Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [21] Handling Bitemporal Schema Versions in Multi-temporal Environment for Data Warehouse
    Anjana Gosain
    Kriti Saroha
    Arabian Journal for Science and Engineering, 2019, 44 : 3619 - 3638
  • [22] Bi-temporal schema versioning in bi-temporal data warehouse
    Kriti Saroha
    Anjana Gosain
    CSI Transactions on ICT, 2015, 3 (2-4) : 135 - 142
  • [23] Multi Level Mining of Warehouse Schema
    Usman, Muhammad
    Pears, Russel
    NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 395 - 408
  • [24] Enhanced Symmetric Encryption Technique for Securing Users' Data in Public Cloud Environment
    Fairosebanu, A.
    Jebaseeli, A. Nisha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 785 - 791
  • [25] Securing data over cloud - enhanced hybrid data encryption algorithm
    Mahapatra, Prasanta Kumar
    Tripathy, Alok Ranjan
    Tripathy, Alakananda
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (05) : 991 - 1011
  • [26] Research on Extract, Transform and Load(ETL) in Land and Resources Star Schema Data Warehouse
    Qin Hanlin
    Jin Xianzhen
    Zhang Xianrong
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 120 - 123
  • [27] Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing
    Al-Attab, Basel Saleh
    Fadewar, H. S.
    Hodeish, Mahmoud E.
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 105 - 121
  • [28] A Simple Technique for Securing Data at Rest Stored in a Computing Cloud
    Sedayao, Jeff
    Su, Steven
    Ma, Xiaohao
    Jiang, Minghao
    Miao, Kai
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 553 - 558
  • [29] Searchable Encryption with Pattern Matching for Securing Data on Cloud Server
    Pramanick, Neha
    Ali, Syed Taqi
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [30] Optimizing the Performance of Data Warehouse by Query Cache Mechanism
    Ul Hassan, Ch Anwar
    Hammad, Muhammad
    Uddin, Mueen
    Iqbal, Jawaid
    Sahi, Jawad
    Hussain, Saddam
    Ullah, Syed Sajid
    IEEE ACCESS, 2022, 10 : 13472 - 13480