A prototype model for data warehouse security based on metadata.doc
《A prototype model for data warehouse security based on metadata.doc》由会员分享,可在线阅读,更多相关《A prototype model for data warehouse security based on metadata.doc(9页珍藏版)》请在三一办公上搜索。
1、A Prototype Model for Data Warehouse Security Based on MetadataN. Katic1 G. Quirchmayr2 J. Schiefer1 M. Stolba1 A M. Tjoa11Institute of Software Technology (E188)Vienna University of TechnologyResselgasse 3/188, A-1040 ViennaAustriakatic, stolba, js, tjoa ifs.tuwien.ac.at 2Institute of Applied Compu
2、ter Science and Information SystemsUniversity of ViennaLiebiggasse 4, A-1010 ViennaAustriaAbstractThe aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product developers and is only beg
3、inning to be discussed in the research community. Following this description of the current situation, a metadata driven approach implemented as part of the WWW-EIS-DWH project is presented in detail. The prototype focuses on the technical realisation and is intended not to be open for use in differ
4、ent security policies.1. IntroductionFor a wide range of companies, in both private and public sectors, competitiveness and effectiveness depend on the quality of decision making; so it is of no surprise that many are looking to improve the quality of their decisions by learning from past business t
5、ransactions and decisions. Accumulated data represent a priceless business asset.Providing analysts with wide access to the mass of corporate data in a data warehouse requires the organisation and integration of heterogeneous data in a heterogeneous environment. Furthermore the production of derived
6、 aggregated data of the data warehouse requires the continuous maintenance of integrity.These requirements imply several security issues to ensure that it is just authorised users who benefit from relevant data and that no unauthorised sources are used. Under many jurisdictions it is illegal to merg
7、e personal data unless anonymity can be ensured and especially in Europe stricter legislation has been proposed and is under review based on OECD and EC recommendations.The aim of this paper is to discuss requirements and impacts on the selection of an adequate security model for a data warehouse en
8、vironment. This security model should support such features as controlled access to individual data items, selective encryption and patented security processes. For the right choice of the security model it is important to pay attention to the metadata of the data warehouse. They contain security in
9、formation such as access rules, classifications of security objects or clearances of security subjects.This paper is composed of two parts: a theoretical part which deals with security in data warehouses in general and part 2, a description of an implementation of a security model prototype for a da
10、ta warehouse environment based on metadata.2. Data Warehouse & Security A data warehouse is a collection of integrated databases designed to support managerial decision-making and problem-solving functions. It contains both highly detailed and summarised historical data relating to various categorie
11、s, subjects, or areas 4. All units of data are relevant to appropriate time horizons. The data warehouse is an integral part of the enterprise-wide decision support system and does not ordinarily involve data updating. It empowers end-users to perform data access and analysis. It also gives an organ
12、isation certain competitive advantages, such as fostering a culture of information sharing, enabling employees to effectively and efficiently solve dynamic organisational problems, minimising operating costs and maximising revenue, attracting and maintaining market shares, and minimising the impact
13、of employee turnovers. The security requirements of the data warehouse environment are similar to those of other distributed computing systems 3. Thus, having an internal control mechanism to ensure the confidentiality, integrity and availability of data in a distributed environment is of paramount
14、importance. Confidentiality denotes the protection of information from unauthorised disclosure either by direct retrieval or by indirect logical inference. Integrity requires data to be protected from malicious or accidental modification, including the insertion of false data, the contamination of d
15、ata, and the destruction of data. Availability is the characteristic that ensures data being available to authorised users when they need them. Availability is closely related to integrity. It includes denial of service of a system, i. e. a system is not functioning in accordance with its intended p
16、urpose 2.2.1. Security RestrictionsA data warehouse by nature is an open, accessible system. The aim of a data warehouse generally is to make large amounts of data easily accessible to users, thereby enabling them to extract information about the business as a whole. Any security restrictions can be
17、 seen as obstacles to that goal, and they become constraints on the design of the warehouse.There may be sound business reasons for any security restrictions applied to the data warehouse, but it is worth noting that they may lead to a potential loss of information. If analysts have restricted acces
18、s to data in the data warehouse it may be impossible for them to get a complete picture of the trends within the analysed area. Checking security restrictions will of course have its price by affecting the performance of the data warehouse environment, because further security checks require additio
19、nal CPU cycles and time to perform.2.2. Security RequirementsSecurity requirements describe all security conditions that have to be considered in the data warehouse environment.It is important to determine in an early stage any security requirements that will be enforced in the data warehouse, becau
20、se they can seriously impair the organisation and design of the warehouse. It is very difficult to add security restrictions after a data warehouse has gone live. So it is important to capture the ultimate security requirements at the beginning and make them part of the system design. The first step
21、 for the definition of security requirements is to classify the security objects and security subjects of the data warehouse environment. Security objects can be classified in different ways. Which solution is suitable depends on the security level which should be achieved. Qualified classifications
22、 would be classification by sensitivity (public, confidential, top secret) or according to job functions (accounting data, personnel data). As with security objects, there is a number of ways in which security subjects can be classified. We can follow a top-down company view, with users classified b
23、y department, section, group, and so on. Another possible classification is role based, with people grouped across departments based on their role. This approach would classify all analysts as one group, irrespective of their department. If each department genuinely accesses different data, it is pr
24、obably better to design the security access for each department separately. 2.2.1. Legal Requirements. It is vital to consider all legal requirements on the data being stored in the data warehouse. If individual customer data are being held, such as account details in a banking data warehouse, it ma
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- prototype model for data warehouse security based on metadata
链接地址:https://www.31ppt.com/p-3021763.html