Skip to main content

DWSA: A Secure Data Warehouse Architecture for Encrypting Data Using AES and OTP Encryption Technique

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 742))

Abstract

Data warehouse is the most important asset of an organization as it contains highly valuable and sensitive information that is useful in decision-making process. The data warehouse provides easy access to organizational data as it contains data from different sources. Thus, it is essential to structure security measures for the protection of data that resides in data warehouse against malicious attackers to ensure proper security and confidentiality. Security should be considered vital from initial stages of designing data warehouse and hence should be deployed. Though a lot of work is being done towards the improvement and development of data warehouse till now but very less attention is given on the implementation of the security approaches in data warehouse. This paper focuses on improving the level of security by combining One-Time Pad (OTP) encryption technique with Advanced Encryption Standard (AES) to encrypt the data before loading it into data warehouse. Finally, the proposal of the model is to incorporate OTP encryption technique in the architecture of data warehouse for enhancing its security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pooniah, P.: Data Warehousing Fundamentals-A Comprehensive Guide for IT Professionals. Wiley (2001)

    Google Scholar 

  2. Inmon, W.H.: Building the Data Warehouse. Wiley, Chichester (1996)

    Google Scholar 

  3. Oracle white paper: security and the Data Warehouse, Apr 2005

    Google Scholar 

  4. Borowski, M., Leśniewicz, M.: Modern usage of “old” one-time pad. In: Proceedings of Communications and Information Systems Conference (MCC), Gdansk, Poland (2012)

    Google Scholar 

  5. Soofi, A.A., Riaz, I., Rasheed, U.: An enhanced vigenere cipher for data security. Int. J. Sci. Technol. Res. 5(3) (2016)

    Google Scholar 

  6. Patil, S., Kumar, A.: Effective secure encryption scheme (One Time Pad) using complement approach. Int. J. Comput. Sci. Commun. (2014)

    Google Scholar 

  7. Soler, E., Trujillo, J., Fernández-Medina, E., Piattini, M.: A framework for the development of secure data warehouses based on MDA and QVT. In: Proceedings of Second International Conference on Availability, Reliability and Security, IEEE (2007)

    Google Scholar 

  8. Ahmad, S., Ahmad, S.: An improved security framework for data warehouse: a hybrid approach. In: Proceedings of Information Technology (ITSim), IEEE, Malaysia (2010)

    Google Scholar 

  9. Santos, R.,J., Bernardino, J., Vieira, M.: Balancing security and performance for enhancing data privacy in data warehouses, In: Proceedings of International Joint Conference, IEEE (2011)

    Google Scholar 

  10. AES: Advanced Encryption Standard, U.S. Doc/NIST, FIPS Publication 197, Nov 2002

    Google Scholar 

  11. Widiasari, I.R.: Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security. Int. J. Comput. Appl. 57(20) (2012)

    Google Scholar 

  12. Tool: One-time Pad—Dezepagina in het Netherlands, Manuals one time pads

    Google Scholar 

  13. Tang, S., Liu, F.: A one-time pad encryption algorithm based on one way hash and conventional block cipher. In: Proceedings of IEEE Conference (2012)

    Google Scholar 

  14. Lio Zheng, X.: Research on security of MD5 algorithm application. In: Proceedings of International Conference (CST), Beijing, China (2016)

    Google Scholar 

  15. Ali, O., Ouda, A.: A classification module in data masking framework for business intelligence platform in healthcare. In: 7th International Proceedings of Annual Conference (IEMCON), IEEE, Vancouver, Canada (2016)

    Google Scholar 

  16. Rivest, R.L.: The MD5 Message Digest Algorithm, RFC 1321 (1992)

    Google Scholar 

  17. Sears, I.: Rijndael AES. http://www.unc.edu/marzuola/Math547_S13/Math547_S13_Projects/I_Sears_Section003_AdvancedEncryptionStandard.pdf

  18. Triki, S., Ben-Abdallah, H., Harbi, N., Boussaid. O: Securing the Data Warehouse: A Semi Automatic Approach for Inference Prevention at the Design Level, Model and Data Engineering, LNCS, vol. 6918, pp. 71-84. Springer (2011)

    Google Scholar 

  19. Santos, R.J., Bernardino, J., Vieira, M.: A data masking technique for data warehouses. In: Proceedings of ACM Communication, IDEAS11. ACM, Portugal (2011)

    Google Scholar 

  20. Oracle Inc.: Data Masking Best Practices, White Paper, July (2010)

    Google Scholar 

  21. Santos, R.J., Bernardino, J., Vieira, M.: A survey on data security in data warehousing issues, challenges and opportunities. In: Proceedings of International Conference on Computer as a Tool (EUROCON), IEEE, Lisbon, pp. 1–4 (2012)

    Google Scholar 

  22. Stallings, W.: http://williamstallings.com/Extras/SecurityNotes/lectures/authent.html (2012). Accessed Dec 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shikha Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, S., Jain, S., Agarwal, M. (2019). DWSA: A Secure Data Warehouse Architecture for Encrypting Data Using AES and OTP Encryption Technique. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_47

Download citation

Publish with us

Policies and ethics