ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Implementing Log Based Security in Data Warehouse

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)

Publication Date:

Authors : ;

Page : 254-258

Keywords : Data Warehousing; Data Masking; Intrusion Detection; Data Encryption; Data Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper proposes an implementation of behaviour analysis based on logs. To ensure data privacy various solutions have been proposed and proven effective in their security purpose. However they introduce large overheads making them unfeasible for data warehouse. Therefore to avoid these overheads and to increase data security, data masking approach have been proposed. Solution manages the randomness of masked values which increases the overall security strength. Log Analysis for intrusion detection is the process use to detect attacks on a specific envir onment using logs as the primary source of information. For future perspectives it will be beneficial as we will come to know whether it is simple access or attack. So by analysing the behaviour of user we can overcome attacks.

Last modified: 2013-04-02 19:53:50