnerability detection based on dynamic behavior features. PLoS ONE, 14(8), 1–14. Retreived from https://doi.org/10.1371/journal.pone.0221530
  32. Quadbase. (n.d.). Retrieved from https://www.quadbase.com/espressreport-es-description/.
  33. Quadbase. (n.d.). About Us. Retrieved from https://www.quadbase.com/about-us/.
  34. Mage, S. (1989, August 28). Quadbase Introduces DBMS Quadbase-SQL. InfoWorld, 19–19.
  35. Fernandez, P. (n.d.). Red Brick Warehouse. Retrieved from https://www.semanticscholar.org/paper/Red-Brick-Warehouse:-A-Read-Mostly-RDBMS-for-Open-Fernandez/943051a9caded9b0aa5ae17840ddd8ffc5ddfac6.
  36. Bristow, Paul. “Database DoS.” Juniper Networks, 29 Jan. 2014, Retreived from: https://forums.juniper.net/t5/Security/Database-DoS-Part-3-Countermeasures-to-Help-Reduce-the-Impact-of/ba-p/227315.
  37. Informatica. (n.d.). Data Warehouse: What It Is, Meaning & Definition. Retrieved from http://www.informatica.com/services-and-training/glossary-of-terms/data-warehousing-definition.html.
  38. Fernandez, P.M. (1994). Red Brick Warehouse: A Read-Mostly RDBMS for Open SMP Platforms. SIGMOD Conference.
  39. IBM. (2004, April 13). IBM Red Brick Warehouse Server V6.30 enhances query performance, improves ease of use, and delivers new platform support. Retrieved from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&infotype=an&appname=iSource&supplier=897&letternum=ENUS204-064.
  40. Garside, W. (2000, March 9). Case Study: Redbrick database analysis. Retrieved from https://www.computerweekly.com/feature/Case-Study-Redbrick-database-analysis.
  41. SUPRA Server PDM for the Mainframe. (n.d.). Retrieved from https://www.cincom.com/pdf/DB041026-1.pdf.
  42. Cincom. (2013). Cincom SUPRA PDM for UNIX and Linux. Cincom SUPRA PDM for UNIX and Linux. Cincinnati, OH: Cincom.
  43. Perficient. (2015, June 23). NoSQL NoSecurity - Security issues with NoSQL Database. Retrieved from https://blogs.perficient.com/2015/06/22/nosql-nosecuity-security-issues-with-nosql-database/.
  44. Williams, B. (2018, July 20). Securing Teradata Database. Retrieved from https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/july/securing-teradata-database/.
  45. Jim Browning and Adriaan Veldhuisen . Security Features in Teradata Database. Retrieved from https://www.teradataemea.com/campaign/pdf/EB1895.pdf
  46. Rocket UniData. (n.d.). Retrieved from https://www.rocketsoftware.com/products/rocket-unidata-0/rocket-unidata
  47. Versant Object Database. (2019). Retrieved from https://supportservices.actian.com/versant/vod
  48. There is a vulnerability issue in the Versant Database (Version 7.0.1.3) which allows unauthorized access to the CaliberRM Server via the versant_d service. Retrieved from https://community.microfocus.com/t5/Caliber-Knowledge-Base/There-is-a-vulnerability-issue-in-the-Versant-Database-Version-7/ta-p/1749280
Index Terms

Computer Science
Information Sciences

Keywords

DBMS security Relational Databases SQL NoSQL