Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [31] Extended Cascaded Star Schema for Distributed Spatial Data Warehouse
    Gorawski, Marcin
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, PT I, 2010, 6067 : 166 - 175
  • [32] Securing personal data in public cloud
    Voros, Peter
    Csubak, Daniel
    Hudoba, Peter
    Kiss, Attila
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2020, 4 (01) : 51 - 66
  • [33] A Data Warehouse Schema to Support Financial Process in Local eGov
    Costa, Andreia
    Santos, Manuel Filipe
    Abelha, Antonio
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2017, 569 : 360 - 366
  • [34] Survey on securing data storage in the cloud
    Huang, Chun-Ting
    Huang, Lei
    Qin, Zhongyuan
    Yuan, Hang
    Zhou, Lan
    Varadharajan, Vijay
    Kuo, C. C. Jay
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
  • [35] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [36] Impact analysis of the schema changes on distributed data warehouse systems
    Italiano, Isabel Cristina
    de Almeida, Jorge Rady, Jr.
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS, 2007, : 65 - 70
  • [37] Automating Schema Integration Technique Case Study: Generating Data Warehouse Schema from Data Mart Schemas
    Arfaoui, Nouha
    Akaichi, Jalel
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2015, 2015, 521 : 200 - 209
  • [38] A Method of Constructing Electric Power Data Warehouse Based on Cloud Computing
    Wang, De Wen
    Xiao, Kai
    MANUFACTURING ENGINEERING AND AUTOMATION II, PTS 1-3, 2012, 591-593 : 1766 - 1769
  • [39] Automatic Transformation of Data Warehouse Schema To NoSQL Data Base: Comparative Study
    Yangui, Rania
    Nabli, Ahlem
    Gargouri, Faiez
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS: PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE KES-2016, 2016, 96 : 264 - 273
  • [40] Adaptive Security for Cloud Data Warehouse as a Service
    Guermazi, Emna
    Ben Ayed, Mounir
    Ben-Abdallah, Hanene
    2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 647 - 650