Academic Journals Database
Disseminating quality controlled scientific knowledge

Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage

Author(s): Preeti Patil | Nitin Chavan | Srikantha Rao | S B Patil

Journal: International Journal of Computer Applications
ISSN 0975-8887

Volume: icwet;
Issue: 2;
Date: 2012;
Original page

Keywords: Data Ware house | ETL | Perturbation | guilty agents | fake objects

Now days, many organizations outsource some of their important data to some outside trusted agents. This outsourced data coming from the data warehouse of the organization through ETL process may have some sensitive information. Though the agents are trusted one, the sensitive data may be given by them to some outside untrustworthy third party. This is known as data leakage. Such a data leakage may be the result of guilty agents or may be the third party has guessed or intruded the data by some other means. To find out whether the data has been given by agent or by some other means, the third party has guessed it, is very important issue. In this project, some data allocation techniques to trusted agents are presented that will improve the probability of identifying the guilty agents. The methods used do not modified the data. Also to find out the guilty agent is another sensitive topic. This paper proposes a system to find out the leakage of data and also the guilty agents. Few "realistic but fake" data can be injected to find out guilty agents.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?