Assuring Integrity for Data in Transit in Real-Time Data-Warehousing Systems
The process of decision-making becomes more and more complicated with the increasing amount of data flowing between operational information systems and data-warehouses. The challenge is how to reflect a holistic view of the existing activity, but also to provide a reliable prediction of its future evolution in an area where real time data is gaining more ground. Therefore, the decision relevance depends on both the freshness and the integrity of the data in use. However, as the experience has shown, heavy assurance of security affects negatively the system performance, which goes against the real-time requirement. This paper sheds light on the potential integrity issues facing data in transit within a real-time data-warehousing environment, and introduces a new model that helps to ensure the integrity throughout a given real-time data-warehousing system.
Copyright © 2017 Praise Worthy Prize - All rights reserved.
Bertino, Elisa. Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control Applications. Report, PURDUE UNIV LAFAYETTE IN, (2010).
I. Lebdaoui, G. Orhanou and S. El Hajji, Data Integrity in Real-time Data-warehousing, Proceedings of the World Congress on Engineering (WCE), London, UK, (2013) July 3-5, (vol. III, Pages: 1516-1519 Year of publication 2013, ISBN:978-988192529-9)
R.J. Santos, J. Bernardino, M. Vieira, A survey on data security in Data-warehousing: Issues, challenges and opportunities, Proceedings of International Conference on Computer as a tool (EUROCON), IEEE(Pages: 1-4 Year of Publication: 2011).
Sivathanu, G., Wright, C. P., Zadok, E. (n.d.). Ensuring Data Integrity in Storage: (2005), Proceedings of the 2005 ACM workshop on Storage security and survivability (Pages. 26-36. Year of publication 2005, ISBN:1-59593-233-X)
I. Lebdaoui, G. Orhanou and S. El Hajji, An Integration Adaptation for Real-Time Data-warehousing, International Journal of Software Engineering and Its Applications, Vol. 8, No. 11, pp.115-128, 2014
Dr. S.L. Gupta, Sonali Mathur, Palak Modi, Data Warehouse Vulnerability and Security, International Journal of Scientific & Engineering Research, Vol.3,n. 5, pp.1-5, 2012
Nouha Zellal, Abdellah Zaouia, A measurement model for factors influencing data quality in data warehouse, Proceeding of Information Science and Technology (CiSt), 2016 4th IEEE International Colloquium on (Pages:46-51 Year of Publication:2016 ISSN: 2327-1884)
Rahman, N. Enterprise Data Warehouse Governance Best Practices. International Journal of Knowledge-Based Organizations (IJKBO), Vol.6 n. 2,pp. 21-37,2016
Elisa Bertino, Chenyun Dai, Hyo-Sang Lim , Dan Lin, High-Assurance Integrity Techniques for Databases, Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge(BNCD: SDINK), Cardiff, Wales, UK — July 07 - 10, ( Pages 244 – 256, year of publication 200, ISBN: 978-3-540-70503-1)
GHAEB, Jasim A., SMADI, Mahmoud A., et CHEBIL, Jalel. A high performance data integrity assurance based on the determinant technique. Future Generation Computer Systems, Vol. 27, no 5, pp. 614-619,2011
Max North, Larry Thomas , Ronny Richardson , Patrick Akpess, Data Warehousing: A Practical Managerial Approach, Computer Science and Information Technology, Vol. 4 n.6, pp. 198-206, 2016
KUMAR, Satish, SINGH, Buta, et KAUR, Gagandeep. Data Warehouse Security Issue. International Journal of Advanced Research in Computer Science, Vol. 7, n. 6, p177-179, 2016
Dai, Chenyun, Dan Lin, Elisa Bertino, and Murat Kantarcioglu, Trust evaluation of data provenance. Center for Education and Research Information Assurance and Security, PurdueUniversity, 2008
Rizzi, S., Abelló, A., Lechtenbörger, J., & Trujillo, J. Research in data warehouse modeling and design: dead or alive? Proceedings of the 9th ACM international workshop on Data warehousing and OLAP (Pages: 3-10 Year of publication: 2006 ISBN:1-59593-530-4)
April Reeve, Managing Data in Motion: Data Integration Best Practice Techniques and Technologies (Kindle Edition, 2013).
Denney, M. J., Long, D. M., Armistead, M. G., Anderson, J. L., & Conway, B. N. Validating the extract, transform, load process used to populate a large clinical research database. International Journal of Medical Informatics,Vol. 94, pp. 271-274, 2016
G. Thangaraju , X. Agnise Kala Rani, Multi User Profile Orient Access Control based Integrity Management for Security Management in Data Warehouse, Indian Journal of Science and Technology, Vol. 9, n.22, pp. 1-7, 2016
McKelvey, N., Curran, K., &Toland, L, The Challenges of Data Cleansing with Data Warehouses, Effective Big Data Management and Opportunities for Implementation, 5,(USA: IGI Global, 2016, 77-82)
WILLIAMS, Connard. Experimentation with Raw Data Vault Data Warehouse Loading, Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, (Year of publication 2016)
Pore, M. E., &Chougule, A. B. Proof of Data Integrity Using No-SQL Database in Cloud Storage: A Survey, Networking and Communication Engineering, Vol. 8, n.2, pp. 47-49, 2016
Sookhak, M., Gani, A., Khan, M. K., &Buyya, R. Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, Vol. 380, pp. 101-116,2017
Rahman, Nayem. An empirical study of data warehouse implementation effectiveness, International Journal of Management Science and Engineering Management, Vol.12, n.1, pp. 55-63, 2017
Lebdaoui, I., El Hajji, S., & Orhanou, G. (2016, September). Managing big data integrity. Proceeding in International Conference on Engineering & MIS-ICEMIS IEEE (Page. 1-6 Year of publication 2016)
Flowerday, S., von Solms, Real-time information integrity=system integrity+ data integrity+ continuous assurances. Computers & Security, Vol.24, n.8, pp. 604–613,2005
Oracle Corporation2015, www.oracle.com.
- There are currently no refbacks.
Please send any question about this web site to firstname.lastname@example.org
Copyright © 2005-2020 Praise Worthy Prize