Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [41] Design a Data Warehouse Schema from Document-Oriented database
    Bouaziz, Senda
    Nabli, Ahlem
    Gargouri, Faiez
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 221 - 230
  • [42] Extended Cascaded Star Schema and ECOLAP Operations for Spatial Data Warehouse
    Gorawski, Marcin
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, PROCEEDINGS, 2009, 5788 : 251 - 259
  • [43] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [44] Where's My Data? Securing the Cloud
    Tapia, Serge
    Fillette, Arnaud
    ENRICHING COMMUNICATIONS, 2011, 5 (02):
  • [45] Securing Cloud Data using Information Dispersal
    Mar, Kheng Kok
    Hu, ZhengQing
    Law, Chee Yong
    Wang, Meifen
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [46] Framework for Securing Data in Cloud Storage Services
    Dahshan, Mai
    Elkassass, Sherif
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 267 - 274
  • [47] Securing Cloud Data Under Key Exposure
    Karame, Ghassan O.
    Soriente, Claudio
    Lichota, Krzysztof
    Capkun, Srdjan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 838 - 849
  • [48] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [49] Logical Schema for Data Warehouse on Column-Oriented NoSQL Databases
    Boussahoua, Mohamed
    Boussaid, Omar
    Bentayeb, Fadila
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 247 - 256
  • [50] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44th International Conference on Telecommunications and Signal Processing, TSP 2021, 2021, : 309 - 315