Mechanism for securing cloud based data warehouse schema
- PDF / 2,382,972 Bytes
- 14 Pages / 595.276 x 790.866 pts Page_size
- 49 Downloads / 149 Views
ORIGINAL RESEARCH
Mechanism for securing cloud based data warehouse schema Amar Arora1
•
Anjana Gosain2
Received: 18 December 2019 / Accepted: 6 October 2020 Bharati Vidyapeeth’s Institute of Computer Applications and Management 2020
Abstract Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or attackers. In this paper, we propose a novel mechanism for encrypting column names of DW’s fact and dimension tables, which in turn protect the revelation of details of interesting columns to the cloud network. For this, we have proposed a customized method for encryption of column names of facts and dimension tables and implemented it in MySQL’s column name restrictions to test its validity. This paper also introduces an Enhanced Encryption Model for Data Warehouse, which provides a complete solution for securing data warehouse. Here, the column name gets encrypted with the help of keys from a secure host without the revelation of security details to the cloud network. It reduces the attacker’s ability to target strategically important columns such as sales figures, cost, etc. As a result, it increases attacker effort by (n – k - W)/(n - k) in case of a weighted column scenario. Here, ‘n’ is the total number of columns, ‘k’, and ‘W’ is the number of unencrypted and encrypted columns, respectively. We have also conducted a performance
& Amar Arora [email protected] 1
National Informatics Centre, MeitY, Govt. of India, Delhi, India
2
USICT, Guru Gobind Singh Indraprastha University, Delhi, India
analysis of the proposed mechanism on the standard TPCH database for both encryption and decryption cycles. Keywords Information security Data warehouse Encryption Cryptography Schema security
1 Introduction Data warehouse (DW) [1], is meant to store extremely sensitive information about business, and it uses this information to produce business knowledge. This makes security of data warehouse a major point of concern. The Data warehouse over cloud network further strengthens the requirement of DW security as cloud network may not be considered as secure unless it’s a privately owned [2]. For data security, encryption techniques are in use since long time in traditional databases [3] and the same seems to be most suitable in order to protect sensitive data in data warehouse [4, 5]. But, securing data warehouse through encryption includes high performance overheads [6] which can deteriorate the response time of DW queries. In order to overcome this problem of performance overhead, an encryption solution [7] which uses a variable mix of eXclusive OR (XOR) and modulo operator was proposed. Here, in order to avoid storage overhead, encrypted column’s data type has been preserv
Data Loading...