Enhancing Data Warehouses Security

被引:0
|
作者
Alkhubouli, Muhanad A. [1 ]
Lala, Hany M. [1 ]
AlHabshy, AbdAllah A. [1 ]
ElDahshan, Kamal A. [1 ]
机构
[1] Al Azhar Univ, Fac Sci, Dept Math, Cairo, Egypt
关键词
Data warehouse; data security; encryption; security issues; data integrity; privacy; confidentiality; DECISION-SUPPORT-SYSTEM;
D O I
10.14569/IJACSA.2024.0150358
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data Warehouses (DWs) are essential for enterprises, containing valuable business information and thus becoming prime targets for internal and external attacks. Data warehouses are crucial assets for organizations, serving critical purposes in business and decision-making. They consolidate data from diverse sources, making it easier for organizations to analyze and derive insights from their data. However, as data is moved from one source to another, security issues arise. Unfortunately, current data security solutions often fail in DW environments due to resource-intensive processes, increased query response times, and frequent false positive alarms. The structure of the data warehouse is designed to facilitate efficient analysis. Developing and deploying a data warehouse is a difficult process and its security is an even greater concern. This study provides a comprehensive review of existing data security methods, emphasizing their implementation challenges in DW environments. Our analysis highlights the limitations of these solutions, particularly in meeting scalability and performance needs. We conclude that current methods are impractical for DW systems and support for a comprehensive solution tailored to their specific requirements. Our findings underscore the ongoing significance of data warehouse security in industrial projects, necessitating further research to address remaining challenges and unanswered questions.
引用
收藏
页码:574 / 580
页数:7
相关论文
共 50 条
  • [1] Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses
    Santos, Ricardo Jorge
    Bernardino, Jorge
    Vieira, Marco
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 242 - 249
  • [2] Evaluation of Approaches for Modeling of Security in Data Warehouses
    Khajaria, Krishna
    Kumar, Manoj
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 9 - 18
  • [3] Security administration for federations, warehouses, and other derived data
    Rosenthal, A
    Sciore, E
    Doshi, V
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 209 - 223
  • [4] A UML 2.0 profile to define security requirements for Data Warehouses
    Trujillo, Juan
    Soler, Emilio
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 969 - 983
  • [5] SEMANTICALLY ENHANCING MULTIMEDIA DATA WAREHOUSES Using Ontologies as Part of the Metadata
    Vanea, Andrei
    Potolea, Rodica
    ICEIS 2011: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1, 2011, : 163 - 168
  • [6] Security Concerns in Data Warehouses: Implementation and Analysis of Virtual Private Database
    Tripathi, Vikas
    Agarwal, Ritik
    Pandey, Priyank
    Kumar, S. P. Ajith
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 117 - 120
  • [7] Towards comprehensive requirement analysis for data warehouses:: Considering security requirements
    Soler, Emilio
    Stefanov, Veronika
    Mazon, Jose-Norberto
    Trujillo, Juan
    Fernandez-Medina, Eduardo
    Piattini, Mario
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 104 - +
  • [8] SECURITY MEASURES IN OFFICES AND WAREHOUSES
    KOHLER, H
    ELEKTROTECHNISCHE ZEITSCHRIFT-ETZ, 1979, 100 (04): : 177 - 177
  • [9] Enhancing biometric Data Security by Design
    Strobl, Bernhard
    Natali, Margherita
    ERCIM NEWS, 2022, (131): : 25 - 26
  • [10] Enhancing Security of Stored Biometric Data
    Lakhera, Manmohan
    2014 INNOVATIVE APPLICATIONS OF COMPUTATIONAL INTELLIGENCE ON POWER, ENERGY AND CONTROLS WITH THEIR IMPACT ON HUMANITY (CIPECH), 2014, : 515 - 518