Enterprise Reporting on SAP S/4HANA using Snowflake as Cloud Datawarehouse

  IJCTT-book-cover
 
         
 
© 2023 by IJCTT Journal
Volume-71 Issue-1
Year of Publication : 2023
Authors : Baljit Singh
DOI :  10.14445/22312803/IJCTT-V71I1P107

How to Cite?

Baljit Singh, "Enterprise Reporting on SAP S/4HANA using Snowflake as Cloud Datawarehouse," International Journal of Computer Trends and Technology, vol. 71, no. 1, pp. 28-39, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I1P107

Abstract
Today, if a claim is made that Data is a much more valuable resource than oil or gold, all professionals working in various technology fields will agree to it. Data is the most critical tool to enable business enterprises to take quick decisions. All successful companies are using ERP software to integrate business processes across their enterprise to run their business operations seamlessly. SAP is the market leader in ERP software, and most companies are using SAP as enterprise software. SAP S/4 HANA is the flagship product of SAP in the ERP market space, and it stores key enterprise data in its in-memory database called SAP HANA. SAP S/4 HANA becomes a key and pivotal source of information for enterprises as it stores tightly integrated data across all business functions. Analytical reporting on S4 HANA helps organizations make key decisions quickly. Enterprises must choose a strong tool to implement analytics to cater to their analytical needs quickly and cost-effectively. SAP provides various enterprise analytics software, but they require specific technical skills and hardware and software costs are involved in using these solutions. There are various cloud based on demand analytics solutions available that are very cost-effective and require lesser technical skills than SAP analytics solutions. This paper aims to evaluate snowflake, a cloud-based reporting solution that can store and analyze data within a Snowflake. Snowflake’s three-tier architecture, data modeling approach for SAP S/4 HANA enterprise data in snowflake, data loading in Snowflake from S/4HANA, and comparison of using snowflake in place of SAP Analytics solutions have been done in detail.

Keywords
SAP S4 HANA, Business Intelligence, Enterprise Reporting, Analytics Cloud, Snowflake Data cloud, Data warehousing.

Reference

[1] The Snowflake website, 2020. [Online]. Available: https://docs.Snowflake.com/en/?_ga=2.131591436.2086032114.1673908722- 1347278072.1673734864
[2] The SAP website, 2022. [Online]. Available: https://help.sap.com/docs/SAP_HANA_PLATFORM/4505d0bdaf4948449b7f7379d24d0f0d/bc18c37df9154cb0bfacad4b045f7c49.html
[3] The SAP website, 2022. [Online]. Available: https://community.sap.com/topics/bw4-hana/hana-2-0
[4] Sikender Mohsienuddin Mohammad, “Cloud Computing in IT and How it’s Going to Help United States Specifically,” International Journal of Computer Trends and Technology, vol. 67, no. 10, 2019. Crossref, https://ssrn.com/abstract=3629018
[5] Haleem Khan, and Yu Jiong, “Cloud Computing Effect on Enterprises in Terms of Cost,” International Journal of Computer Trends and Technology, vol. 67, no. 5, 2019. Crossref, https://doi.org/10.14445/22312803/IJCTT-V67I5P103
[6] Laxmikant S. Bhattad, and P. P. Deshmukh, “Secure Data in Cloud Computing Using Encryption Algorithms,” International Journal of P2P Network Trends and Technology, vol. 5, no. 3, pp. 1-4, 2015.
[7] Yonah Etene, and Josphat M. Karani, “Performance in Layered Software Architectures: the Case of Customized Organizational Software,” International Journal of Computer Trends and Technology, vol. 67, no. 12, pp. 15-19, 2019. Crossref, https://doi.org/10.14445/22312803/IJCTT-V67I12P104
[8] Marcel Chibuzor Amaechi, Matthias Daniel, and Bennett. E. O, “Data Storage Management in Cloud Computing Using Deduplication Technique,” SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 1-7, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P101
[9] G. Anitha et al., “A Survey of Security Issues in IIOT and Fault Identification using Predictive Analysis in Industry 4.0,” International Journal of Engineering Trends and Technology, vol. 70, no. 12, pp. 99-108, 2022. Crossref, https://doi.org/10.14445/22315381/IJETTV70I12P211
[10] Twinkle Graf.F, and Mrs.Prema. P, “Secure Collaborative Privacy in Cloud Data with Advanced Symmetric Key Block Algorithm,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 2, pp. 40-44, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I2P109
[11] Sidath Weerasinghe, and Indika Perera, “Taxonomical Classification and Systematic Review on Microservices,” International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 222-233, 2022. Crossref, https://doi.org/10.14445/22315381/IJETTV70I3P225
[12] Manjunatha. S, and Dr. Suresh. L, “A Study on Consolidation of Data Servers in Virtualized Cloud Atmosphere,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 47-50, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSEV6I11P110
[13] Dr. P. K. Rai, and Rajesh Kumar Bunkar, “Architectural Data Security in Cloud Computing,” International Journal of Computer & organization Trends, vol. 4, no. 4, pp. 23-27, 2014. Crossref, https://doi.org/10.14445/22492593/IJCOT-V10P306
[14] N. Madhavi Latha, and Y. Pavan Narasimha Rao, “A Novel Secured Data Transmission Model with Load Balancing for Cloud Computing,” International Journal of Computer & organization Trends, vol. 6, no. 1, pp. 45-50, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V29P304
[15] G. Jai Arul Jose, and C. Sajeev, “Implementation of Data Security in Cloud Computing,” International Journal of P2P Network Trends and Technology, vol. 1, no. 1, pp. 6-11, 2011.
[16] K. Phanindhar, and Ch. Suresh, “Cloud Computing: a Responsibility Data Sharing in the Cloud Computing,” International Journal of P2P Network Trends and Technology, vol. 3, no. 4, pp. 11-16, 2013.
[17] Dr. D. Shravani, “Model Driven Architecture Based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT,” International Journal of Computer & organization Trends, vol. 6, no. 4, pp. 55-64, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V35P304
[18] Lingaswami, and G. Avinash Reddy, “Offensive Decoy Technology for Cloud Data Attacks,” International Journal of P2P Network Trends and Technology, vol. 3, no. 6, pp. 23-27, 2013.