Advertisement

Double Ended Bottom-Up Approach of Data Warehouse Architecture Employing Country ISO Code Engendered Cryptographic Algorithm

  • Rajdeep ChowdhuryEmail author
  • Ipshita Bhattacharya
  • Nirmita De
  • Subhajit Saha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 11)

Abstract

Data Warehouse is an incorporated database premeditated to expand while crafting decision and crisis resolving, espousing exceedingly condensed fact. The amalgamation of security modus operandi with data warehouse is a unanimously established premise for contemporary researchers. The crucial tip of the projected effort through the formulated work emphasizes on the design and implementation of the novel Double Ended Bottom-Up Approach architecture and the integration of the cryptographic modus operandi amid it having precise intent of augmenting safety and performance therein. The proposed cryptographic algorithm has been engendered based on the concept of employing Country ISO Code within. Devising the inventive algorithm ensures considerable diminish in admittance time, considering apt retrieval of the entire indispensable information. Related appliance of the proposed work is in a diversity of organization, where accrual of plausible record is of extreme insinuation. The collection of organization embraces an amalgamation of scholastic organizations, business houses, curative medicinal enterprises, defense and security agencies with sensitive data, classified enterprises and forwards.

Keywords

Data warehouse Encryption Country ISO code Modified ASCII Transposition Double ended bottom–up approach 

References

  1. 1.
    Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., De, M.: Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. Int. J. Appl. Innov. Eng. Manag. 4(12), 35–42 (2015). ISSN: 2319 4847, Indexed in Thomson Reuters–Science Citation Index, Indexed in Scopus, Indexed in Thomson Reuters Researcher ID–N–6095–2015Google Scholar
  2. 2.
    Chowdhury, R., Datta, S., Dasgupta, S., De, M.: Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. Int. J. Adv. Comput. Sci. Appl. 6(11), 29–34 (2015). ISSN (Online): 2156 5570, ISSN (Print): 2158 107X, Included and Indexed in Thomson Reuters Master Journal List with Emerging Sources Citation IndexGoogle Scholar
  3. 3.
    Chowdhury, R., Dey, K.S., Datta, S., Shaw, S.: Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In: Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore, Proceedings in USB: CFP14AWQ-USB, pp. 55–60. IEEE Digital Xplore (2014). ISBN (10): 1-4799-6628-8, ISBN (13): 978-1-4799-6629-5Google Scholar
  4. 4.
    Chowdhury, R., Chatterjee, P., Mitra, P., Roy, O.: Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. Int. J. Innov. Res. Sci. Eng. Technol. 3(6), 165–172 (2014). ISSN (Online): 2319 8753, ISSN (Print): 2347 6710Google Scholar
  5. 5.
    Chowdhury, R., Pal, B., Ghosh, A., De, M.: A data warehouse architectural design using proposed pseudo mesh schema. In: Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata, Tata McGraw Hill Education Private Limited, pp. 138–141 (2012). ISBN (13): 978-1-2590-6170-7, ISBN (10): 1-2590-6170-1Google Scholar
  6. 6.
    Chowdhury, R., Pal, B.: Proposed hybrid data warehouse architecture based on data model. Int. J. Comput. Sci. Commun. 1(2), 211–213 (2010). ISSN: 0973 7391Google Scholar
  7. 7.
    Saurabh, A.K., Nagpal, B.: A survey on current security strategies in data warehouses. Int. J. Eng. Sci. Technol. 3(4), 3484–3488 (2011). ISSN: 0975 5462Google Scholar
  8. 8.
    Santos, R.J., Bernardino, J., Vieira, M.: A survey on data security in data warehousing: issues, challenges and opportunities. In: International Conference on Computer as a Tool, EUROCON IEEE, Lisbon, pp. 1–4. IEEE Digital Xplore (2011). ISBN: 978-1-4244-7486-8Google Scholar
  9. 9.
    Vieira, M., Vieira, J., Madeira, H.: Towards data security in affordable data warehouse. In: 7th European Dependable Computing Conference (2008)Google Scholar
  10. 10.
    Gosain, A., Arora, A.: Security issues in data warehouse: a systematic review. Proc. Comput. Sci. 48, 149–157 (2015). ISSN: 1877 0509. Proceedings of International Conference on Intelligent Computing, Communication and Convergence, ICCC 2015, Organized by Interscience Institute of Management and Technology, Bhubaneswar, OdishaGoogle Scholar
  11. 11.
    Chaudhuri, S., Dayal, U.: An overview of data warehousing and OLAP technology. Newsl. ACM SIGMOD Rec. 26(1), 65–74 (1997)CrossRefGoogle Scholar
  12. 12.
    Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: An integrated conceptual model for temporal data warehouse security. Comput. Inf. Sci. 4(4), 46–57 (2011)Google Scholar
  13. 13.
    Golfarelli, M., Rizzi, S.: A methodological framework for data warehouse design. In: Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington, pp. 3–9 (1998)Google Scholar
  14. 14.
    Chowdhury, R., Bose, R., Sengupta, N., De, M.: Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik rotation algorithm. In: Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata, Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR. ISBN: 978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN: 978-1-4673-4697-9, pp. 564–567 (2012). IEEE Digital Xplore, ISBN: 978-1-4673-4700-6Google Scholar
  15. 15.
    Chowdhury, R., Ghosh, S., De, M.: String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In: Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh, Proceedings in CD: IEEE Catalog Number: CFP1244S-CDR, ISBN: 978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN: 978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, pp. 1152–1157. IEEE Digital Xplore. ISBN: 978-1-4673-1153-3Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Rajdeep Chowdhury
    • 1
    Email author
  • Ipshita Bhattacharya
    • 2
  • Nirmita De
    • 2
  • Subhajit Saha
    • 2
  1. 1.Department of Computer ApplicationJIS College of EngineeringKalyani, NadiaIndia
  2. 2.Department of Electronics and Communication EngineeringJIS College of EngineeringKalyani, NadiaIndia

Personalised recommendations