Enhancing Security in Banking Environment Using Business Intelligence

Datawarehousesarethemostvaluableassetsofanorganizationandarebasicallyusedforcritical business and decision-making purposes. Data from different sources is integrated into the data warehouse.Thus,securityissuesariseasdataismovedfromoneplacetoanother.Datawarehouse securityaddressesthemethodologiesthatcanbeusedtosecurethedatawarehousebyprotecting informationfrombeingaccessedbyunauthorizedusersformaintainingthereliabilityofthedata warehouse.Adatawarehouseinvariablycontainsinformationwhichneedstobeconsideredextremely sensitiveandconfidential.Protectingthisinformationisinvariablyveryimportantasdatainthedata warehouseisaccessedbyusersatvariouslevelsintheorganization.Theauthorsproposeamethod toprotectinformationbasedonanencryptionschemewhichsecuresthedatainthedatawarehouse. Thisarticlepresentsthemostfeasiblesecurityalgorithmthatcanbeusedforsecuringthedatastored intheoperationaldatabasesoastopreventunauthorizedaccess. KEywoRdS Cryptography, Data Decryption, Data Encryption, Data Storage, Data Warehouse, Data Warehouse Security, Database

[1]  Georgios Loukas,et al.  Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..

[2]  Priyadarshini Patil,et al.  A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .

[3]  LoukasGeorgios,et al.  Protection Against Denial of Service Attacks , 2010 .

[4]  Marlene Goncalves,et al.  Supporting Position Change through On-Line Location-Based Skyline Queries , 2016 .

[5]  Kristian Beckers,et al.  Pattern and Security Requirements , 2015, Springer International Publishing.

[6]  Reda Mohamed Hamou,et al.  Sonar Data Classification Using a New Algorithm Inspired from Black Holes Phenomenon , 2018, Int. J. Inf. Retr. Res..

[7]  Kit Yan Chan,et al.  Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions , 2019, AINA Workshops.

[8]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .

[9]  Tingyuan Nie,et al.  Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[10]  Masoud Mohammadian Intelligent Agents for Data Mining and Information Retrieval , 2004 .

[11]  Gurvinder Singh,et al.  Performance Analysis of Statistical and Supervised Learning Techniques in Stock Data Mining , 2018, Data.

[12]  Luiz Fernando Capretz,et al.  Security Issues in Data Warehouse , 2015, ArXiv.

[13]  Jorge Bernardino,et al.  A data masking technique for data warehouses , 2011, IDEAS '11.

[14]  J. Efrim Boritz,et al.  IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..

[15]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[16]  Zahraddeen Abubakar Pindar,et al.  A Survey on the Cryptographic Encryption Algorithms , 2017 .

[17]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[18]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[19]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[20]  Kit Yan Chan,et al.  Twitter mining for ontology-based domain discovery incorporating machine learning , 2018, J. Knowl. Manag..

[21]  Shawkat K. Guirguis,et al.  A Survey on Cryptography Algorithms , 2018 .

[22]  Chantal Soulé-Dupuy,et al.  A Textual Warehouse Approach: A Web Data Repository , 2004 .

[23]  Anjana Gosain,et al.  Security Issues in Data Warehouse: A Systematic Review☆ , 2015 .

[24]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[25]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.