Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [1] Web-Based Implementation of Data Warehouse Schema Evolution
    Kang, Jai W.
    Basrizal, Fnu
    Yu, Qi
    Holden, Edward P.
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 313 - 322
  • [2] EXTENDED METADATA FOR DATA WAREHOUSE SCHEMA
    Parimala, N.
    Gautam, Vinay
    ENASE 2011: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2011, : 262 - 267
  • [3] A Performance Analysis of Hybrid and Columnar Cloud Databases for Efficient Schema Design in Distributed Data Warehouse as a Service
    Ferreira, Fred Eduardo Revoredo Rabelo
    Fidalgo, Robson do Nascimento
    DATA, 2024, 9 (08)
  • [4] Securing the Data in Cloud Environment Using Parallel and Multistage Security Mechanism
    Goyal, Ranjan
    Manoov, R.
    Sevugan, Prabu
    Swarnalatha, P.
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 941 - 949
  • [5] Datawarehouser: A Data Warehouse artist who have ability to understand data warehouse schema pictures
    Warnars, Harco Leslie Hendric Spits
    Randriatoamanana, Richard
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2205 - 2208
  • [6] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589
  • [7] A symmetric-based framework for securing cloud data at rest
    Mohammed, Mohammed Anwar
    Abed, Fadhil Salman
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (01) : 347 - 361
  • [8] Privacy and Availability in Cloud Data Warehouse
    Karkouda, Kawthar
    Nabli, Ahlem
    Gargouri, Faiez
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, : 388 - 391
  • [9] Benchmarking Data Warehouse Systems in the Cloud
    Moussa, Rim
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [10] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211