Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [21] An Adaptive Approach to Schema Classification for Data Warehouse Modeling
    Hong-Ding Wang
    Yun-Hai Tong
    Shao-Hua Tan
    Shi-Wei Tang
    Dong-Qing Yang
    Guo-Hui Sun
    Journal of Computer Science and Technology, 2007, 22 : 252 - 260
  • [22] Why is the snowflake schema a good data warehouse design?
    Levene, M
    Loizou, G
    INFORMATION SYSTEMS, 2003, 28 (03) : 225 - 240
  • [23] Data warehouse design: A schema-transformation approach
    Marotta, A
    Ruggia, R
    XXII INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY, PROCEEDINGS, 2002, : 153 - 161
  • [24] An evolutionary approach to schema partitioning selection in a data warehouse
    Bellatreche, L
    Boukhalfa, K
    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2005, 3589 : 115 - 125
  • [25] Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
    Zhang, Heng
    Luna, Jesus
    Suri, Neeraj
    Trapero, Ruben
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [26] Semantics Based Access Management Framework for Securing Data in Cloud
    Auxilia, M.
    Raja, K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [27] A symmetric-based framework for securing cloud data at rest
    Mohammed, Mohammed Anwar
    Abed, Fadhil Salman
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (01) : 347 - 361
  • [28] Towards Cloud-Based Data Warehouse as a Service for Big Data Analytics
    Dabbechi, Hichem
    Nabli, Ahlem
    Bouzguenda, Lotfi
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT II, 2016, 9876 : 180 - 189
  • [29] Privacy and Availability in Cloud Data Warehouse
    Karkouda, Kawthar
    Nabli, Ahlem
    Gargouri, Faiez
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, : 388 - 391
  • [30] Benchmarking Data Warehouse Systems in the Cloud
    Moussa, Rim
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,