Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [31] Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment
    Quazi Warisha Ahmed
    Shruti Garg
    Journal of Grid Computing, 2022, 20
  • [32] PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse
    Fugkeaw, Somchart
    Hak, Lyhour
    IEEE ACCESS, 2024, 12 : 78743 - 78758
  • [33] An approach for data warehouse based on grid
    Xu, RenFeng
    Zhu, Dingju
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1925 - +
  • [34] A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
    Song, Heqing
    Li, Jifei
    Li, Haoteng
    IEEE ACCESS, 2021, 9 : 63745 - 63751
  • [35] Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment
    Ahmed, Quazi Warisha
    Garg, Shruti
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [36] Designing the Reconciled Schema for a Pharmacovigilance Data Warehouse Through a Temporally-Enhanced ER Model
    Lora, Riccardo
    Sabaini, Alberto
    Combi, Carlo
    Moretti, Ugo
    PROCEEDINGS OF THE 2012 INTERNATIONAL WORKSHOP ON SMART HEALTH AND WELLBEING, 2012, : 17 - 24
  • [37] Building CRM based on data warehouse
    Yujia, S
    Guishan, U
    Hantao, S
    PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON INTERNATIONAL BUSINESS IN THE ERA OF ECONOMY GLOBALIZATION, 2001, : 199 - 203
  • [38] An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
    Lina Dinesh
    K. Gayathri Devi
    Journal of Cloud Computing, 13
  • [39] An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
    Dinesh, Lina
    Devi, K. Gayathri
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [40] Securing data in transit using data-in-transit defender architecture for cloud communication
    Keerthana Nandakumar
    Viji Vinod
    Syed Musthafa Akbar Batcha
    Dilip Kumar Sharma
    Mohanraj Elangovan
    Anjana Poonia
    Suresh Mudlappa Basavaraju
    Sanwta Ram Dogiwal
    Pankaj Dadheech
    Sudhakar Sengan
    Soft Computing, 2021, 25 : 12343 - 12356