Skip to main content

Virtual Data Warehouse Model Employing Crypto–Math Modus Operandi and Intelligent Sensor Algorithm for Cosseted Transference and Output Augmentation

  • Chapter
  • First Online:
Knowledge Computing and Its Applications

Abstract

A data warehouse is a storehouse which comprises all specifics and statistics of the institution. With the contemporary leaning of hacking beside the initiation of fresh hacking proficiency, the safekeeping for data warehouse has transpired to be an influential portion. The projected work exemplifies how an encryption technique is germane in the internal structure of a data warehouse. Apiece instant, any user endeavor for entrance to the information, the data in encrypted form is furnished to the user. Only an authenticated user would be able to obtain the original form of the data, because a well-defined decryption algorithm is installed at the authentic user’s end only. The formulation of the spotless Intelligent Sensor Algorithm and the proposed cryptographic modus operandi ascertain that there would be considerable attenuation of admittance time, with observance for the cosseted transference, enhanced infringement avoidance and output augmentation. The applicable employment of the proposed virtual data warehouse model with improved safekeeping might be in its noteworthy utility in an assortment of institution where accrual of cosseted information is of extreme extent. The assortment of associations is inclusive of edifying institutions, business communities, medicinal associations, classified enterprises and there on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., & De, M. (2015). Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. International Journal of Application or Innovation in Engineering and Management, 4(12), 35–42. ISSN: 2319 4847. Indexed in Thomson Reuters Researcher ID–N–6095–2015.

    Google Scholar 

  2. Chowdhury, R., Datta, S., Dasgupta, S., & De, M. (2015). Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. International Journal of Advanced Computer Science and Applications, 6(11), 29–34, ISSN (Online): 2156 5570, ISSN (Print): 2158 107X.

    Google Scholar 

  3. Chowdhury, R., Dey, K. S., Datta, S., & Shaw, S. (2014). Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore (pp. 55–60). Proceedings in USB: CFP14AWQ-USB, ISBN–978-1-4799-6628-8, INSPEC Accession Number–14881472, Published and Archived in IEEE Digital Xplore, ISBN: 978-1-4799-6629-5.

    Google Scholar 

  4. Chowdhury, R., Chatterjee, P., Mitra, P., & Roy, O. (2014). Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. International Journal of Innovative Research in Science, Engineering and Technology, 3(6), 165–172. ISSN (Online): 2319 8753, ISSN (Print): 2347 6710.

    Google Scholar 

  5. Chowdhury, R., Pal, B., Ghosh, A., & De, M. (2012). A data warehouse architectural design using proposed pseudo mesh schema. In Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata (pp. 138–141). Tata McGraw Hill Education Private Limited. ISBN (13)–978-1-25-906170-7, ISBN (10)–978-1-25-906170-1.

    Google Scholar 

  6. Chowdhury, R., & Pal, B. (2010). Proposed hybrid data warehouse architecture based on data model. International Journal of Computer Science and Communication, 1(2), 211–213. ISSN: 0973 7391.

    Google Scholar 

  7. Saurabh, A. K., & Nagpal, B. (2011). A survey on current security strategies in data warehouses. International Journal of Engineering Science and Technology, 3(4), 3484–3488. ISSN: 0975 5462.

    Google Scholar 

  8. Santos, R. J., Bernardino, J., & Vieira, M. (2011). A survey on data security in data warehousing: Issues, challenges and opportunities. In International Conference on Computer as a Tool, EUROCON IEEE, Lisbon (pp. 1–4). INSPEC Accession Number–12075581, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4244-7486-8.

    Google Scholar 

  9. Vieira, M., Vieira, J., & Madeira, H. (2008). Towards data security in affordable data warehouse. In 7th European dependable computing conference.

    Google Scholar 

  10. Patel, A., & Patel, J. M. (2012). Data modeling techniques for data warehouse. International Journal of Multidisciplinary Research, 2(2), 240–246.

    Google Scholar 

  11. Chaudhuri, S., & Dayal, U. (1997). An overview of data warehousing and OLAP technology. Newsletter ACM SIGMOD Record, 26(1), 65–74.

    Article  Google Scholar 

  12. Farhan, M. S., Marie, M. E., El-Fangary, L. M., & Helmy, Y. K. (2011). An integrated conceptual model for temporal data warehouse security. Computer and Information Science, 4(4), 46–57.

    Google Scholar 

  13. Golfarelli, M., Maio, D., & Rizzi, S. (1998). The dimensional fact model: A conceptual model for data warehouses. International Journal of Cooperative Information Systems, 7(2–3), 215–247.

    Article  Google Scholar 

  14. Golfarelli, M., & Rizzi, S. (1998). A methodological framework for data warehouse design. In Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington (pp. 3–9).

    Google Scholar 

  15. Chowdhury, R., Bose, R., Sengupta, N., & De, M. (2012). Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik Rotation Algorithm. In Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata (pp. 564–567). Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR, ISBN–978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN–978-1-4673-4697-9, INSPEC Accession Number–13285714, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-4700-6.

    Google Scholar 

  16. Chowdhury, R., Ghosh, S., & De, M. (2012). String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh (pp. 1152–1157). Proceedings in CD: IEEE Catalog Number–CFP1244S-CDR, ISBN–978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN–978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, INSPEC Accession Number–13058551, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-1153-3.

    Google Scholar 

  17. Chowdhury, R., Dutta, S., & De, M. (2014). Towards design, analysis and performance enhancement of data warehouse by implementation and simulation of p2p technology on proposed pseudo mesh architecture. International Journal of Innovative Research in Science, Engineering and Technology, An ISO 3297:2007 Certified Organization, 3(6), 178–187. ISSN (Print): 2347 6710, ISSN (Online): 2319 8753.

    Google Scholar 

  18. Pal, B., Chattopadhyay, S., Mitra, S., Chowdhury, R., & De, M. (2012). Study and comparison of indexing models in data warehouse. International Journal of Software Engineering Research & Practices, 2(3), 1–8, ISSN (Print): 2231 2048, ISSN (Online): 2231 0320.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajdeep Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chowdhury, R., Roy, O., Datta, S., Dasgupta, S. (2018). Virtual Data Warehouse Model Employing Crypto–Math Modus Operandi and Intelligent Sensor Algorithm for Cosseted Transference and Output Augmentation. In: Margret Anouncia, S., Wiil, U. (eds) Knowledge Computing and Its Applications. Springer, Singapore. https://doi.org/10.1007/978-981-10-6680-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6680-1_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6679-5

  • Online ISBN: 978-981-10-6680-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics