Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2017, 5(1), 17-24
DOI: 10.12691/jcsa-5-1-3
Open AccessArticle

Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses

Mayada J. AlMeghari1,

1Information Systems Department, Faculty of Computers & Information, Cairo University, Cairo, Egypt

Pub. Date: April 17, 2017

Cite this paper:
Mayada J. AlMeghari. Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses. Journal of Computer Sciences and Applications. 2017; 5(1):17-24. doi: 10.12691/jcsa-5-1-3

Abstract

Today, with the increase in the number of business web application users, the data size is obviously getting quiet huge. This data is composed together from integrated heterogeneous data sources to form Data Warehouse (DW). DW consists of critical and sensitive data used in many intelligent business models for decision support processes. Therefore, retaining data security for DW systems is a very important issue for researchers; also, it is the first priority for organizations. The current paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS). The DWS framework ensures the security issues, which are Confidentiality, Integrity and Availability (CIA). In fact, this approach solves the security problems such as network overhead and data changing that occurs during transmission on Client-Server basis. The DWS approach achieves high performance by using parallel computing through a middleware named View Manager Layer (VML). Finally, this paper also presents the elastic architecture of the DWS framework with a vast applicability in multiple DW organizations depending on its network infrastructure.

Keywords:
security issues data warehouse data encryption data integrity data availability hash function middleware

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 8

References:

[1]  Aleem, S., Capretz, L. F., and Ahmed, F., “Security Issues in Data Warehouse,” Recent Advances in Information Technology, pp. 15-20, Canada 2015.
 
[2]  Konda, S. and More, R., “Augmenting Data Warehouse Security Techniques - A Selective Survey,” International Research Journal of Engineering and Technology (IRJET), Volume 02, Issue 03, pp. 2209- 2213, June 2015.
 
[3]  Reddy, M.S., Reddy, M.R., Viswanath, R., Chalam, G.V., Laxmi, R. and Rizwan, Md.A., “A Schematic Technique Using Data type Preserving Encryption to Boost Data Warehouse Security,” International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 1, pp. 460-465, January 2011.
 
[4]  Ge, T. and Zdonik, S., “Fast, Secure Encryption for Indexing in a Column-Oriented DBMS,” Proceedings of the 23rd International Conference on Data Engineering (ICDE), Istanbul, pp. 676-685 IEEE, May 2007.
 
[5]  Deshmuk, A. and Qureshi, R., “Transparent Data Encryption- Solution for Security of Database Contents,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 2, No.3, pp. 25-28, March 2011.
 
[6]  Attasena, V., Harbi, N., and Darmont, J., “A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud,” International Journal of Data Warehousing and Mining (IJDWM), Vol. 11, No. 2, pp. 22-43, 2015.
 
[7]  Santos, R. J., Rasteiro, D., Bernardino, J. and Vieira, M., “A Specific Encryption Solution for Data Warehouses,” Proceedings of International Conference on Database Systems for Advanced Applications. Springer Berlin Heidelberg, pp. 84-98, April 2013.
 
[8]  Santos, R. J., Bernardino, J., and Vieira, M., “A data masking Technique for Data Warehouses,” Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS'11), ACM, pp. 61-69, 21-27 September, 2011.‏
 
[9]  Chowdhury, R., Chatterjee, P., Mitra, P. and Roy, O., “Design and Implementation of Security Mechanism for Data Warehouse Performance Enhancement Using Two Tier User Authentication Techniques,” International Journal of Innovative Research in Science, Engineering and Technology, Volume3, Special Issue 6, pp. 165-172, February 2014.
 
[10]  Preeti and Khatka, K., “Enchancing Data Security And Privacy On WebOS Using TSFS,” International Journal of Computer Engineering And Electronics Technology (IJCEET), Vol. 1, Issue 1, pp. 1-5, 2015.
 
[11]  Santos, R.J., Bernardino, J. and Vieira, M., “Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses,” Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, DOI 10.1109/TrustCom.2011.33, pp. 242-249, IEEE, 16-18 November 2011.
 
[12]  Federal Information Processing Standards Publication FIPS 197, “Advanced Encryption Standard (AES),” pp. 13-26, November 2001.
 
[13]  Stallings, W., “Cryptography and network Security Principles and Practice,” Sixth Edition, Pearson Education, Inc, ISBN 13: 978-0-13-335469-0, pp. 287-291, 2014.
 
[14]  Federal Information Processing Standards Publication FIPS 180-4 , “Secure Hash Standard (SHS) ,” pp.3-20, March 2012.
 
[15]  Bhanot R, Hans, R., “A Review and Comparative Analysis of Various Encryption Algorithms,” International Journal of Security and Its Applications Vol. 9, No. 4, pp. 289-306, 2015.
 
[16]  Kak, A., “Lecture 12: Public-Key Cryptography and the RSA Algorithm,” Lecture Notes on “Computer and Network Security, Purdue University, pp. 3-7, April 2015.
 
[17]  Oracle Corporation, “Oracle Database Administrator’s Guide-10g Release 2 (10.2),” B14231-02, p. 155, May 2006.
 
[18]  Suleman, M.A., Qureshi, M.K., Khubaib and Patt, Y. N., “Feedback-Directed Pipeline Parallelism,” Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques (PACT’10), Vienna, Austria, Copyright ACM 978-1-4503-0178-7/10/09, pp. 147-156, September 2010.
 
[19]  Bhatnagar, R. and Patel, J., “An Empirical Study of Security Issues in Grid Middleware,” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 1, pp. 470-474, January 2014.
 
[20]  Luther, A., Buyya, R., Ranjan, R. and Venugopal, S., “Alchemi: A .NET-based Enterprise Grid Computing System,” Internet Computing, cloudbus.cis.unimelb.edu.au, pp. 5-9, 2005.