Abstract
A data warehouse is a storehouse which comprises all specifics and statistics of the institution. With the contemporary leaning of hacking beside the initiation of fresh hacking proficiency, the safekeeping for data warehouse has transpired to be an influential portion. The projected work exemplifies how an encryption technique is germane in the internal structure of a data warehouse. Apiece instant, any user endeavor for entrance to the information, the data in encrypted form is furnished to the user. Only an authenticated user would be able to obtain the original form of the data, because a well-defined decryption algorithm is installed at the authentic user’s end only. The formulation of the spotless Intelligent Sensor Algorithm and the proposed cryptographic modus operandi ascertain that there would be considerable attenuation of admittance time, with observance for the cosseted transference, enhanced infringement avoidance and output augmentation. The applicable employment of the proposed virtual data warehouse model with improved safekeeping might be in its noteworthy utility in an assortment of institution where accrual of cosseted information is of extreme extent. The assortment of associations is inclusive of edifying institutions, business communities, medicinal associations, classified enterprises and there on.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., & De, M. (2015). Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. International Journal of Application or Innovation in Engineering and Management, 4(12), 35–42. ISSN: 2319 4847. Indexed in Thomson Reuters Researcher ID–N–6095–2015.
Chowdhury, R., Datta, S., Dasgupta, S., & De, M. (2015). Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. International Journal of Advanced Computer Science and Applications, 6(11), 29–34, ISSN (Online): 2156 5570, ISSN (Print): 2158 107X.
Chowdhury, R., Dey, K. S., Datta, S., & Shaw, S. (2014). Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore (pp. 55–60). Proceedings in USB: CFP14AWQ-USB, ISBN–978-1-4799-6628-8, INSPEC Accession Number–14881472, Published and Archived in IEEE Digital Xplore, ISBN: 978-1-4799-6629-5.
Chowdhury, R., Chatterjee, P., Mitra, P., & Roy, O. (2014). Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. International Journal of Innovative Research in Science, Engineering and Technology, 3(6), 165–172. ISSN (Online): 2319 8753, ISSN (Print): 2347 6710.
Chowdhury, R., Pal, B., Ghosh, A., & De, M. (2012). A data warehouse architectural design using proposed pseudo mesh schema. In Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata (pp. 138–141). Tata McGraw Hill Education Private Limited. ISBN (13)–978-1-25-906170-7, ISBN (10)–978-1-25-906170-1.
Chowdhury, R., & Pal, B. (2010). Proposed hybrid data warehouse architecture based on data model. International Journal of Computer Science and Communication, 1(2), 211–213. ISSN: 0973 7391.
Saurabh, A. K., & Nagpal, B. (2011). A survey on current security strategies in data warehouses. International Journal of Engineering Science and Technology, 3(4), 3484–3488. ISSN: 0975 5462.
Santos, R. J., Bernardino, J., & Vieira, M. (2011). A survey on data security in data warehousing: Issues, challenges and opportunities. In International Conference on Computer as a Tool, EUROCON IEEE, Lisbon (pp. 1–4). INSPEC Accession Number–12075581, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4244-7486-8.
Vieira, M., Vieira, J., & Madeira, H. (2008). Towards data security in affordable data warehouse. In 7th European dependable computing conference.
Patel, A., & Patel, J. M. (2012). Data modeling techniques for data warehouse. International Journal of Multidisciplinary Research, 2(2), 240–246.
Chaudhuri, S., & Dayal, U. (1997). An overview of data warehousing and OLAP technology. Newsletter ACM SIGMOD Record, 26(1), 65–74.
Farhan, M. S., Marie, M. E., El-Fangary, L. M., & Helmy, Y. K. (2011). An integrated conceptual model for temporal data warehouse security. Computer and Information Science, 4(4), 46–57.
Golfarelli, M., Maio, D., & Rizzi, S. (1998). The dimensional fact model: A conceptual model for data warehouses. International Journal of Cooperative Information Systems, 7(2–3), 215–247.
Golfarelli, M., & Rizzi, S. (1998). A methodological framework for data warehouse design. In Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington (pp. 3–9).
Chowdhury, R., Bose, R., Sengupta, N., & De, M. (2012). Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik Rotation Algorithm. In Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata (pp. 564–567). Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR, ISBN–978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN–978-1-4673-4697-9, INSPEC Accession Number–13285714, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-4700-6.
Chowdhury, R., Ghosh, S., & De, M. (2012). String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh (pp. 1152–1157). Proceedings in CD: IEEE Catalog Number–CFP1244S-CDR, ISBN–978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN–978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, INSPEC Accession Number–13058551, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-1153-3.
Chowdhury, R., Dutta, S., & De, M. (2014). Towards design, analysis and performance enhancement of data warehouse by implementation and simulation of p2p technology on proposed pseudo mesh architecture. International Journal of Innovative Research in Science, Engineering and Technology, An ISO 3297:2007 Certified Organization, 3(6), 178–187. ISSN (Print): 2347 6710, ISSN (Online): 2319 8753.
Pal, B., Chattopadhyay, S., Mitra, S., Chowdhury, R., & De, M. (2012). Study and comparison of indexing models in data warehouse. International Journal of Software Engineering Research & Practices, 2(3), 1–8, ISSN (Print): 2231 2048, ISSN (Online): 2231 0320.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chowdhury, R., Roy, O., Datta, S., Dasgupta, S. (2018). Virtual Data Warehouse Model Employing Crypto–Math Modus Operandi and Intelligent Sensor Algorithm for Cosseted Transference and Output Augmentation. In: Margret Anouncia, S., Wiil, U. (eds) Knowledge Computing and Its Applications. Springer, Singapore. https://doi.org/10.1007/978-981-10-6680-1_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-6680-1_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6679-5
Online ISBN: 978-981-10-6680-1
eBook Packages: Computer ScienceComputer Science (R0)