IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud

An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud
View Sample PDF
Author(s): Claudivan Cruz Lopes (Federal Institute of Education, Science and Technology of Paraíba, Patos, Brazil), Valéria Cesário-Times (Federal University of Pernambuco, Recife, Brazil), Stan Matwin (Dalhousie University, Nova Scotia, Canada & Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland), Cristina Dutra de Aguiar Ciferri (University of São Paulo, São Paulo, Brazil)and Ricardo Rodrigues Ciferri (Federal University of São Carlos, São Carlos, Brazil)
Copyright: 2021
Pages: 32
Source title: Research Anthology on Artificial Intelligence Applications in Security
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-7705-9.ch026

Purchase

View An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud on the publisher's website for pricing and purchasing information.

Abstract

A cloud data warehouse (cloud DW) is a subject-oriented, integrated, time-variant, voluminous, nonvolatile and multidimensional distributed database that is hosted in a cloud. A solution to ensure data confidentiality for a cloud DW is cryptography. In this article, the authors propose an encryption methodology for a cloud DW stored according to the star schema, considering both the data confidentiality maintenance of the DW and the capability of processing analytical queries directly over the encrypted DW. The proposed encryption methodology comprises an encryption strategy for DW called MV-HO (MultiValued and HOmomorphic) for the definition of how the different types of DW's attributes must be encrypted. The proposed MV-HO encryption strategy was compared with encryption strategies based on symmetric encryption, order preserving symmetric encryption and homomorphic encryption. Results indicated that MV-HO is the best solution found, as MV-HO is pareto-optimal with respect to other strategies investigated.

Related Content

Kamel Mouloudj, Vu Lan Oanh LE, Achouak Bouarar, Ahmed Chemseddine Bouarar, Dachel Martínez Asanza, Mayuri Srivastava. © 2024. 20 pages.
José Eduardo Aleixo, José Luís Reis, Sandrina Francisca Teixeira, Ana Pinto de Lima. © 2024. 52 pages.
Jorge Figueiredo, Isabel Oliveira, Sérgio Silva, Margarida Pocinho, António Cardoso, Manuel Pereira. © 2024. 24 pages.
Fatih Pinarbasi. © 2024. 20 pages.
Stavros Kaperonis. © 2024. 25 pages.
Thomas Rui Mendes, Ana Cristina Antunes. © 2024. 24 pages.
Nuno Geada. © 2024. 12 pages.
Body Bottom