CFP last date
22 April 2024
Reseach Article

Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage

Published on March 2012 by Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 2
March 2012
Authors: Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil
265442a0-fdaa-4be1-b2c7-fb148a0e75d9

Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil . Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 2 (March 2012), 18-23.

@article{
author = { Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil },
title = { Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 2 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 18-23 },
numpages = 6,
url = { /proceedings/icwet2012/number2/5321-1012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Preeti Patil
%A Nitin Chavan
%A Srikantha Rao
%A S B Patil
%T Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 2
%P 18-23
%D 2012
%I International Journal of Computer Applications
Abstract

Now days, many organizations outsource some of their important data to some outside trusted agents. This outsourced data coming from the data warehouse of the organization through ETL process may have some sensitive information. Though the agents are trusted one, the sensitive data may be given by them to some outside untrustworthy third party. This is known as data leakage. Such a data leakage may be the result of guilty agents or may be the third party has guessed or intruded the data by some other means. To find out whether the data has been given by agent or by some other means, the third party has guessed it, is very important issue. In this project, some data allocation techniques to trusted agents are presented that will improve the probability of identifying the guilty agents. The methods used do not modified the data. Also to find out the guilty agent is another sensitive topic. This paper proposes a system to find out the leakage of data and also the guilty agents. Few “realistic but fake” data can be injected to find out guilty agents.

References
  1. Panagiotis Papadimitriou, Hector Garcia-Molina. 2010. Data Leakage Detection, IEEE Transaction On Knowledge And Data Engineering.
  2. Chuanxian Jiang, Xiaowei Chen, Zhi Li. 2009. Watermarking Relational Databases for Ownership Protection Based on DWT. Fifth International Conference on Information Assurance and Security.
  3. Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakantham. 2007. A Decision Theoretic Approach to Data Leakage Prevention. IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust.
  4. Yingjiu Li, Vipin Swarup, Sushil Jajodia. 2005. Fingerprinting Relational Databases: Schemes and Specialties. IEEE Transaction on Dependable And Secure Computing.
  5. Mohamed Shehab; Elisa Bertino, Arif Ghafoor. 2008. Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Transactions on Knowledge and Data Engineering.
  6. Yuer Wang, Zhongjie Zhu, Feng Liang, Gangyi Jiang. 2008. Watermarking Relational Data Based on Adaptive Mechanism. Proceedings of IEEE International Conference on Information and Automation.
  7. Simitsis, A.; Vassiliadis, P.; Sellis, T. “Optimizing ETL processes in data warehouses”, Data Engineering 21st International Conference, 2005. ICDE 2005. Proceedings. Publication Year: 2005, Page(s): 564 – 575.
Index Terms

Computer Science
Information Sciences

Keywords

Data Ware house ETL Perturbation guilty agents fake objects