IoT-enabled Web warehouse architecture: a secure approach

Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for supporting the effective decision-making process. This paper presents a secure Web service-oriented architecture of the WWh. The proposed architecture provides the better scalability, availability of WWh, and secure analytical service for human and Internet of Things for effective decision making. In addition, the service-oriented architecture of WWh integrates intelligent devices for the process of decision making. The proposed architecture uses XML-based Web services to provide authentication, authorization, and data confidentiality and integrity. Experiments show that the proposed architecture is more reliable, scalable, and secure.

[1]  Juha-Pekka Soininen,et al.  Semantic Interoperability Architecture for Pervasive Computing and Internet of Things , 2014, IEEE Access.

[2]  Mario Piattini,et al.  Implementing Multidimensional Security into OLAP Tools , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  Joonsang Baek,et al.  Survey on certificateless public key cryptography , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[4]  Sean Hughes,et al.  Clustering by Fast Search and Find of Density Peaks , 2016 .

[5]  Brice Morin,et al.  Integrating IoT and IoS with a Component-Based Approach , 2010, 2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications.

[6]  Bai Yong,et al.  Knowledge acquisition process based on data warehouse , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[7]  Yan Zhang,et al.  Effectively Maintaining Multiple View Consistency in Web Warehouses , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[8]  Thiago Luís Lopes Siqueira,et al.  On the performance and use of spatial OLAP tools , 2013, 2013 XXXIX Latin American Computing Conference (CLEI).

[9]  Robert W. Harrison,et al.  FDT 2.0: Improving scalability of the fuzzy decision tree induction tool - integrating database storage , 2014, 2014 IEEE Symposium on Computational Intelligence in Healthcare and e-health (CICARE).

[10]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[11]  Alejandro A. Vaisman,et al.  Web-enabled Temporal OLAP , 2006, 2006 Fourth Latin American Web Congress.

[12]  David C. Yen,et al.  Web warehousing: Web technology meets data warehousing , 2003 .

[13]  Rolf H. Weber,et al.  Internet of things - Need for a new legal environment? , 2009, Comput. Law Secur. Rev..

[14]  Lida Xu,et al.  Internet of Things for Enterprise Systems of Modern Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[15]  Rumen Kyusakov,et al.  Enabling Cloud Connectivity for Mobile Internet of Things Applications , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[16]  Adnan Masood,et al.  Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial services , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[17]  Hongming Cai,et al.  An automatic method of data warehouses multi-dimension modeling for distributed information systems , 2011, Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[18]  Min Chen,et al.  Parallel DBSCAN with Priority R-tree , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[19]  S. Malik,et al.  Web warehouse: Towards efficient distributed business management , 2008, 2008 IEEE International Multitopic Conference.

[20]  A Min Tjoa,et al.  A prototype model for data warehouse security based on metadata , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).

[21]  Y. Sharma,et al.  Building a data warehousing infrastructure based on service oriented architecture , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).

[22]  Sébastien Destercke,et al.  Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse , 2013, IEEE Transactions on Knowledge and Data Engineering.

[23]  Jing Zhang,et al.  Application of Web and Data Warehouse in MDSS Based on Multi-Agent Systems , 2009, 2009 International Conference on Management and Service Science.

[24]  Yan Zhang,et al.  Effectively Maintaining Single View Consistency in Web Warehouses , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[25]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[26]  Torben Bach Pedersen,et al.  Integrating Data Warehouses with Web Data: A Survey , 2008, IEEE Transactions on Knowledge and Data Engineering.

[27]  Mario Piattini,et al.  Auditing data warehouse security , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[28]  Timos K. Sellis,et al.  State-space optimization of ETL workflows , 2005, IEEE Transactions on Knowledge and Data Engineering.

[29]  William E. Burr,et al.  Selecting the Advanced Encryption Standard , 2003, IEEE Secur. Priv..

[30]  Günther Pernul,et al.  Towards OLAP security design — survey and research issues , 2000, DOLAP '00.

[31]  N. Balasubramanian,et al.  Security: A major threat for web services , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[32]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.