Skip to main content

Double Ended Bottom-Up Approach of Data Warehouse Architecture Employing Country ISO Code Engendered Cryptographic Algorithm

  • Conference paper
  • First Online:
Industry Interactive Innovations in Science, Engineering and Technology

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 11))

  • 1185 Accesses

Abstract

Data Warehouse is an incorporated database premeditated to expand while crafting decision and crisis resolving, espousing exceedingly condensed fact. The amalgamation of security modus operandi with data warehouse is a unanimously established premise for contemporary researchers. The crucial tip of the projected effort through the formulated work emphasizes on the design and implementation of the novel Double Ended Bottom-Up Approach architecture and the integration of the cryptographic modus operandi amid it having precise intent of augmenting safety and performance therein. The proposed cryptographic algorithm has been engendered based on the concept of employing Country ISO Code within. Devising the inventive algorithm ensures considerable diminish in admittance time, considering apt retrieval of the entire indispensable information. Related appliance of the proposed work is in a diversity of organization, where accrual of plausible record is of extreme insinuation. The collection of organization embraces an amalgamation of scholastic organizations, business houses, curative medicinal enterprises, defense and security agencies with sensitive data, classified enterprises and forwards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., De, M.: Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. Int. J. Appl. Innov. Eng. Manag. 4(12), 35–42 (2015). ISSN: 2319 4847, Indexed in Thomson Reuters–Science Citation Index, Indexed in Scopus, Indexed in Thomson Reuters Researcher ID–N–6095–2015

    Google Scholar 

  2. Chowdhury, R., Datta, S., Dasgupta, S., De, M.: Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. Int. J. Adv. Comput. Sci. Appl. 6(11), 29–34 (2015). ISSN (Online): 2156 5570, ISSN (Print): 2158 107X, Included and Indexed in Thomson Reuters Master Journal List with Emerging Sources Citation Index

    Google Scholar 

  3. Chowdhury, R., Dey, K.S., Datta, S., Shaw, S.: Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In: Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore, Proceedings in USB: CFP14AWQ-USB, pp. 55–60. IEEE Digital Xplore (2014). ISBN (10): 1-4799-6628-8, ISBN (13): 978-1-4799-6629-5

    Google Scholar 

  4. Chowdhury, R., Chatterjee, P., Mitra, P., Roy, O.: Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. Int. J. Innov. Res. Sci. Eng. Technol. 3(6), 165–172 (2014). ISSN (Online): 2319 8753, ISSN (Print): 2347 6710

    Google Scholar 

  5. Chowdhury, R., Pal, B., Ghosh, A., De, M.: A data warehouse architectural design using proposed pseudo mesh schema. In: Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata, Tata McGraw Hill Education Private Limited, pp. 138–141 (2012). ISBN (13): 978-1-2590-6170-7, ISBN (10): 1-2590-6170-1

    Google Scholar 

  6. Chowdhury, R., Pal, B.: Proposed hybrid data warehouse architecture based on data model. Int. J. Comput. Sci. Commun. 1(2), 211–213 (2010). ISSN: 0973 7391

    Google Scholar 

  7. Saurabh, A.K., Nagpal, B.: A survey on current security strategies in data warehouses. Int. J. Eng. Sci. Technol. 3(4), 3484–3488 (2011). ISSN: 0975 5462

    Google Scholar 

  8. Santos, R.J., Bernardino, J., Vieira, M.: A survey on data security in data warehousing: issues, challenges and opportunities. In: International Conference on Computer as a Tool, EUROCON IEEE, Lisbon, pp. 1–4. IEEE Digital Xplore (2011). ISBN: 978-1-4244-7486-8

    Google Scholar 

  9. Vieira, M., Vieira, J., Madeira, H.: Towards data security in affordable data warehouse. In: 7th European Dependable Computing Conference (2008)

    Google Scholar 

  10. Gosain, A., Arora, A.: Security issues in data warehouse: a systematic review. Proc. Comput. Sci. 48, 149–157 (2015). ISSN: 1877 0509. Proceedings of International Conference on Intelligent Computing, Communication and Convergence, ICCC 2015, Organized by Interscience Institute of Management and Technology, Bhubaneswar, Odisha

    Google Scholar 

  11. Chaudhuri, S., Dayal, U.: An overview of data warehousing and OLAP technology. Newsl. ACM SIGMOD Rec. 26(1), 65–74 (1997)

    Article  Google Scholar 

  12. Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: An integrated conceptual model for temporal data warehouse security. Comput. Inf. Sci. 4(4), 46–57 (2011)

    Google Scholar 

  13. Golfarelli, M., Rizzi, S.: A methodological framework for data warehouse design. In: Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington, pp. 3–9 (1998)

    Google Scholar 

  14. Chowdhury, R., Bose, R., Sengupta, N., De, M.: Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik rotation algorithm. In: Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata, Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR. ISBN: 978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN: 978-1-4673-4697-9, pp. 564–567 (2012). IEEE Digital Xplore, ISBN: 978-1-4673-4700-6

    Google Scholar 

  15. Chowdhury, R., Ghosh, S., De, M.: String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In: Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh, Proceedings in CD: IEEE Catalog Number: CFP1244S-CDR, ISBN: 978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN: 978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, pp. 1152–1157. IEEE Digital Xplore. ISBN: 978-1-4673-1153-3

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajdeep Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chowdhury, R., Bhattacharya, I., De, N., Saha, S. (2018). Double Ended Bottom-Up Approach of Data Warehouse Architecture Employing Country ISO Code Engendered Cryptographic Algorithm. In: Bhattacharyya, S., Sen, S., Dutta, M., Biswas, P., Chattopadhyay, H. (eds) Industry Interactive Innovations in Science, Engineering and Technology . Lecture Notes in Networks and Systems, vol 11. Springer, Singapore. https://doi.org/10.1007/978-981-10-3953-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3953-9_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3952-2

  • Online ISBN: 978-981-10-3953-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics