Open Access Open Access  Restricted Access Subscription or Fee Access

Assuring Integrity for Data in Transit in Real-Time Data-Warehousing Systems

Imane Lebdaoui(1*), Said El Hajji(2), Ghizlane Orhanou(3)

(1) Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, Mohammed V University, Morocco
(2) Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, Mohammed V University, Morocco
(3) Laboratory of Mathematics, Computing and Applications, Faculty of Sciences, Mohammed V University, Morocco
(*) Corresponding author


DOI: https://doi.org/10.15866/irecap.v7i2.12391

Abstract


The process of decision-making becomes more and more complicated with the increasing amount of data flowing between operational information systems and data-warehouses. The challenge is how to reflect a holistic view of the existing activity, but also to provide a reliable prediction of its future evolution in an area where real time data is gaining more ground. Therefore, the decision relevance depends on both the freshness and the integrity of the data in use. However, as the experience has shown, heavy assurance of security affects negatively the system performance, which goes against the real-time requirement. This paper sheds light on the potential integrity issues facing data in transit within a real-time data-warehousing environment, and introduces a new model that helps to ensure the integrity throughout a given real-time data-warehousing system.
Copyright © 2017 Praise Worthy Prize - All rights reserved.

Keywords


Data-Warehouse; Data in Transit; Decision-Making; Integrity; Real-Time

Full Text:

PDF


References


Bertino, Elisa. Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control Applications. Report, PURDUE UNIV LAFAYETTE IN, (2010).
http://dx.doi.org/10.1145/1133058.1133074

I. Lebdaoui, G. Orhanou and S. El Hajji, Data Integrity in Real-time Data-warehousing, Proceedings of the World Congress on Engineering (WCE), London, UK, (2013) July 3-5, (vol. III, Pages: 1516-1519 Year of publication 2013, ISBN:978-988192529-9)
http://dx.doi.org/10.1109/icemis.2016.7745332

R.J. Santos, J. Bernardino, M. Vieira, A survey on data security in Data-warehousing: Issues, challenges and opportunities, Proceedings of International Conference on Computer as a tool (EUROCON), IEEE(Pages: 1-4 Year of Publication: 2011).
http://dx.doi.org/10.1109/eurocon.2011.5929314

Sivathanu, G., Wright, C. P., Zadok, E. (n.d.). Ensuring Data Integrity in Storage: (2005), Proceedings of the 2005 ACM workshop on Storage security and survivability (Pages. 26-36. Year of publication 2005, ISBN:1-59593-233-X)
http://dx.doi.org/10.1145/1103780.1103784

I. Lebdaoui, G. Orhanou and S. El Hajji, An Integration Adaptation for Real-Time Data-warehousing, International Journal of Software Engineering and Its Applications, Vol. 8, No. 11, pp.115-128, 2014
http://dx.doi.org/10.1109/icemis.2016.7745332

Dr. S.L. Gupta, Sonali Mathur, Palak Modi, Data Warehouse Vulnerability and Security, International Journal of Scientific & Engineering Research, Vol.3,n. 5, pp.1-5, 2012
http://dx.doi.org/10.5861/ijrsc.2016.1334

Nouha Zellal, Abdellah Zaouia, A measurement model for factors influencing data quality in data warehouse, Proceeding of Information Science and Technology (CiSt), 2016 4th IEEE International Colloquium on (Pages:46-51 Year of Publication:2016 ISSN: 2327-1884)
http://dx.doi.org/10.1109/cist.2016.7805102

Rahman, N. Enterprise Data Warehouse Governance Best Practices. International Journal of Knowledge-Based Organizations (IJKBO), Vol.6 n. 2,pp. 21-37,2016
http://dx.doi.org/10.4018/ijkbo.2016040102

Elisa Bertino, Chenyun Dai, Hyo-Sang Lim , Dan Lin, High-Assurance Integrity Techniques for Databases, Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge(BNCD: SDINK), Cardiff, Wales, UK — July 07 - 10, ( Pages 244 – 256, year of publication 200, ISBN: 978-3-540-70503-1)
http://dx.doi.org/10.1007/978-3-540-70504-8_26

GHAEB, Jasim A., SMADI, Mahmoud A., et CHEBIL, Jalel. A high performance data integrity assurance based on the determinant technique. Future Generation Computer Systems, Vol. 27, no 5, pp. 614-619,2011
http://dx.doi.org/10.1016/j.future.2010.05.011

Max North, Larry Thomas , Ronny Richardson , Patrick Akpess, Data Warehousing: A Practical Managerial Approach, Computer Science and Information Technology, Vol. 4 n.6, pp. 198-206, 2016
http://dx.doi.org/10.13189/csit.2017.050103

KUMAR, Satish, SINGH, Buta, et KAUR, Gagandeep. Data Warehouse Security Issue. International Journal of Advanced Research in Computer Science, Vol. 7, n. 6, p177-179, 2016
http://dx.doi.org/10.5120/ijca2016908056

Dai, Chenyun, Dan Lin, Elisa Bertino, and Murat Kantarcioglu, Trust evaluation of data provenance. Center for Education and Research Information Assurance and Security, PurdueUniversity, 2008
http://dx.doi.org/10.1007/978-3-540-85259-9_6

Rizzi, S., Abelló, A., Lechtenbörger, J., & Trujillo, J. Research in data warehouse modeling and design: dead or alive? Proceedings of the 9th ACM international workshop on Data warehousing and OLAP (Pages: 3-10 Year of publication: 2006 ISBN:1-59593-530-4)
http://dx.doi.org/10.1145/1183512.1183515

April Reeve, Managing Data in Motion: Data Integration Best Practice Techniques and Technologies (Kindle Edition, 2013).
http://dx.doi.org/10.1016/b978-0-12-397167-8.00013-3

Denney, M. J., Long, D. M., Armistead, M. G., Anderson, J. L., & Conway, B. N. Validating the extract, transform, load process used to populate a large clinical research database. International Journal of Medical Informatics,Vol. 94, pp. 271-274, 2016
http://dx.doi.org/10.1016/j.ijmedinf.2016.07.009

G. Thangaraju , X. Agnise Kala Rani, Multi User Profile Orient Access Control based Integrity Management for Security Management in Data Warehouse, Indian Journal of Science and Technology, Vol. 9, n.22, pp. 1-7, 2016
http://dx.doi.org/10.17485/ijst/2016/v9i22/90927

McKelvey, N., Curran, K., &Toland, L, The Challenges of Data Cleansing with Data Warehouses, Effective Big Data Management and Opportunities for Implementation, 5,(USA: IGI Global, 2016, 77-82)
http://dx.doi.org/10.4018/978-1-5225-0182-4.ch005

WILLIAMS, Connard. Experimentation with Raw Data Vault Data Warehouse Loading, Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, (Year of publication 2016)
http://dx.doi.org/10.1016/b978-0-12-802510-9.00012-x

Pore, M. E., &Chougule, A. B. Proof of Data Integrity Using No-SQL Database in Cloud Storage: A Survey, Networking and Communication Engineering, Vol. 8, n.2, pp. 47-49, 2016
http://dx.doi.org/10.17148/ijarcce.2014.31019

Sookhak, M., Gani, A., Khan, M. K., &Buyya, R. Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, Vol. 380, pp. 101-116,2017
http://dx.doi.org/10.1016/j.ins.2015.09.004

Rahman, Nayem. An empirical study of data warehouse implementation effectiveness, International Journal of Management Science and Engineering Management, Vol.12, n.1, pp. 55-63, 2017
http://dx.doi.org/10.1080/17509653.2015.1113394

Lebdaoui, I., El Hajji, S., & Orhanou, G. (2016, September). Managing big data integrity. Proceeding in International Conference on Engineering & MIS-ICEMIS IEEE (Page. 1-6 Year of publication 2016)
http://dx.doi.org/10.1109/icemis.2016.7745332

Flowerday, S., von Solms, Real-time information integrity=system integrity+ data integrity+ continuous assurances. Computers & Security, Vol.24, n.8, pp. 604–613,2005
http://dx.doi.org/10.1016/j.cose.2005.08.004

Oracle Corporation2015, www.oracle.com.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2020 Praise Worthy Prize