• Corpus ID: 45577976

A SURVEY ON CURRENT SECURITY PERSPECTIVES IN DATA WAREHOUSES

@inproceedings{Thangaraju2016ASO,
  title={A SURVEY ON CURRENT SECURITY PERSPECTIVES IN DATA WAREHOUSES},
  author={G. Thangaraju and Dr. X. Agnes Kala Rani},
  year={2016}
}
-Business Intelligence and Data Warehouse is most important role player in the enterprises. Data warehouse (DW) is a collection of integrated databases. The DWHDB are designed to support managerial decision-making and problemsolving functions. The data’s available in the DWHDB are very perceptive. Such perceptive information needs security so as to prevent this perceptive information from the unauthorized users and attackers. The Current research phenomena in data warehouse have shown number of… 
1 Citations

Figures and Tables from this paper

A Framework for Securing Data Warehouse Using Hybrid Approach
TLDR
This study presents a framework for securing data ware house using a hybrid approach and was achieved by identifying security factors of the data warehouse creating hybrid security model with 3 level authentications.

References

SHOWING 1-10 OF 13 REFERENCES
An improved security framework for data warehouse: A hybrid approach
TLDR
Comparison of classical security models and implementation of filter over data before they are kept in statistical form in a data warehouse and introduction of a hybrid approach of the security implementation in data warehouses is the main focus of this paper.
Security of Data Warehousing Server
TLDR
The aim is to present a data warehouse security framework, based on the current state of the art, that concentrates on the data warehouse specific security needs from the data content point of view and gives a useful tool to help dealing with data Warehouse security process.
Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective
TLDR
It is demonstrated that state-of-the-art data masking and encryption algorithms strongly fulfill their security purpose, but they introduce massive storage space and response time overheads, which mostly result in unacceptable security-performance tradeoffs, compromising their feasibility in DW environments.
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs
TLDR
This paper proposes an MDA architecture with which to develop secure DWs, which defines secure models at different abstraction levels along with their automatic transformation between models, and shows how to transform these security rules through an example.
Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study
TLDR
A set of rules to transform PIM model for secure temporal data warehouse (TDW) to PSM model is proposed, and the QVT language is applied to the development of a secure data warehouse by means of a case study.
A-COLD: Access Control of Web OLAP over Multi-data Warehouse
TLDR
The approach is based on PKI Authentication and Privilege Management Infrastructure and presents a binding model of DW user identification and privilege of fact and dimensional access, which applies the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability.
A Schematic Technique Using Data type Preserving Encryption to Boost Data Warehouse Security
TLDR
A method of in progression fortification based on an encryption scheme which preserves the data type of the plaintext resource and is particularly companionable for multifaceted data warehouse environments.
Implementing a Data Lineage Tracker
TLDR
This paper presents one method of tackling data lineage to answer the questions needed for business users, for both new and old applications in a heterogeneous infrastructure environment, and demonstrates the recall and precision of the proposed data lineage tracking system.
The Causes, Security Issues, and Preventive Actions Associated with Data Integrity
TLDR
Many of the sources of and issues relating to the entry, storage, and retrieval of data from databases are explored, including the adequate training of users, who too often tend to be the inadvertent source of errors.
...
...