{"title":"Data Warehouse Signature: High Performance Evaluation for Implementing Security Issues in Data Warehouses through a New Framework","authors":"Mayada J. AlMeghari","doi":"10.14257/IJSIA.2017.11.6.05","DOIUrl":null,"url":null,"abstract":"In this globalized world, the Internet services and uses are growing exponentially. Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs). DW is necessary for financial and business information making them an attractive purpose for hackers. The achievement of security issues in DW is very important for a proper and secure continuation of DW system work. This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model. The DWS framework solves one of the common security problems such as unavailability in network by using parallel computing through a middleware named View Manager Layer (VML). This framework ensures the security issues, such as Confidentiality, Integrity, and Availability (CIA) and it also reaches high performance in Average Execution Time (AET) evaluated in experimental studies. The execution of a large query result as blocks of a number of records in parallel computing saves more time than serial computing. The high performance has a limited increase in executor's numbers because there are time complexity factors, such as transmission time, separation and collection time. This paper presents a mathematical model used when the organization applies the DWS framework in DW systems to get the adequate number of executors joined in VML middleware to reach the high performance.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.6.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this globalized world, the Internet services and uses are growing exponentially. Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs). DW is necessary for financial and business information making them an attractive purpose for hackers. The achievement of security issues in DW is very important for a proper and secure continuation of DW system work. This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model. The DWS framework solves one of the common security problems such as unavailability in network by using parallel computing through a middleware named View Manager Layer (VML). This framework ensures the security issues, such as Confidentiality, Integrity, and Availability (CIA) and it also reaches high performance in Average Execution Time (AET) evaluated in experimental studies. The execution of a large query result as blocks of a number of records in parallel computing saves more time than serial computing. The high performance has a limited increase in executor's numbers because there are time complexity factors, such as transmission time, separation and collection time. This paper presents a mathematical model used when the organization applies the DWS framework in DW systems to get the adequate number of executors joined in VML middleware to reach the high performance.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security