Data Warehouse Safekeeping Augmentation Employing Cryptographic Modus Operandi: Comprehensive Study and Comparative Analysis
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 6)Publication Date: 2018-01-08
Authors : Rajdeep Chowdhury Paromita Mitra Rohit Ghosh Sukhwant Kumar;
Page : 62-68
Keywords : KEYWORDS: Data Warehouse; Cryptography; Encryption; Decryption; Dual Key; MMC; LFC; SSTC;
Abstract
Abstract: Data warehouse and its safekeeping is mainly challenging and decisive issue in contemporary technical turf. Numerous papers have been compiled and theories formulated for diverse category of data warehouse architecture and ensuring its safekeeping. Developers are trying to augment the intricacy of the cryptographic modus operandi to boost the safekeeping of the data warehouse. At this juncture, where countless modus operandi has arrived, it is requisite to unearth the distinction and benefit of one process over the other. For the very intention, a comprehensive study is prerequisite. The proposed work is a comprehensive study and comparative analysis on the diverse cryptographic modus operandi in offer. The assortment of cryptographic modus operandi in discussion is already well established. Additionally, study on diverse realization avenue has been ensured. Based on the same, a comprehensive and comparative study is ensured and offered in tabular form for simplicity of understanding and endowing with exclusive opinion. The comparative analysis is based on distinct parameters, which has been well exhibited in the respective table. The paper could serve as a reference paper while compiling fresh and novel cryptographic modus operandi. The proposed work could save the stretched haul of exploring and studying diverse papers from an assortment of sources.
Other Latest Articles
- A Hybrid Approach to Secure RFID/Sensor Based SCM Systems
- Integrated Control And Protection System With A Hierarchical Coordination Control Strategy For Grid Connected PV System
- A Case Study on Data Mining Application in Manufacturing Industries
- Security and performance enhancement of Neighbour Defence Technique for AODV (NDTAODV) routing protocol under RREQ Flood Attack by varying Malicious Nodes
- Assessment of E-government Development in the Economic and Monetary Community of Central African States (EMCCAS)
Last modified: 2018-01-18 16:54:09