[1] | Aleem, S., Capretz, L. F., and Ahmed, F., “Security Issues in Data Warehouse,” Recent Advances in Information Technology, pp. 15-20, Canada 2015. |
|
[2] | Konda, S. and More, R., “Augmenting Data Warehouse Security Techniques - A Selective Survey,” International Research Journal of Engineering and Technology (IRJET), Volume 02, Issue 03, pp. 2209- 2213, June 2015. |
|
[3] | Reddy, M.S., Reddy, M.R., Viswanath, R., Chalam, G.V., Laxmi, R. and Rizwan, Md.A., “A Schematic Technique Using Data type Preserving Encryption to Boost Data Warehouse Security,” International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 1, pp. 460-465, January 2011. |
|
[4] | Ge, T. and Zdonik, S., “Fast, Secure Encryption for Indexing in a Column-Oriented DBMS,” Proceedings of the 23rd International Conference on Data Engineering (ICDE), Istanbul, pp. 676-685 IEEE, May 2007. |
|
[5] | Deshmuk, A. and Qureshi, R., “Transparent Data Encryption- Solution for Security of Database Contents,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 2, No.3, pp. 25-28, March 2011. |
|
[6] | Attasena, V., Harbi, N., and Darmont, J., “A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud,” International Journal of Data Warehousing and Mining (IJDWM), Vol. 11, No. 2, pp. 22-43, 2015. |
|
[7] | Santos, R. J., Rasteiro, D., Bernardino, J. and Vieira, M., “A Specific Encryption Solution for Data Warehouses,” Proceedings of International Conference on Database Systems for Advanced Applications. Springer Berlin Heidelberg, pp. 84-98, April 2013. |
|
[8] | Santos, R. J., Bernardino, J., and Vieira, M., “A data masking Technique for Data Warehouses,” Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS'11), ACM, pp. 61-69, 21-27 September, 2011. |
|
[9] | Chowdhury, R., Chatterjee, P., Mitra, P. and Roy, O., “Design and Implementation of Security Mechanism for Data Warehouse Performance Enhancement Using Two Tier User Authentication Techniques,” International Journal of Innovative Research in Science, Engineering and Technology, Volume3, Special Issue 6, pp. 165-172, February 2014. |
|
[10] | Preeti and Khatka, K., “Enchancing Data Security And Privacy On WebOS Using TSFS,” International Journal of Computer Engineering And Electronics Technology (IJCEET), Vol. 1, Issue 1, pp. 1-5, 2015. |
|
[11] | Santos, R.J., Bernardino, J. and Vieira, M., “Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses,” Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, DOI 10.1109/TrustCom.2011.33, pp. 242-249, IEEE, 16-18 November 2011. |
|
[12] | Federal Information Processing Standards Publication FIPS 197, “Advanced Encryption Standard (AES),” pp. 13-26, November 2001. |
|
[13] | Stallings, W., “Cryptography and network Security Principles and Practice,” Sixth Edition, Pearson Education, Inc, ISBN 13: 978-0-13-335469-0, pp. 287-291, 2014. |
|
[14] | Federal Information Processing Standards Publication FIPS 180-4 , “Secure Hash Standard (SHS) ,” pp.3-20, March 2012. |
|
[15] | Bhanot R, Hans, R., “A Review and Comparative Analysis of Various Encryption Algorithms,” International Journal of Security and Its Applications Vol. 9, No. 4, pp. 289-306, 2015. |
|
[16] | Kak, A., “Lecture 12: Public-Key Cryptography and the RSA Algorithm,” Lecture Notes on “Computer and Network Security, Purdue University, pp. 3-7, April 2015. |
|
[17] | Oracle Corporation, “Oracle Database Administrator’s Guide-10g Release 2 (10.2),” B14231-02, p. 155, May 2006. |
|
[18] | Suleman, M.A., Qureshi, M.K., Khubaib and Patt, Y. N., “Feedback-Directed Pipeline Parallelism,” Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques (PACT’10), Vienna, Austria, Copyright ACM 978-1-4503-0178-7/10/09, pp. 147-156, September 2010. |
|
[19] | Bhatnagar, R. and Patel, J., “An Empirical Study of Security Issues in Grid Middleware,” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 1, pp. 470-474, January 2014. |
|
[20] | Luther, A., Buyya, R., Ranjan, R. and Venugopal, S., “Alchemi: A .NET-based Enterprise Grid Computing System,” Internet Computing, cloudbus.cis.unimelb.edu.au, pp. 5-9, 2005. |
|