Abstract
Data Warehouse is an incorporated database premeditated to expand while crafting decision and crisis resolving, espousing exceedingly condensed fact. The amalgamation of security modus operandi with data warehouse is a unanimously established premise for contemporary researchers. The crucial tip of the projected effort through the formulated work emphasizes on the design and implementation of the novel Double Ended Bottom-Up Approach architecture and the integration of the cryptographic modus operandi amid it having precise intent of augmenting safety and performance therein. The proposed cryptographic algorithm has been engendered based on the concept of employing Country ISO Code within. Devising the inventive algorithm ensures considerable diminish in admittance time, considering apt retrieval of the entire indispensable information. Related appliance of the proposed work is in a diversity of organization, where accrual of plausible record is of extreme insinuation. The collection of organization embraces an amalgamation of scholastic organizations, business houses, curative medicinal enterprises, defense and security agencies with sensitive data, classified enterprises and forwards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., De, M.: Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. Int. J. Appl. Innov. Eng. Manag. 4(12), 35–42 (2015). ISSN: 2319 4847, Indexed in Thomson Reuters–Science Citation Index, Indexed in Scopus, Indexed in Thomson Reuters Researcher ID–N–6095–2015
Chowdhury, R., Datta, S., Dasgupta, S., De, M.: Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. Int. J. Adv. Comput. Sci. Appl. 6(11), 29–34 (2015). ISSN (Online): 2156 5570, ISSN (Print): 2158 107X, Included and Indexed in Thomson Reuters Master Journal List with Emerging Sources Citation Index
Chowdhury, R., Dey, K.S., Datta, S., Shaw, S.: Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In: Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore, Proceedings in USB: CFP14AWQ-USB, pp. 55–60. IEEE Digital Xplore (2014). ISBN (10): 1-4799-6628-8, ISBN (13): 978-1-4799-6629-5
Chowdhury, R., Chatterjee, P., Mitra, P., Roy, O.: Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. Int. J. Innov. Res. Sci. Eng. Technol. 3(6), 165–172 (2014). ISSN (Online): 2319 8753, ISSN (Print): 2347 6710
Chowdhury, R., Pal, B., Ghosh, A., De, M.: A data warehouse architectural design using proposed pseudo mesh schema. In: Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata, Tata McGraw Hill Education Private Limited, pp. 138–141 (2012). ISBN (13): 978-1-2590-6170-7, ISBN (10): 1-2590-6170-1
Chowdhury, R., Pal, B.: Proposed hybrid data warehouse architecture based on data model. Int. J. Comput. Sci. Commun. 1(2), 211–213 (2010). ISSN: 0973 7391
Saurabh, A.K., Nagpal, B.: A survey on current security strategies in data warehouses. Int. J. Eng. Sci. Technol. 3(4), 3484–3488 (2011). ISSN: 0975 5462
Santos, R.J., Bernardino, J., Vieira, M.: A survey on data security in data warehousing: issues, challenges and opportunities. In: International Conference on Computer as a Tool, EUROCON IEEE, Lisbon, pp. 1–4. IEEE Digital Xplore (2011). ISBN: 978-1-4244-7486-8
Vieira, M., Vieira, J., Madeira, H.: Towards data security in affordable data warehouse. In: 7th European Dependable Computing Conference (2008)
Gosain, A., Arora, A.: Security issues in data warehouse: a systematic review. Proc. Comput. Sci. 48, 149–157 (2015). ISSN: 1877 0509. Proceedings of International Conference on Intelligent Computing, Communication and Convergence, ICCC 2015, Organized by Interscience Institute of Management and Technology, Bhubaneswar, Odisha
Chaudhuri, S., Dayal, U.: An overview of data warehousing and OLAP technology. Newsl. ACM SIGMOD Rec. 26(1), 65–74 (1997)
Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: An integrated conceptual model for temporal data warehouse security. Comput. Inf. Sci. 4(4), 46–57 (2011)
Golfarelli, M., Rizzi, S.: A methodological framework for data warehouse design. In: Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington, pp. 3–9 (1998)
Chowdhury, R., Bose, R., Sengupta, N., De, M.: Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik rotation algorithm. In: Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata, Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR. ISBN: 978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN: 978-1-4673-4697-9, pp. 564–567 (2012). IEEE Digital Xplore, ISBN: 978-1-4673-4700-6
Chowdhury, R., Ghosh, S., De, M.: String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In: Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh, Proceedings in CD: IEEE Catalog Number: CFP1244S-CDR, ISBN: 978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN: 978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, pp. 1152–1157. IEEE Digital Xplore. ISBN: 978-1-4673-1153-3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chowdhury, R., Bhattacharya, I., De, N., Saha, S. (2018). Double Ended Bottom-Up Approach of Data Warehouse Architecture Employing Country ISO Code Engendered Cryptographic Algorithm. In: Bhattacharyya, S., Sen, S., Dutta, M., Biswas, P., Chattopadhyay, H. (eds) Industry Interactive Innovations in Science, Engineering and Technology . Lecture Notes in Networks and Systems, vol 11. Springer, Singapore. https://doi.org/10.1007/978-981-10-3953-9_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-3953-9_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3952-2
Online ISBN: 978-981-10-3953-9
eBook Packages: EngineeringEngineering (R0)