International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 1 | Issue 3 | Year 2011 | Article Id. IJCTT-V1I3P109 | DOI : https://doi.org/10.14445/22312803/IJCTT-V1I3P109

Comparative Analysis of Data warehouse Design Approaches from Security Perspectives


Shashank Saroop, Manoj Kumar

Citation :

Shashank Saroop, Manoj Kumar, "Comparative Analysis of Data warehouse Design Approaches from Security Perspectives," International Journal of Computer Trends and Technology (IJCTT), vol. 1, no. 3, pp. 286-291, 2011. Crossref, https://doi.org/10.14445/22312803/IJCTT-V1I3P109

Abstract

Data warehouse systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Due to the sensitive data contain in the DW it is most important to specify a security, from early stages of DW design so that data must be secured. Traditionally, security was not considered as an important element in modeling of DW. Most of the author starts applying a security at conceptual level to implementation level, however they did not consider a “requirement level” which basically a main levels in DW design. In this paper we have surveyed the literature related to work done by various authors in last few years and Comparison of various approaches in data warehouse design from security perspective by using various parameters.

Keywords

Data Warehouse, Security, Multidimensional modeling, UML extension, MDA, QVT, OLAP.

References

[1] F. Saltor, M. Oliva, A. Abelló, J. Samos, Building secure data warehouse schemas from federated information systems, in: H. Bestougeff, J.E. Dubois, B. Thuraisingham (Eds.), Heterogeneous Information Exchange and Organizational Hubs, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2002, pp. 123–134. ISBN: 1- 4020-0649–7
[2] P. Devanbu, S. Stubblebine, Software engineering for security: a roadmap, in: A. Finkelstein (Ed.), The Future of Software Engineering, ACM Press, New York, 2000, pp. 227–239.
[3] E. Ferrari, B. Thuraisingham, Secure database systems, in: M. Piattini, O. Di´az (Eds.), Advanced Databases: Technology Design, Artech House, 2000.
[4]. R. Kirkgöze, N. Katic, M. Stolda, and A. M. Tjoa, "A Security Concept for OLAP. (DEXA`97)," Toulouse, France
[5]. Rosenthal and E. Sciore, "View Security as the Basic for DW Security," (DMDW`00), Sweden, 2000
[6]. Emilio Soler, Juan Trujillo, Eduardo Fernandez-Medina and Mario Piattini, “A Framework for the Development of Secure Data Warehouses based on MDA and QVT” Second International conference on availability, reliability and security 2007.
[7]Diego Calvanese, Data Integration in Data Warehousing, International Journal of Cooperative Information Systems Vol. 10, No. 3 (2001) 237–271
[8] Golfarelli, M., Maio, D., and Rizzi, S., The Dimensional Fact Model: A Conceptual Model for Data Warehouses. Int. Journal of Cooperative Information Systems (IJCIS), (1998) (2-3): 215-247.
[9]. Sapia, C., Blaschka, M., Höfling, G., and Dinter, B.: Extending the E/R Model for the Multidimensional Paradigm. in 1st Int. Workshop on Data Warehouse and Data Mining.
[10] Fernandez-Medina, E., et al., Access Control and Audit Model for the Multidimensional Modeling of Data Decision Support Systems, 2006. 42: p. 1270-1289.
[11] Fernandez-Medina, Juan Trujillo, Rodolfo Villarroel “Developing a secure data warehouses with a  UML extension” published in science direct 0306-4376.
[12] Emilio Soler , Rodolfo Villarroel, Juan Trujillo” Representing security and audit rules in Data warehouse at the logical levels by using the common warehouse met model” Proceedings of the First International Conference on Availability, Reliability and Security (ARES'O6)0-7695-2567-9106 $20.00  2006 IEEE.
[13] J. Miller and J. Mukerji, “MDA guide version 1.0.1, “2003”.
[15] Emilio Soler, Juan Trujillo, Fernandez-Medina, “Towards  comprehensive requirement analysis for DW: Considering security requirement  Published in IEEE Conference in 2008.
[16] Carlos Blanco, Ignacio Garcia-Rodriguez de Guzman,” Automatic generation of secure multidimensional code for data warehouse by using QVT transformation: Proceeding in international conference in 2009
[17] Carlos Blanco, Ricardo Perez-Castillo,“ Towards a Modernization Process for secure Data warehouse”  Published DAWAK 2009, LNCS 5691, pp. 24–35, 2009. © Springer-Verlag Berlin Heidelberg 2009
[18] K. Katic, G. Quirchmayr, J. Schiefer, M. Stolba, A.M. Tjoa, A prototype model for Data Warehouse security based on metadata, in: Proceedings of the 9th International Workshop on Database and Expert Systems Applications (DEXA’98), Vienna, Austria, 1998, pp. 300–309.
[19] A. Rosenthal, E. Sciore, View security as the basic for Data Warehouse security, in: Proceedings of the Second International Workshop on Design and Management of Data Warehouses (DMDW’00), Stockholm, Sweden, 2000, pp. 1–8.
[20] F. Saltor, M. Oliva, A. Abelló, J. Samos, Building secure data warehouse schemas from federated information systems, in: H. Bestougeff, J.E. Dubois, B. Thuraisingham (Eds.), Heterogeneous Information Exchange and Organizational Hubs, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2002, pp. 123–134. ISBN: 14020-0649–7.
[21] R. Kirkgöze, N. Katic, M. Stolba, A.M. Tjoa, A security concept for OLAP, in: Proceedings of the 8th International Workshop on Database and Expert System Applications (DEXA’97), Toulouse, France, 1997, pp. 619–626. [22] W. Essmayr, E. Weippl, F. Lichtenberger, W. Winiwarter, O. Mangisengi, An authorization model for Data Warehouses and OLAP, in: Workshop on Security in Distributed Data Warehousing, in Conjunction with 20th IEEE Symposium on Reliable Distributed Systems (SRDS’2001), USA, 2001, pp. 9–13.
[23] T. Priebe, G. Pernul, Towards OLAP security design – survey and research issues, in: Proceedings of the 3rd ACM International Workshop on Data Warehousing and OLAP (DOLAP’00), VA, USA, 2000, pp. 33–40.
[24] T. Priebe, G. Pernul, A pragmatic approach to conceptual modeling of OLAP security, in: Proceedings of the 20th International Conference on Conceptual Modeling (ER’01), Yokohama, Japan, LCCS, vol. 2224, 2001, pp. 311–324.
[25] Eduardo Fernandez, Juan trujillio, Mario Piattini: UML/2.0 Extension used to secure a DW” International Journal published in 2006