Preventive inference control between user profiles in data warehouse

##plugins.themes.academic_pro.article.main##

Amina EL OUAZZANI
Salah OUEDERROU
Sara IBN EL AHRACHE
Nouria HARBI
Hassan BADIR

Abstract

The detections of inferences between multidimensional queries tend to be more sensitive than data separately. These combinations must be modeled in order to avoid the inference of unauthorized data. However, no work has dealt with inference management in the case of a user who combines two or more permissions. In this paper, we present our approach that focuses on detecting inferences of sensitive data of DW (Data Warehouse) by a user occupying one or more profiles within the company, using the graphical presentation of the permissions and Exploiting associations of source databases.

##plugins.themes.academic_pro.article.details##

How to Cite
Amina EL OUAZZANI, Salah OUEDERROU, Sara IBN EL AHRACHE, Nouria HARBI, & Hassan BADIR. (2018). Preventive inference control between user profiles in data warehouse. International Journal of Next-Generation Computing, 9(2), 99–118. https://doi.org/10.47164/ijngc.v9i2.142

References

  1. Accorsi, R. andM¨uller, G. 2013. Preventive inference control in data-centric business models. Security and Privacy Workshops (SPW). IEEE , 28–33.
  2. Albertini, Alberto, D., Carminati, B., and Ferrari, E. 2017. An extended access control mechanism exploiting data dependencies. International Journal of Information Security , 75–89.
  3. Arora, D. and Kumar, U. 2016. Protecting sensitive warehouse data through uml based modeling. Proceedings of the International Conference on Informatics and Analytics , 31.
  4. Blanco, C., Fern´andez-Medina, E., Trujillo, J., and Jurjens, J. 2010. Towards the secure modelling of olap users behaviour.
  5. Chen, D. and He, Y. 2010. A study on secure data storage strategy in cloud computing. Journal of Convergence Information Technology .
  6. De Capitani di Vimercati, S. 2008. Assessing query privileges via safe and efficient permission composition. Proceedings of the 15th ACM conference on Computer and communications secur.
  7. Eavis, T. and Althamimi, A. 2012. Olap authentication and authorization via queryre-writing. The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications, 130–139.
  8. Fernandez-Medina, E., Trujillo, J., Villarroel, R., and Piattini, M. 2006. Access control and audit model for the multidimensional modeling of dws. Decision Support Systems, 1270–1289.
  9. Ouazzani, A., Rhazlane, S., N.Harbi, and H.Badir. 2016. Dynamic management of data warehouse security levels based on user profiles. Information Science and Technology (CiSt),4th IEEE International Colloquium , 59–64.
  10. Rosenthal, A. and Sciore, S. 2000. View security as the basis for data warehouse security.
  11. Saltor, F., Oliva, M., Abello, A., and Samos, J. 2002. Building secure data warehouse schemas from federated information systems.
  12. Sellami, M., Hacid, M. S., and Gammoudi, M. M. 2015. Inference control in data integration systems. OTM Confederated International Conferences"On the Move to Meaningful Internet Systems.
  13. Soler, E., Trujillo, J., Fernandez-Medina, E., and Piattini, M. 2008. Building a secure star schema in data warehouses by an extension of the relational package from cwm. Computer Standards and Interfaces 30 , 341–350.
  14. Sweeney, L. 2002. k-anonymity: A model for protecting privacy.
  15. Triki, S. ., BEN ABDALLAH, H., BOUSSAID, O., and HARBI, N. 2013. S´ecurisation des entrepots de donn´ees: de la conception a l’exploitation. Rapport de these.
  16. Trujillo, J., Soler, E., Blanco, C., and Fernandez-Medina, E. 2009. Designing secure data warehouse by using mda and qvt. Journal of Universal Computer Science 8 15, 1607–1641.