Research Article

Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture

by  Suhair Amer, Ankita Maharajan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 50
Published: October 2025
Authors: Suhair Amer, Ankita Maharajan
10.5120/ijca2025925875
PDF

Suhair Amer, Ankita Maharajan . Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture. International Journal of Computer Applications. 187, 50 (October 2025), 59-66. DOI=10.5120/ijca2025925875

                        @article{ 10.5120/ijca2025925875,
                        author  = { Suhair Amer,Ankita Maharajan },
                        title   = { Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture },
                        journal = { International Journal of Computer Applications },
                        year    = { 2025 },
                        volume  = { 187 },
                        number  = { 50 },
                        pages   = { 59-66 },
                        doi     = { 10.5120/ijca2025925875 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Suhair Amer
                        %A Ankita Maharajan
                        %T Evaluating the Performance, Scalability, and Flexibility of Diverse Database Architecture%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 50
                        %P 59-66
                        %R 10.5120/ijca2025925875
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a comparative analysis of eleven database systems, including MySQL, NoSQL, Oracle, PostgreSQL, Teradata, and others, examining their performance, scalability, flexibility, and cost-effectiveness. The study categorizes the systems into relational, non-relational, and hybrid models to evaluate their suitability for modern data-driven applications. Findings reveal that Oracle and Teradata provide exceptional performance for large enterprise workloads, while PostgreSQL offers a balanced combination of reliability, adaptability, and open-source accessibility. NoSQL systems demonstrate strong scalability and flexibility for handling unstructured and large-scale data, whereas legacy platforms like Supra PDM and Versant maintain specialized roles in specific domains. Overall, the analysis emphasizes that effective database selection depends on aligning system capabilities with application requirements, data complexity, and organizational scale.

References
  • MySQL. (n.d., para 1). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/MySQL
  • Giacomo, M. D. (2005). MySQL: Lessons learned on a digital library. IEEE Software, 22(3), 10-13. Retreived from: doi:http://library.semo.edu:2275/10.1109/MS.2005.71
  • MySQL. In MySQL. Retrieved from https://dev.mysql.com/doc/mysql-security-excerpt/5.7/en/security-guidelines.html
  • George, B., & Valeva, A. (2006). A database security course on a shoestring. Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education - SIGCSE 06. doi: 10.1145/1121341.1121347
  • Tomic, S. T., & Janata, P. (2007). Ensemble: A web-based system for psychology survey and experiment management. Behavior Research Methods, 39(3), 635-50. Retrieved from https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/204303959?accountid=38003
  • Michael “Monty” Widenius, and David Axmark. MySQL Reference Manual : Documentation from the Source. Sebastopol, Or̀eilly & Assciates, 2002.
  • NoSQL. (n.d., para1, para2, para3). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/NoSQL#cite_note-6
  • Leonardo Aniello, Silvia Bonomi, Marta Breno, and Roberto Baldoni. 2013. Assessing data availability of Cassandra in the presence of non-accurate membership. In Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing (DISCCO '13). Association for Computing Machinery, New York, NY, USA, Article 2, 1–6. https://doi.org/10.1145/2506155.2506157
  • Lane, A. (2012, February 6). A Response To NoSQL Security Concerns. Retrieved from https://www.darkreading.com/application-security/database-security/a-response-to-nosql-security-concerns/d/d-id/1137044.
  • Monger, M. D., Mata-Toledo, R., & Gupta, P. (2012). TEMPORAL DATA MANAGEMENT IN NOSQL DATABASES. Journal of Information Systems & Operations Management, 6(2), 1-7. Retrieved from https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/1346772131?accountid=38003
  • L. Okman, N. Gal-Oz, Y. Gonen, E. Gudes and J. Abramov, "Security Issues in NoSQL Databases," 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, 2011, pp. 541-547.
  • Oracle Database. (2019). Retrieved from https://www.oracle.com/database/
  • Oracle Database Security. (2019). Retrieved from https://www.oracle.com/database/security/
  • Oracle Advanced Security Transparent Data Encryption. (2018, March). Retrieved from https://www.oracle.com/technetwork/database/options/advanced-security/overview/advanced-security-tde-faq-2995212.pdf
  • Advanced Security. (2019). Retrieved from https://www.oracle.com/database/technologies/security/advanced-security.html
  • Oracle Key Vault. (2019). Retrieved from https://www.oracle.com/a/tech/docs/dbsec/okv/faq-security-key-vault-2019-05-01.pdf
  • Database Auditing. (2019). Retrieved from https://www.oracle.com/database/technologies/security/db-auditing.html
  • Audit Vault and Database Firewall. (2019). Retrieved from https://www.oracle.com/database/technologies/security/audit-vault-firewall.html
  • Real Application Security and Virtual Private Database. (2019). Retrieved from https://www.oracle.com/database/technologies/security/virtual-private-db.html
  • Docs.oracle.com. (2019). Introduction to Oracle Database. [online] Retreived from: https://docs.oracle.com/cd/E11882_01/server.112/e40540/intro.htm#CNCPT965
  • Shaul, J., & Ingram, A. (2007). Practical Oracle Security : Your Unauthorized Guide to Relational Database Security. Rockland, MA: Syngress. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=e000xna&AN=227541&site=ehost-live
  • Krebsonsecurity.com. (2019). Data Breach at Oracle’s MICROS Point-of-Sale Division — Krebs on Security. Retreived from: https://krebsonsecurity.com/2016/08/data-s breach-at-oracles-micros-point-of-sale-division/
  • PointBase Database Server. (n.d.). Retrieved from http://books.gigatux.nl/mirror/beaweblogic8.1/0672324873_ch10lev1sec2.html
  • SQL Security and Privileges. (n.d.). Retrieved from http://www.cs.toronto.edu/~nn/csc309-20085/guide/pointbase/docs/html/htmlfiles/authorizationFIN.html
  • PointBase System Guide. (2004). Retrieved, from https://docs.oracle.com/cd/E19253-01/817-7465/817-7465.pdf
  • Artiges, M., & Marin, J. (2004). Bea WebLogic server 8.1 unleashed. Indianapolis, IN: Sams.
  • About: What is PostgreSQL. (2019). Retrieved from https://www.postgresql.org/about/
  • Preventing Server Spoofing. (2019). Retrieved from https://www.postgresql.org/docs/12/preventing-server-spoofing.html
  • Encryption Options. (2019). Retrieved from https://www.postgresql.org/docs/12/encryption-options.html
  • Momjian, B. (2001). PostgreSQL: introduction and concepts. Boston: Addison-Wesley.
  • Li, Y., Ma, L., Shen, L., Lv, J., & Zhang, P. (2019). Open source software security vulnerability detection based on dynamic behavior features. PLoS ONE, 14(8), 1–14. Retreived from https://doi.org/10.1371/journal.pone.0221530
  • Quadbase. (n.d.). Retrieved from https://www.quadbase.com/espressreport-es-description/.
  • Quadbase. (n.d.). About Us. Retrieved from https://www.quadbase.com/about-us/.
  • Mage, S. (1989, August 28). Quadbase Introduces DBMS Quadbase-SQL. InfoWorld, 19–19.
  • Fernandez, P. (n.d.). Red Brick Warehouse. Retrieved from https://www.semanticscholar.org/paper/Red-Brick-Warehouse:-A-Read-Mostly-RDBMS-for-Open-Fernandez/943051a9caded9b0aa5ae17840ddd8ffc5ddfac6.
  • Bristow, Paul. “Database DoS.” Juniper Networks, 29 Jan. 2014, Retreived from: https://forums.juniper.net/t5/Security/Database-DoS-Part-3-Countermeasures-to-Help-Reduce-the-Impact-of/ba-p/227315.
  • Informatica. (n.d.). Data Warehouse: What It Is, Meaning & Definition. Retrieved from http://www.informatica.com/services-and-training/glossary-of-terms/data-warehousing-definition.html.
  • Fernandez, P.M. (1994). Red Brick Warehouse: A Read-Mostly RDBMS for Open SMP Platforms. SIGMOD Conference.
  • IBM. (2004, April 13). IBM Red Brick Warehouse Server V6.30 enhances query performance, improves ease of use, and delivers new platform support. Retrieved from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&infotype=an&appname=iSource&supplier=897&letternum=ENUS204-064.
  • Garside, W. (2000, March 9). Case Study: Redbrick database analysis. Retrieved from https://www.computerweekly.com/feature/Case-Study-Redbrick-database-analysis.
  • SUPRA Server PDM for the Mainframe. (n.d.). Retrieved from https://www.cincom.com/pdf/DB041026-1.pdf.
  • Cincom. (2013). Cincom SUPRA PDM for UNIX and Linux. Cincom SUPRA PDM for UNIX and Linux. Cincinnati, OH: Cincom.
  • Perficient. (2015, June 23). NoSQL NoSecurity - Security issues with NoSQL Database. Retrieved from https://blogs.perficient.com/2015/06/22/nosql-nosecuity-security-issues-with-nosql-database/.
  • Williams, B. (2018, July 20). Securing Teradata Database. Retrieved from https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/july/securing-teradata-database/.
  • Jim Browning and Adriaan Veldhuisen . Security Features in Teradata Database. Retrieved from https://www.teradataemea.com/campaign/pdf/EB1895.pdf
  • Rocket UniData. (n.d.). Retrieved from https://www.rocketsoftware.com/products/rocket-unidata-0/rocket-unidata
  • Versant Object Database. (2019). Retrieved from https://supportservices.actian.com/versant/vod
  • There is a vulnerability issue in the Versant Database (Version 7.0.1.3) which allows unauthorized access to the CaliberRM Server via the versant_d service. Retrieved from https://community.microfocus.com/t5/Caliber-Knowledge-Base/There-is-a-vulnerability-issue-in-the-Versant-Database-Version-7/ta-p/1749280
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

DBMS security Relational Databases SQL NoSQL

Powered by PhDFocusTM