A Security Algorithm for Online Analytical Processing Data Cube

The progress of data exchange in the electronic way increases the requirement of data security. Since data security needs more resources to access stored the information this leads to new mechanism and algorithm. Therefore the researcher interest moves to provide different techniques for security concern. There are various mechanisms available in the literature for images and other concern. If there is use of online analytical processing (OLAP) data cube then there is lack of techniques or mechanisms in this area. In present work, a Security Encryption Algorithm for On-Line Analytical Processing (SEAOLAP) data cube. Since data cube provided itself is a technique to find the edges for business concern to any system. These edges are the most important data for any business system. The proposed technique is based on the logarithmic properties and power functions. Through these techniques after encryption we send only mathematical data for electronic communication. Only mathematical data is used in E-communication, which provides the strong encryption key to hide the information.

[1]  Weng-Long Chang,et al.  Fast parallel molecular algorithms for DNA-based computation: factoring integers , 2005, IEEE Transactions on NanoBioscience.

[3]  N. Kumar,et al.  Rate Controlled Adaptive Resource Coordination Framework for Wireless Aware Multimedia Applications , 2010 .

[4]  S. R. Biradar,et al.  Shared Architecture for Encryption/Decryption of AES , 2013 .

[5]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[6]  Sunita Bhati,et al.  A New Approach towards Encryption Schemes: Byte - Rotation Encryption Algorithm , 2012 .

[7]  Manpreet Kaur,et al.  Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing , 2013 .

[8]  Vipin Saxena,et al.  Data Cube Representation for Vehicle Insurance Policy System , 2012 .

[9]  Pradeep K. W. Abeygunawardhana,et al.  Advanced Encryption Algorithm Using Fuzzy Logic , 2012 .

[10]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[11]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[12]  Reza Moradi Rad,et al.  A Comprehensive Layer Based Encryption Method for Visual Data , 2013 .

[13]  J. P. Raina,et al.  Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .

[14]  Maharashtra India,et al.  RSA Encryption Technique based on Geo Location , 2013 .

[15]  Priti V. Bhagat,et al.  Reverse Encryption Algorithm: A Technique for Encryption & Decryption , 2013 .

[16]  Min Wang,et al.  Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.

[17]  Suman Deb,et al.  Data Security And Cryptography Based On DNA Sequencing , 2013 .

[18]  Rajan. S. Jamgekar,et al.  File Encryption and Decryption Using Secure RSA , 2013 .

[19]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .