Mechanism for securing cloud based data warehouse schema

被引:0
|
作者
Arora A. [1 ]
Gosain A. [2 ]
机构
[1] National Informatics Centre, MeitY, Govt. of India, Delhi
[2] USICT, Guru Gobind Singh Indraprastha University, Delhi
关键词
Cryptography; Data warehouse; Encryption; Information security; Schema security;
D O I
10.1007/s41870-020-00546-1
中图分类号
学科分类号
摘要
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k − W)/(n − k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance analysis of the proposed mechanism on the standard TPC-H database for both encryption and decryption cycles. © 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:171 / 184
页数:13
相关论文
共 50 条
  • [41] Securing data in transit using data-in-transit defender architecture for cloud communication
    Nandakumar, Keerthana
    Vinod, Viji
    Batcha, Syed Musthafa Akbar
    Sharma, Dilip Kumar
    Elangovan, Mohanraj
    Poonia, Anjana
    Basavaraju, Suresh Mudlappa
    Dogiwal, Sanwta Ram
    Dadheech, Pankaj
    Sengan, Sudhakar
    SOFT COMPUTING, 2021, 25 (18) : 12343 - 12356
  • [42] Knowledge Based Data Cleaning for Data Warehouse Quality
    Bradji, Louardi
    Boufaida, Mahmoud
    DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 2, 2011, 189 : 373 - +
  • [43] Implementation for Securing the Cloud Data and Providing Secured Access Across the Network
    Sheshasaayee, Ananthi
    Geetha, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 783 - 790
  • [44] An Elliptic Curve Cryptography based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks
    Chhabra, Anshuman
    Arora, Shivam
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 243 - 246
  • [45] Research on the Incremental Updating Mechanism of Marine Environmental Data Warehouse
    Wen WeiJun
    MECHANICAL COMPONENTS AND CONTROL ENGINEERING III, 2014, 668-669 : 1378 - 1381
  • [46] Securing cloud access with enhanced attribute-based cryptography
    Kumar, Ashutosh
    Verma, Garima
    COMPUTING, 2024, 106 (12) : 4193 - 4207
  • [47] Data Warehouse Systems in the Environment of Cloud Computing - A Comparative Study of Elastic Cloud Computing and Organizational Systems
    Shah, Neepa K.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 118 - 123
  • [48] An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms
    Njuki, Sam
    Zhang, Jianbiao
    Too, Edna C.
    Richard, Rimiru
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018), 2018, : 14 - 20
  • [49] Analysis on Graduate Employment Based on Data Warehouse
    Zhan, XiaoYi
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 406 - 409
  • [50] A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context
    Sultan, Nazatul Haque
    Varadharajan, Vijay
    Zhou, Lan
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1647 - 1661