CFP last date
20 January 2025
Reseach Article

A Security Algorithm for Online Analytical Processing Data Cube

by Narander Kumar, Vishal Verma, Vipin Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 14
Year of Publication: 2013
Authors: Narander Kumar, Vishal Verma, Vipin Saxena
10.5120/13807-1768

Narander Kumar, Vishal Verma, Vipin Saxena . A Security Algorithm for Online Analytical Processing Data Cube. International Journal of Computer Applications. 79, 14 ( October 2013), 7-10. DOI=10.5120/13807-1768

@article{ 10.5120/13807-1768,
author = { Narander Kumar, Vishal Verma, Vipin Saxena },
title = { A Security Algorithm for Online Analytical Processing Data Cube },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number14/13807-1768/ },
doi = { 10.5120/13807-1768 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:58.026572+05:30
%A Narander Kumar
%A Vishal Verma
%A Vipin Saxena
%T A Security Algorithm for Online Analytical Processing Data Cube
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 14
%P 7-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The progress of data exchange in the electronic way increases the requirement of data security. Since data security needs more resources to access stored the information this leads to new mechanism and algorithm. Therefore the researcher interest moves to provide different techniques for security concern. There are various mechanisms available in the literature for images and other concern. If there is use of on-line analytical processing (OLAP) data cube then there is lack of techniques or mechanisms in this area. In present work, a Security Encryption Algorithm for On-Line Analytical Processing (SEAOLAP) data cube. Since data cube provided itself is a technique to find the edges for business concern to any system. These edges are the most important data for any business system. The proposed technique is based on the logarithmic properties and power functions. Through these techniques after encryption we send only mathematical data for electronic communication. Only mathematical data is used in E-communication, which provides the strong encryption key to hide the information.

References
  1. Nidhi Singhal, J. P. S. Raina "Comparative Analysis of AES and RC4 Algorithms for Better Utilization", International Journal of Computer Trends and Technology- July to Aug Issue 2011.
  2. H. Brown, Considerations in Implementing A Database Management System Encryption Security Solution, A Research Report presented to The Department of Computer Science at the University of Cape Town, 2003.
  3. G. Davida, D. L. Wells, and J. B. Kam, "A database encryption system with subkeys," ACM Transactions on Database Systems, vol. 6, no. 2, pp. 312–328, 1981.
  4. H. Hacig¨um¨us, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of ICDE, pp. 29–38, 2002.
  5. J. He and M. Wang, "Cryptography and relational database management system," IDEAS, pp. 273–284, 2001.
  6. Oracle, Oracle9i Database Security for eBusiness, An Oracle White Paper, June 2001.
  7. Richa Kumari Sharma, S. R. Biradar, B. P. Singh, "Shared Architecture forEncryption/Decryption of AES" International Journal of Computer Applications, Volume 69– No. 18, pp-1-6, May 2013.
  8. Balajee Maram,K Lakshmana Rao, Y Ramesh Kumar, " Encryption and Decryption Algorithm using 2-D Matrices" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, pp-352-356, ISSN: 2277 128X, April 2013.
  9. Ayesha Khan, Parul Bhanarkar, Pragati Patil, " RSA Encryption Technique based on Geo Location" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, pp-352-356, ISSN: 2277 128X, April 2013.
  10. Priti V. Bhagat, Kaustubh S. Satpute, Vikas R. Palekar, "Reverse Encryption Algorithm: A Technique for Encryption &Decryption" International Journal of Latest Trends in Engineering and Technology, Vol. 2 Issue 1, pp-99-95, January 2013.
  11. Sunita Bhati, Anita Bhati, S. K. Sharma, "A New Approach towards Encryption Schemes: Byte – Rotation ncryption Algorithm" Proceedings of the World Congress on Engineering and Computer Science, Vol II, pp-1-4, October 24-26, 2012.
  12. Ravindu Madanayake , Nikila Peiris, Gayan Ranaweera,"Advanced Encryption Algorithm Using Fuzzy Logic" International Conference on Information and Computer Networks, IACSIT Press, Singapore, vol. 27, pp-32-36, 2012.
  13. OMG "Unified Modeling Language Specification", 2010, http://www. omg. org.
  14. Amol Bhosle, Yogadhar Pandey, "Applying Security to Data Using Symmetric Encryption in MANET" International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 1, pp-426-430, January 2013.
  15. Pia Singh, Prof. Karamjeet Singh, "IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB" International Journal of Scientific & Engineering Research, Volume 4, Issue 7, pp-150-154, July-2013.
  16. Mohini Chaudhari, Dr. Kanak Saxena, "Fast and Secure Data Transmission using Symmetric Encryption and Lossless Compression" International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 2, pp. 58 – 63, February 2013.
  17. Rajan. S. Jamgekar, Geeta Shantanu Joshi, "File Encryption and Decryption Using Secure RSA" International Journal of Emerging Science and Engineering (IJESE), Volume-1, Issue-4, pp-11-14, February 2013.
  18. Reza Moradi Rad, Abdolrahman Attar and Reza Ebrahimi Atani, "A Comprehensive Layer Based Encryption Method for Visual Data" International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6, No. 1, pp-37-48, February, 2013.
  19. Weng-Long Chang,Minyi Guo ; Ho, M. S. , "Fast parallel molecular algorithms for DNA-based computation: factoring integers" NanoBioscience, IEEE Transactions on Volume:4 , Issue: 2 , pp-149 – 163, June 2005.
  20. Meikang Qiu, Wenzhong Gao ; Min Chen ; Jian-Wei Niu ; Lei Zhang, "Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System" Smart Grid, IEEE Transactions, Volume:2 , Issue: 4, pp- 715 – 723, Dec. 2011.
  21. N. Kumar, Y. D. S. Arya, "Rate Controlled Adaptive Resource Coordination Framework for Wireless Aware Multimedia Applications", International Journal of Computer Science and Network Security, pp. 99-105, Vol. 10, No. 12, December 2010.
  22. Narander Kumar, Vishal Verma, Vipin Saxena, "Data Cube Representation for Vehicle Insurance Policy System", International Journal of Computer and their Application. pp. 1-4, Vol. 58, No. 1, November 2012.
  23. Dr. Mukul Chandra Pal, "Data Security And Cryptography Based On DNA Sequencing" International Journal of Computer Applications, pp-1-9, Volume 10, Issue No: 3:, July/August , 2013.
  24. Manpreet Kaur, Rajbir Singh, "Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing" International Journal of Computer Applications (0975 – 8887) Volume 70– No. 18,pp-1-6, May 2013.
Index Terms

Computer Science
Information Sciences

Keywords

OLAP SEAOLAP Data Cube e-communication UML