Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level

Size: px
Start display at page:

Download "Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level"

Transcription

1 Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level Salah Triki 1, Hanene Ben-Abdallah 1, Nouria Harbi 2, and Omar Boussaid 2 1 Laboratoire Mir@cl, Département d Informatique, Faculté des Sciences Economiques et de Gestion de Sfax, Tunisie, Route de l Aéroport Km Sfax, BP {Salah.Triki,Hanene.BenAbdallah}@Fsegs.rnu.tn 2 Laboratoire ERIC, Université Lyon 2, 5 avenue P. Mendès France Bron, Cedex, France {Nouria.Harbi,Omar.Boussaid}@univ-lyon2.fr Abstract. Data warehouses contain sensitive data that must be secured in two ways: by defining appropriate access rights to the users and by preventing potential data inferences. Inspired from development methods for information systems, the first way of securing a data warehouse has been treated in the literature during the early phases of the development cycle. However, despite the high risks of inferences, the second way is not sufficiently taken into account in the design phase; it is rather left to the administrator of the data warehouse. However, managing inferences during the exploitation phase may induce high maintenance costs and complex OLAP server administration. In this paper, we propose an approach that, starting from the conceptual model of the data sources, assists the designer of the data warehouse in indentifying multidimensional sensitive data and those that may be subject to inferences. Keywords: Data warehouse, Security, Precise Inference, Partial inference. 1 Introduction Organizations have a significant amount of data that can be analyzed to identify trends, examine the effectiveness of their activities, and take decisions to increase their profits. By gathering and consolidating data issued from the organization s information system, a data warehouse (DW) allows decision makers to perform decision analyses and financial forecasts. In fact, several tools dedicated to data warehousing offer various operations for OnLine Analytical Processing (OLAP), assisting users in the decision analysis process. On the other hand, data in an organization s DW are proprietary and sensitive and should not be accessed without controles. Indeed, some data, like medical data, religious or ideological beliefs, are personal and may harm their owners if disclosed. For this, several governments passed laws for the protection of the citizens s private L. Bellatreche and F. Mota Pinto (Eds.): MEDI 2011, LNCS 6918, pp , Springer-Verlag Berlin Heidelberg 2011

2 72 S. Triki et al. lives. Among these laws, HIPAA 1 (Health Insurance Portability and Accountability Act) aims to protect patient medical data by forcing American health care establishments to follow strict safety rules. Similarly, GLBA 2 (Gramm-Leach-Bliley Act) requires U.S. financial institutions to protect customer data; on the other hand, Safe Harbor 3 allows companies conforming to transfer and use data on European Internet ; and Sarbanes-Oxley 4 Act guarantees the reliability of corporate financial data. Agencies must use strict safety rules to comply with these laws, otherwise they are punished. Securing a DW is a twofold task. The first fix the access rights of the DW users. Similar to information systems, this security task can be treated at a conceptual or logical level; the fixed access rights are enforced by the OLAP server. As for the second security task, it seeks to ban malicious users from infering prohibited information through permitted acceses. In fact, there are two types of inferences: precise inferences where the exact data values are deducted, and partial inferences where data values are partially disclosed. Inference prevention at design level reduces administration costs and maintenance of OLAP servers. Despite this, inference prevention at design level has not received enough interest from researchers. The aim of this paper is to propose an approach to model the prevention of inferences using the data source design represented as a class diagram. Our approach has two advantages over existing approaches. The first advantage is its genericity since it is applicable to any business domain. The second advantage is that it takes into account the data available to the malicious user to detect inferences; the majority of inference cases are produced by combining available data. The remainder of the paper is organized as follows: in section 2, we present a state of the art in the DW security domain at the requirement and design levels. In Section 3, we detail our approach. Section 4 presents an example illustrating the use of our approach. Finally, we summarize the work done and outline our work in progress. 2 Related Work The need for securing DW was felt long ago [1] [2]. Several proposed approaches tackled the DW security problem at the requirement, design or logical levels. At the requirement level, [3] propose a profile based on i and an approach that can model the security requirements. The proposed profile takes into account the RBAC ("Role Based Access Control") model and MAC (" Mondatory Access Control ") model. Thus, for each data to be protected, a security class must be defined in terms of: security role, security level and compartment. Using this profile, the proposed approach to model security requirements operates on three stages : i) analyzing the rules and privacy policies that exist in the organization; ii) interviewing the securityin-charge personnel to define the data to be secured; and iii) affecting security classes for each data. This approach is informally presented content-detail.html

3 Securing Data Warehouses 73 At design level, several studies have been carried out. [4] propose a UML profile for modeling security and extensions of OCL (Object Constraint Language) to specify security constraints. The UML profile, called SECDW (Secure Data Warehouse), includes new types, stereotypes and tagged values to model the RBAC and MAC models. [5] extended SECDW to represent the concept of conflict among multidimensional elements. However, neither work proposed an approach to design a secure DW model. On the other hand, [6] proposed an approach using the UML state-transition diagram to detect inferences in a DW design. In the state-transition diagram, the states represent the data to display and transitions represent users multidimensional queries. The approach takes into account the possibility of inferences from empty cells in a cube (i.e., unavailable data for measures), without addressing the possibility of inferences from available data. For their part, [7] proposed an approach specific to the field of market research in general and the particular case of the company GFK [9]. This approach addressed the case of partial and precise inferences. Precise inferences occur when the exact measure values is deduced, while partial inferences occur when an idea about the measure values is deduced. In this work, inferences were detected manually by studying the application domain of market research. At logical level, [5] treated the case of implementation in the multi-dimensional relational model based on the extension of the CWM ( Common Warehouse Metamodel ). This extension allows the definition of security constraints and audit rules for each element of the relational model. Security constraints allow the implementation of RBAC and MAC and audit rules can log access attempts to analyze problematic cases. After our review of the state of the art of DW security, we noticed the following four points: - Modeling access rights has been treated at the requirement, design and logical levels. Existing work ([3] [4] [5] [9]) were able to offer notations for modeling the MAC and RBAC models. However, the proposed approaches were informally described. - Prevention of inferences has been widely treated at the physical level ( [10] [11] [12] [13] [14]). This level can enduce high administrative costs and high maintenance. - Prevention of inferences at the design level has not been sufficiently addressed. The existing works ([6] [7]) do not take into account the potential inferences from the data available and are specific to a particular application domain. - Existing proposals lack assistance in identifying data from the DW that are potentially subject to inferences. In this paper, we treat the last two points by proposing at the design level: i) a UMLbased language for modeling data potentially subject to inferences, and ii) a semiautomatic approach to identify such data. 3 Proposed Approach The approach we propose is based on the data sources class diagram. In addition, it assumes that the DW schema is already designed and mapped to the data sources.

4 74 S. Triki et al. In fact, our approach fits in and complements the three types of DW design approaches: bottom-up ([15] ), top-down ([16]), and mixed ([17]). In all three types of design approaches, once the DW schema is developed, it must be matched with the data sources to indicate the source of the elements that will be used to load each element of the DW; this mapping is vital for the definition of the ETL procedures. In the case of bottom-up and mixed approaches, this mapping is produced by default since the DW schema definition is developed from the data sources. As for the topdown approaches, this mapping is needed to validate the specified DW schema. Our approach (see Fig. 1) comprises three phases. The first phase, carried out by the security designer, identifies the elements to be protected in the DW design. In the second phase, we first automatically build an inferences graph used to detect the elements which may lead to inferences; secondly, the designer distinguishes the elements that lead to precise inferences and those that lead to partial inferences. In the third phase, we automatically enrich the DW schema model by UML annotations highlighting the elements subject to both types of inferences. Note that we use in this paper the star schema to model the DW schema. 3.1 Definition of Sensitive Data Given a DW schema, the definition of sensitive data annotates the elements of the multidimensional model. It is made by the DW security designer who may be assisted by an expert in the field. The role of the domain expert is to identify the data to be protected. This data is indicated by annotations with the UML stereotype Sensitive data (see Fig. 1). 3.2 Inference Graph Construction Definition 1: An inference graph is a set of nodes connected by oriented arcs. The nodes represent the data (in the source) and the arcs indicate the direction of inference and the inference type (partial/precise). Graphical notations: An inference graph is graphically composed of: - Two types of nodes: nodes colored in gray represent the sensitive data, and nodes colored in white represent the non-sensitive data. - Two types of arcs: dotted arcs indicate partial inferences and solid arcs indicate precise inferences. Take the case of health, disease (sensitive data), treatment and service are represented by nodes. The correspondence between the disease and treatment is the inferences and their meaning (Fig. 2): Knowing the treatment, one can infer the disease. This inference is precise because two different diseases may not have the same treatment, so we have a solid arc treatment to illness. On the other hand, if in a hospital, each service treats a number of diseases, then, knowing the service, one can have an idea about the kind of disease but not its name; this is modeled by the dotted arc from service to illness.

5 Securing Data Warehouses 75 DW schema (1) Sensitive data identification DW schema: Sensitive data identified (2.a) Inference graph construction (2.b)Partial inference Identification A B C D E Inferences graph Data sources class diagram A B C D Inference graph : Partial inference detected E (2.c) Calculating the transitive closure A B C D Graph inferences: new partial inference detected E (3) DW schema enrichment DW schema enriched Fig. 1. Proposed Approach for DW schema security

6 76 S. Triki et al. Illness Treatment Service Fig. 2. Inference graph: Example The construction of an inferences graph involves the class diagram of data sources that will load the DW. We use the mapping to prune out the inference graph built from the data sources and restrict it to only the nodes corresponding to data used for the loading of the DW schema. In our approach (see Fig. 1), the inference graph is built automatically based on the cardinality of the class diagram of the data sources. To do this, we apply the following six rules: R1. Each class is represented by a node colored in gray if the corresponding data is sensitive and colored in white otherwise. R2. Each binary association / aggregation between two classes and will be represented by an arc according to the following three cases: Case 1 (see Fig. 3 (a, b)): if the association/aggregation has cardinality on s side and cardinality 1 or 0..1 on the s side, then an arc from to is added to the inference graph (see Fig. 3 (c)) Case 2 (see Fig. 4 (a, b)): if the association/aggregation has cardinality s side and cardinality 1 or 0..1 on s side and is also connected to C3 by an association/agregation with cardinality on side and the cardinality of 1 or 0..1 on C3 s side, then two arcs are added to the inference graph. The first from to C3 and the second from C3 to (see Fig. 3 (c)) Case 3 (see Fig. 5 (a)): if the association has a class C3, then two arcs are added to the inference graph; one from C3 to and another from C3 to (see Fig. 5 (b)). 1 or or 0..1 (a) (b) (c) Fig. 3. Inference first case

7 Securing Data Warehouses 77 1 or or 0..1 C3 1or0..1 1or0..1 (a) (b) (c) Fig. 4. Inference second case C3 (a) (b) Fig. 5. Inference third case 1 or 0..1 (a) (b) (c) (d) Fig. 6. Representing composition R3. Each composition (see Fig. 6 (a)) will be represented by an arc from the component to the composite (see Fig. 6 (b)). If in addition the cardinality of the component side is 1 or 0..1 (see Fig. 6 (c)), then a second arc from the composite is added to the component (see Fig. 6 (d)). R 4. Each n-ary association with cardinalities and 1 or 0..1 will be represented by arcs from classes with cardinalities 1 or 0..1 to those with the cardinality. For example, the ternary association in Fig. 7 (a) is represented by the graph in Fig. 7 (b).

8 78 S. Triki et al. 1 or 0..1 C3 (a) (b) Fig. 7. Representing n-ary association R5. If an inheritance relationship exists between two classes (parent) and (child) and if is connected to C3 by an association with a cardinality on s side and the cardinality on C3 s side is 1 or 0..1 (see Fig. 8 (a)), then an arc is added from to C3 (See Fig. 8 (b)). R6. If an inheritance relationship exists between two classes (parent) and (child) and if is connected to C3 by an association with a cardinality 1 or 0..1 on s side and the cardinality on C3 s side is (see Fig. 8 (c)), then an arc is added from C3 to (See Fig. 8 (d)). 1 or 0..1 C3 (a) (b) 1 or 0..1 C3 (c) (d) Fig. 8. Representing an inheritance relationship The automatic construction of the inference graph does not indicate the type of inferences: partial or precise. This indication cannot be, unfortunately, deducted automatically. Thus, after constructing the inference graph, the designer must distinguish partial inferences (drawn by dotted arcs).

9 Securing Data Warehouses 79 In addition, to ensure that all possible inferences have been determined, approach continues with the automatic calculation of the transitive closure of graph. On the resulting graph, we distinguish two types of paths: - Precise path: it is a path where all connected nodes allow precise inferences. - Partial path: it is a path with at least one node allows partial inferences. 3.3 Enrichment of the DW Schema The inference graph is used to enrich the DW schema (see Fig. 1). To do so, our approach assumes that the mapping between elements of the DW schema and the source is already done. We exploit this mapping to apply the two following enrichment rules: - For each element of the inference graph belonging to a Precise path annotate its corresponding element in the DW schema with Precise Inference: ElementName: NameInferedData. - For each element of the inference graph belonging to a partial path annotate its corresponding element in the DW schema with "Partial Inference: ElementName: NameInferedData. our the 4 Example Fig. 9 contains the class diagram of a fictitious data source in the healthcare domain. Table 1 contains details of various classes. Fig. 10 presents a DW schema that analyzes the costs and durations of the diagnostic along the analysis axes: Disease, Treatment, Critical Illness, Transfer, Date Time, and Doctor's specialty. The latter takes the value generalist if the doctor who performed the diagnostic is a generalist and specialty of the doctor otherwise. Fig. 9. Class diagram of the data sources

10 80 S. Triki et al. Table 1. Details of Fig. 9 classes Class Date and Time Admission Diagnostic Doctor Specialty Illness Treatment Critical illness Transfer Details Date and time of a patient admission. Patient admission. Patient diagnostic. Doctor who made the diagnostic. Specialty of doctor who made the diagnosis. Illness diagnosed. Treatment necessary to cure the disease. Serious disease requiring patient transfer to another hospital where he will receive appropriate care. This association class contains the date of transfer of the patient and the hospital will welcome. Fig. 10. Multidimensional Model 4.1 Inference Graph Illness corresponding to a given patient is a sensitive information since it is part of professional secrecy in medical activities. In our example, we look at the data that allow us to infer a patient's illness. Fig. 11 contains the inference graph constructed from the cardinality of the class diagram of the source data. In this graph, gray nodes are the sensitive data; dotted arcs represent the inferences that we considered partial, and those in solid line are believed to be precise inferences. This graph shows inferences seven partial and one precise. The calculation of the transitive closure of the graph has highlighted other potential inferences. For the sake of clarity, we have shown in Fig. 12 new paths. These paths are partial because they contain nodes that allow partial inferences. In Table 2 the first column shows some new inferences composed of the paths listed in the second column. From Table 2 and Fig. 12, we can deduce that: - A user with access to the dates and times of admission and transfer data, may infer that the diagnosed illness were critical,

11 Securing Data Warehouses 81 Illness Critical Illness Treatment Admission Diagnostic Transfer Date and Time Doctor Specialty Fig. 11. Initial Inferences graph Illness Critical Illness Treatment Admission Diagnostic Transfer Date and Time Doctor Specialty Fig. 12. Inference graph after calculating the transitive closure - Access to the date and time of admission and the specialty of the doctor who performed the corresponding diagnosis on admission, allow the user to infer the type of illness the patient has - Access to treatment received by a patient, allow a user to infer the disease the patient has.

12 82 S. Triki et al. Table 2. Partial paths Inference Date and Time Diagnostic Date and Time Doctor Date and Time Transfer Date and Time Illness Partial path Date and Time Admission, Admission Diagnostic Date and Time Admission Admission Diagnostic Diagnostic Doctor Date and Time Admission Admission Diagnostic Diagnostic Transfer Date and Time Admission Admission Diagnostic Diagnostic Illness 4.2 DW Schema Enrichment Based on the inference graph and the mapping between the data source and DW schema, we get automatically the security annotation for the DW schema elements with ptential inferences (see Fig. 13). In this model, the dimensions of time and date are have the same annotation to specify that the two sets can lead to inferences. In Fig. 11, for the sake of clarity, we have not listed all the annotations. Fig. 13. DW schema annotated with the security information 5 Conclusion In this paper, we presented an approach to produce a conceptual multidimensional model annotated with information for the prevention of inferences. Our approach has two advantages over existing approaches. The first is its independence from the data domain. The second advantage is the use of available data to detect inferences. Our approach constructs a graph of inferences based on the class diagram of data sources. The class diagram allows us with the assistance of the domain expert to identify the

13 Securing Data Warehouses 83 elements to lead to precise and partial inference. These elements will be annotated in the multidimensional model. Currently, we are studying how to transfer to the logical level the annotations defined at the design level. References 1. Bhargava, B.K.: Security in data warehousing (Invited talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK LNCS, vol. 1874, pp Springer, Heidelberg (2000) 2. Pernul, G., Priebe, T.: Towards olap security design - survey and research issues. In: 3rd ACM International Workshop on Data Warehousing and OLAP DOLAP 2000, Washington, DC, Novembre 10, pp (2000) 3. Soler, E., Stefanov, V., Mazón, J.-N., Trujillo, J., Fernández-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: The Third International Conference on Availability, Reliability and Security ARES 2008, Barcelone, Espagne, pp IEEE Computer Society, Los Alamitos (2008) 4. Soler, E., Villarroel, R., Trujillo, J., Fernández-Medina, E., Piattini, M.: Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel. In: The First International Conference on Availability, Reliability and Security ARES 2006, Vienne, Autriche, pp IEEE Computer Society, Los Alamitos (2006) 5. Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: The International Conference on Knowledge Engineering and Ontology Development 2010, Valencia, Espagne, pp (2010) 6. Carlos, B., Ignacio, G., Eduardo, F.-M., Juan, T., Mario, P.: Towards the Secure Modelling of OLAP Users Behaviour. In: The 7th VLDB Conference on Secure Data Management, Singapore, September 17, pp Springer, Heidelberg (2010) 7. Steger, J., Günzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. Fourteenth Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl (near Amsterdam), The Netherlands, August (2000) 8. Icon Group Ltd. GFK AG: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). Icon Group International (2000) 9. Villarroel, R., Fernández-Medina, E., Piattini, M., Trujillo, J.: A uml 2.0/ocl extension for designing secure data warehouses. Journal of Research and Practice in Information Technology 38(1), (2006) 10. Haibing, L., Yingjiu, L.: Practical Inference Control for Data Cubes. IEEE Transactions on Dependable and Secure Computing 5(2), (2008) 11. Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. In: Encyclopedia of Data Warehousing and Mining, pp (2009) 12. Zhang, N., Zhao, W.: Privacy-Preserving OLAP: An Information-Theoretic Approach. IEEE Transactions on Knowledge and Data Engineering 23(1), (2011) 13. Terzi, E., Zhong, Y., Bhargava, B.K., Pankaj, Madria, S.K.: An Algorithm for Building User-Role Profiles in a Trust Environment. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK LNCS, vol. 2454, pp Springer, Heidelberg (2002)

14 84 S. Triki et al. 14. Bhargava, B.K., Zhong, Y., Lu, Y.: Fraud Formalization and Detection. In: Kambayashi, Y., Mohania, M., Wöß, W. (eds.) DaWaK LNCS, vol. 2737, pp Springer, Heidelberg (2003) 15. Golfarelli, M., Rizzi, S.: A Methodological Framework for Data Warehouse Design. In: ACM First International Workshop on Data Warehousing and OLAP DOLAP, Bethesda, Maryland, USA, pp. 3 9 (Novembre 1998) 16. Feki, J., Nabli, A., Ben-Abdallah, H., Gargouri, F.: An Automatic Data Warehouse Conceptual Design Approach. In: Wang, J. (ed.) Encyclopedia of Data Warehousing and Mining, 2nd edn. (2008) 17. Lujan-Mora, S., Trujillo, J.A.: Comprehensive Method for Data Warehouse Design Fifth International Workshop on Design and Management of Data Warehouses, DMDW 2003, Berlin, Allemagne (Septembre 2003)

Comparative Analysis of Data warehouse Design Approaches from Security Perspectives

Comparative Analysis of Data warehouse Design Approaches from Security Perspectives Comparative Analysis of Data warehouse Design Approaches from Security Perspectives Shashank Saroop #1, Manoj Kumar *2 # M.Tech (Information Security), Department of Computer Science, GGSIP University

More information

TOWARDS A FRAMEWORK INCORPORATING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS FOR DATAWAREHOUSE CONCEPTUAL DESIGN

TOWARDS A FRAMEWORK INCORPORATING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS FOR DATAWAREHOUSE CONCEPTUAL DESIGN IADIS International Journal on Computer Science and Information Systems Vol. 9, No. 1, pp. 43-54 ISSN: 1646-3692 TOWARDS A FRAMEWORK INCORPORATING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS FOR DATAWAREHOUSE

More information

INTEROPERABILITY IN DATA WAREHOUSES

INTEROPERABILITY IN DATA WAREHOUSES INTEROPERABILITY IN DATA WAREHOUSES Riccardo Torlone Roma Tre University http://torlone.dia.uniroma3.it/ SYNONYMS Data warehouse integration DEFINITION The term refers to the ability of combining the content

More information

PartJoin: An Efficient Storage and Query Execution for Data Warehouses

PartJoin: An Efficient Storage and Query Execution for Data Warehouses PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE ladjel@imerir.com 2

More information

Towards the Next Generation of Data Warehouse Personalization System A Survey and a Comparative Study

Towards the Next Generation of Data Warehouse Personalization System A Survey and a Comparative Study www.ijcsi.org 561 Towards the Next Generation of Data Warehouse Personalization System A Survey and a Comparative Study Saida Aissi 1, Mohamed Salah Gouider 2 Bestmod Laboratory, University of Tunis, High

More information

Goal-Driven Design of a Data Warehouse-Based Business Process Analysis System

Goal-Driven Design of a Data Warehouse-Based Business Process Analysis System Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 2007 243 Goal-Driven Design of a Data Warehouse-Based Business

More information

DIMENSION HIERARCHIES UPDATES IN DATA WAREHOUSES A User-driven Approach

DIMENSION HIERARCHIES UPDATES IN DATA WAREHOUSES A User-driven Approach DIMENSION HIERARCHIES UPDATES IN DATA WAREHOUSES A User-driven Approach Cécile Favre, Fadila Bentayeb, Omar Boussaid ERIC Laboratory, University of Lyon, 5 av. Pierre Mendès-France, 69676 Bron Cedex, France

More information

DWEB: A Data Warehouse Engineering Benchmark

DWEB: A Data Warehouse Engineering Benchmark DWEB: A Data Warehouse Engineering Benchmark Jérôme Darmont, Fadila Bentayeb, and Omar Boussaïd ERIC, University of Lyon 2, 5 av. Pierre Mendès-France, 69676 Bron Cedex, France {jdarmont, boussaid, bentayeb}@eric.univ-lyon2.fr

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Application Of Enhanced Security In Mondrian OLAP To Secure Big Data Fernandez raj D 1, Gunasekaran G 2 1 Research Scholar Department of Computer Science Engineering, St. Peter s University, Avadi, Chennai,

More information

OLAP Visualization Operator for Complex Data

OLAP Visualization Operator for Complex Data OLAP Visualization Operator for Complex Data Sabine Loudcher and Omar Boussaid ERIC laboratory, University of Lyon (University Lyon 2) 5 avenue Pierre Mendes-France, 69676 Bron Cedex, France Tel.: +33-4-78772320,

More information

Dimensional Modeling for Data Warehouse

Dimensional Modeling for Data Warehouse Modeling for Data Warehouse Umashanker Sharma, Anjana Gosain GGS, Indraprastha University, Delhi Abstract Many surveys indicate that a significant percentage of DWs fail to meet business objectives or

More information

Curriculum of the research and teaching activities. Matteo Golfarelli

Curriculum of the research and teaching activities. Matteo Golfarelli Curriculum of the research and teaching activities Matteo Golfarelli The curriculum is organized in the following sections I Curriculum Vitae... page 1 II Teaching activity... page 2 II.A. University courses...

More information

Modeling the User Interface of Web Applications with UML

Modeling the User Interface of Web Applications with UML Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de

More information

Extending UML 2 Activity Diagrams with Business Intelligence Objects *

Extending UML 2 Activity Diagrams with Business Intelligence Objects * Extending UML 2 Activity Diagrams with Business Intelligence Objects * Veronika Stefanov, Beate List, Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology

More information

Determining Preferences from Semantic Metadata in OLAP Reporting Tool

Determining Preferences from Semantic Metadata in OLAP Reporting Tool Determining Preferences from Semantic Metadata in OLAP Reporting Tool Darja Solodovnikova, Natalija Kozmina Faculty of Computing, University of Latvia, Riga LV-586, Latvia {darja.solodovnikova, natalija.kozmina}@lu.lv

More information

Conceptual Workflow for Complex Data Integration using AXML

Conceptual Workflow for Complex Data Integration using AXML Conceptual Workflow for Complex Data Integration using AXML Rashed Salem, Omar Boussaïd and Jérôme Darmont Université de Lyon (ERIC Lyon 2) 5 av. P. Mendès-France, 69676 Bron Cedex, France Email: firstname.lastname@univ-lyon2.fr

More information

Chapter 10. Practical Database Design Methodology. The Role of Information Systems in Organizations. Practical Database Design Methodology

Chapter 10. Practical Database Design Methodology. The Role of Information Systems in Organizations. Practical Database Design Methodology Chapter 10 Practical Database Design Methodology Practical Database Design Methodology Design methodology Target database managed by some type of database management system Various design methodologies

More information

www.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

www.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Data Warehouse Security Akanksha 1, Akansha Rakheja 2, Ajay Singh 3 1,2,3 Information Technology (IT), Dronacharya College of Engineering, Gurgaon, Haryana, India Abstract Data Warehouses (DW) manage crucial

More information

Aligning Data Warehouse Requirements with Business Goals

Aligning Data Warehouse Requirements with Business Goals Aligning Data Warehouse Requirements with Business Goals Alejandro Maté 1, Juan Trujillo 1, Eric Yu 2 1 Lucentia Research Group Department of Software and Computing Systems University of Alicante {amate,jtrujillo}@dlsi.ua.es

More information

Encyclopedia of Database Technologies and Applications. Data Warehousing: Multi-dimensional Data Models and OLAP. Jose Hernandez-Orallo

Encyclopedia of Database Technologies and Applications. Data Warehousing: Multi-dimensional Data Models and OLAP. Jose Hernandez-Orallo Encyclopedia of Database Technologies and Applications Data Warehousing: Multi-dimensional Data Models and OLAP Jose Hernandez-Orallo Dep. of Information Systems and Computation Technical University of

More information

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC S. Berhe 1, S. Demurjian 1, S. Gokhale 1, J. Pavlich-Mariscal 2,3,

More information

Using the column oriented NoSQL model for implementing big data warehouses

Using the column oriented NoSQL model for implementing big data warehouses Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 469 Using the column oriented NoSQL model for implementing big data warehouses Khaled. Dehdouh 1, Fadila. Bentayeb 1, Omar. Boussaid 1, and Nadia

More information

Logical Design of Data Warehouses from XML

Logical Design of Data Warehouses from XML Logical Design of Data Warehouses from XML Marko Banek, Zoran Skočir and Boris Vrdoljak FER University of Zagreb, Zagreb, Croatia {marko.banek, zoran.skocir, boris.vrdoljak}@fer.hr Abstract Data warehouse

More information

Using Relational Algebra on the Specification of Real World ETL Processes

Using Relational Algebra on the Specification of Real World ETL Processes Using Relational Algebra on the Specification of Real World ETL Processes Vasco Santos CIICESI - School of Management and Technology Polytechnic of Porto Felgueiras, Portugal vsantos@estgf.ipp.pt Orlando

More information

A Design and implementation of a data warehouse for research administration universities

A Design and implementation of a data warehouse for research administration universities A Design and implementation of a data warehouse for research administration universities André Flory 1, Pierre Soupirot 2, and Anne Tchounikine 3 1 CRI : Centre de Ressources Informatiques INSA de Lyon

More information

Dynamic index selection in data warehouses

Dynamic index selection in data warehouses Dynamic index selection in data warehouses Stéphane Azefack 1, Kamel Aouiche 2 and Jérôme Darmont 1 1 Université de Lyon (ERIC Lyon 2) 5 avenue Pierre Mendès-France 69676 Bron Cedex France jerome.darmont@univ-lyon2.fr

More information

The use of UML to design agricultural data warehouses

The use of UML to design agricultural data warehouses Author-produced version of the paper presented10/4 at AGENG 2020 Conference, Septembre 6-8 2010, Clermont-Ferrand, France The use of UML to design agricultural data warehouses François Pinet 1, André Miralles

More information

Multidimensional Modeling with UML Package Diagrams

Multidimensional Modeling with UML Package Diagrams Multidimensional Modeling with UML Package Diagrams Sergio Luján-Mora 1, Juan Trujillo 1, and Il-Yeol Song 2 1 Dept. de Lenguajes y Sistemas Informáticos Universidad de Alicante (Spain) {slujan,jtrujillo}@dlsi.ua.es

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

Lecture 12: Entity Relationship Modelling

Lecture 12: Entity Relationship Modelling Lecture 12: Entity Relationship Modelling The Entity-Relationship Model Entities Relationships Attributes Constraining the instances Cardinalities Identifiers Generalization 2004-5 Steve Easterbrook. This

More information

A Hybrid Model Driven Development Framework for the Multidimensional Modeling of Data Warehouses

A Hybrid Model Driven Development Framework for the Multidimensional Modeling of Data Warehouses A Hybrid Model Driven Development Framework for the Multidimensional Modeling of Data Warehouses ABSTRACT Jose-Norberto Mazón Lucentia Research Group Dept. of Software and Computing Systems University

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

OLAP Online Privacy Control

OLAP Online Privacy Control OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy

More information

Data Warehouse Design

Data Warehouse Design Data Warehouse Design Modern Principles and Methodologies Matteo Golfarelli Stefano Rizzi Translated by Claudio Pagliarani Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City

More information

Keywords : Data Warehouse, Data Warehouse Testing, Lifecycle based Testing

Keywords : Data Warehouse, Data Warehouse Testing, Lifecycle based Testing Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Lifecycle

More information

MDA Transformations Applied to Web Application Development 1

MDA Transformations Applied to Web Application Development 1 MDA Transformations Applied to Web Application Development 1 Santiago Meliá 1, Andreas Kraus 2, and Nora Koch 2, 3 1 Universidad de Alicante, Spain 2 Ludwig-Maximilians-Universität München, Germany 3 F.A.S.T

More information

Business Intelligence in E-Learning

Business Intelligence in E-Learning Business Intelligence in E-Learning (Case Study of Iran University of Science and Technology) Mohammad Hassan Falakmasir 1, Jafar Habibi 2, Shahrouz Moaven 1, Hassan Abolhassani 2 Department of Computer

More information

A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems

A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems Proceedings of the Postgraduate Annual Research Seminar 2005 68 A Model-based Software Architecture for XML and Metadata Integration in Warehouse Systems Abstract Wan Mohd Haffiz Mohd Nasir, Shamsul Sahibuddin

More information

SDWM: An Enhanced Spatial Data Warehouse Metamodel

SDWM: An Enhanced Spatial Data Warehouse Metamodel SDWM: An Enhanced Spatial Data Warehouse Metamodel Alfredo Cuzzocrea 1, Robson do Nascimento Fidalgo 2 1 ICAR-CNR & University of Calabria, 87036 Rende (CS), ITALY cuzzocrea@si.deis.unical.it. 2. CIN,

More information

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,

More information

Metadata Management for Data Warehouse Projects

Metadata Management for Data Warehouse Projects Metadata Management for Data Warehouse Projects Stefano Cazzella Datamat S.p.A. stefano.cazzella@datamat.it Abstract Metadata management has been identified as one of the major critical success factor

More information

Managing a Fragmented XML Data Cube with Oracle and Timesten

Managing a Fragmented XML Data Cube with Oracle and Timesten ACM Fifteenth International Workshop On Data Warehousing and OLAP (DOLAP 2012) Maui, Hawaii, USA November 2nd, 2012 Managing a Fragmented XML Data Cube with Oracle and Timesten Doulkifli BOUKRAA, ESI,

More information

Efficient Integration of Data Mining Techniques in Database Management Systems

Efficient Integration of Data Mining Techniques in Database Management Systems Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France

More information

Conceptual Workflow for Complex Data Integration using AXML

Conceptual Workflow for Complex Data Integration using AXML Conceptual Workflow for Complex Data Integration using AXML Rashed Salem, Omar Boussaid, Jérôme Darmont To cite this version: Rashed Salem, Omar Boussaid, Jérôme Darmont. Conceptual Workflow for Complex

More information

Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model

Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Outline Using High-Level Conceptual Data Models for

More information

Performance Improvement Techniques for Customized Data Warehouse

Performance Improvement Techniques for Customized Data Warehouse IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 213), PP 1-5 Performance Improvement Techniques for Customized Data Warehouse Md. Al Mamun

More information

1. Introduction. Nouha Arfaoui 1 and Jalel Akaichi 2 ABSTRACT KEY WORDS

1. Introduction. Nouha Arfaoui 1 and Jalel Akaichi 2 ABSTRACT KEY WORDS Nouha Arfaoui 1 and Jalel Akaichi 2 Computer science department, Institut superieur de gestion, 41, Avenue de la liberté, Cité Bouchoucha, Le Bardo 2000, Tunisia 1 Arfaoui.nouha@yahoo.fr 2 Akaichi.jalel@isg.rnu.tn

More information

CIM to PIM Transformation: A criteria Based Evaluation

CIM to PIM Transformation: A criteria Based Evaluation ISSN:2229-6093 CIM to PIM Transformation: A criteria Based Evaluation Abdelouahed KRIOUILE *, Taoufiq GADI, Youssef BALOUKI Univ Hassan 1, LAVETE Laboratory, 26000 Settat, Maroc * E-mail of the corresponding

More information

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi

More information

Automatic Selection of Bitmap Join Indexes in Data Warehouses

Automatic Selection of Bitmap Join Indexes in Data Warehouses Automatic Selection of Bitmap Join Indexes in Data Warehouses Kamel Aouiche, Jérôme Darmont, Omar Boussaïd, Fadila Bentayeb To cite this version: Kamel Aouiche, Jérôme Darmont, Omar Boussaïd, Fadila Bentayeb

More information

A Comprehensive Security Model for Patient Data Warehouse

A Comprehensive Security Model for Patient Data Warehouse A Comprehensive Security Model for Patient Data Warehouse Paramasivam. Suraj thyagarajan 1, Neeraj Harikrishnan Girija Paramasivam 2 1 Department of Computer Science and Engineering, University at Buffalo,

More information

A Critical Review of Data Warehouse

A Critical Review of Data Warehouse Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 95-103 Research India Publications http://www.ripublication.com A Critical Review of Data Warehouse Sachin

More information

Design of a Multi Dimensional Database for the Archimed DataWarehouse

Design of a Multi Dimensional Database for the Archimed DataWarehouse 169 Design of a Multi Dimensional Database for the Archimed DataWarehouse Claudine Bréant, Gérald Thurler, François Borst, Antoine Geissbuhler Service of Medical Informatics University Hospital of Geneva,

More information

Data warehouse life-cycle and design

Data warehouse life-cycle and design SYNONYMS Data Warehouse design methodology Data warehouse life-cycle and design Matteo Golfarelli DEIS University of Bologna Via Sacchi, 3 Cesena Italy matteo.golfarelli@unibo.it DEFINITION The term data

More information

My Favorite Issues in Data Warehouse Modeling

My Favorite Issues in Data Warehouse Modeling University of Münster My Favorite Issues in Data Warehouse Modeling Jens Lechtenbörger University of Münster & ERCIS, Germany http://dbms.uni-muenster.de Context Data Warehouse (DW) modeling ETL design

More information

II. OLAP(ONLINE ANALYTICAL PROCESSING)

II. OLAP(ONLINE ANALYTICAL PROCESSING) Association Rule Mining Method On OLAP Cube Jigna J. Jadav*, Mahesh Panchal** *( PG-CSE Student, Department of Computer Engineering, Kalol Institute of Technology & Research Centre, Gujarat, India) **

More information

The Importance of Multidimensional Modeling in Data warehouses

The Importance of Multidimensional Modeling in Data warehouses COVER FEATURE Designing Data Warehouses with OO Conceptual Models Based on a subset of the Unified Modeling Language, the authors objectoriented approach to building data warehouses frees conceptual design

More information

DC Proposal: Online Analytical Processing of Statistical Linked Data

DC Proposal: Online Analytical Processing of Statistical Linked Data DC Proposal: Online Analytical Processing of Statistical Linked Data Benedikt Kämpgen Institute AIFB, Karlsruhe Institute of Technology, 76128 Karlsruhe, Germany benedikt.kaempgen@kit.edu Abstract. The

More information

ETL evolution from data sources to data warehouse using mediator data storage

ETL evolution from data sources to data warehouse using mediator data storage ETL evolution from data sources to data warehouse using mediator data storage Alexander Dolnik (alexander.dolnik@gmail.com) Saint-Petersburg State University Abstract. The problem of evolution in the ETL

More information

Data Warehouse: Introduction

Data Warehouse: Introduction Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of base and data mining group,

More information

Alejandro Vaisman Esteban Zimanyi. Data. Warehouse. Systems. Design and Implementation. ^ Springer

Alejandro Vaisman Esteban Zimanyi. Data. Warehouse. Systems. Design and Implementation. ^ Springer Alejandro Vaisman Esteban Zimanyi Data Warehouse Systems Design and Implementation ^ Springer Contents Part I Fundamental Concepts 1 Introduction 3 1.1 A Historical Overview of Data Warehousing 4 1.2 Spatial

More information

Modeling Temporal Data in Electronic Health Record Systems

Modeling Temporal Data in Electronic Health Record Systems International Journal of Information Science and Intelligent System, 3(3): 51-60, 2014 Modeling Temporal Data in Electronic Health Record Systems Chafiqa Radjai 1, Idir Rassoul², Vytautas Čyras 3 1,2 Mouloud

More information

DATA WAREHOUSING AND OLAP TECHNOLOGY

DATA WAREHOUSING AND OLAP TECHNOLOGY DATA WAREHOUSING AND OLAP TECHNOLOGY Manya Sethi MCA Final Year Amity University, Uttar Pradesh Under Guidance of Ms. Shruti Nagpal Abstract DATA WAREHOUSING and Online Analytical Processing (OLAP) are

More information

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in

More information

Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole

Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole Paper BB-01 Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole ABSTRACT Stephen Overton, Overton Technologies, LLC, Raleigh, NC Business information can be consumed many

More information

Designing Data Warehouses for Geographic OLAP querying by using MDA

Designing Data Warehouses for Geographic OLAP querying by using MDA Designing Data Warehouses for Geographic OLAP querying by using MDA Octavio Glorio and Juan Trujillo University of Alicante, Spain, Department of Software and Computing Systems Lucentia Research Group

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France

More information

BUILDING OLAP TOOLS OVER LARGE DATABASES

BUILDING OLAP TOOLS OVER LARGE DATABASES BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,

More information

CHAPTER 4: BUSINESS ANALYTICS

CHAPTER 4: BUSINESS ANALYTICS Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the

More information

Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring

Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring www.ijcsi.org 78 Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring Mohammed Mohammed 1 Mohammed Anad 2 Anwar Mzher 3 Ahmed Hasson 4 2 faculty

More information

Chapter 8 The Enhanced Entity- Relationship (EER) Model

Chapter 8 The Enhanced Entity- Relationship (EER) Model Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization

More information

Optimization of ETL Work Flow in Data Warehouse

Optimization of ETL Work Flow in Data Warehouse Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. Sivaganesh07@gmail.com P Srinivasu

More information

Patient Trajectory Modeling and Analysis

Patient Trajectory Modeling and Analysis Patient Trajectory Modeling and Analysis Jalel Akaichi and Marwa Manaa Higher Institute of Management of tunis, 41 Rue de la Liberté, Cité Bouchoucha, 2000 Bardo, Tunisia j.akaichi@gmail.com, manaamarwa@gmail.com

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

Data Validation with OWL Integrity Constraints

Data Validation with OWL Integrity Constraints Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA evren@clarkparsia.com Abstract. Data validation is an important part of data integration

More information

Business Process Modelling Languages, Goals and Variabilities

Business Process Modelling Languages, Goals and Variabilities Business Process Modelling Languages, Goals and Variabilities Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner 24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

Application Of Business Intelligence In Agriculture 2020 System to Improve Efficiency And Support Decision Making in Investments.

Application Of Business Intelligence In Agriculture 2020 System to Improve Efficiency And Support Decision Making in Investments. Application Of Business Intelligence In Agriculture 2020 System to Improve Efficiency And Support Decision Making in Investments Anuraj Gupta Department of Electronics and Communication Oriental Institute

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Chapter 5 Foundations of Business Intelligence: Databases and Information Management 5.1 Copyright 2011 Pearson Education, Inc. Student Learning Objectives How does a relational database organize data,

More information

Tracking System for GPS Devices and Mining of Spatial Data

Tracking System for GPS Devices and Mining of Spatial Data Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja

More information

Access control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid

Access control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid Access control for data integration in presence of data dependencies Mehdi Haddad, Mohand-Saïd Hacid 1 Outline Introduction Motivating example Related work Approach Detection phase (Re)configuration phase

More information

Adding Semantics to Business Intelligence

Adding Semantics to Business Intelligence Adding Semantics to Business Intelligence Denilson Sell 1,2, Liliana Cabral 2, Enrico Motta 2, John Domingue 2 and Roberto Pacheco 1,3 1 Stela Group, Universidade Federal de Santa Catarina, Brazil 2 Knowledge

More information

CHAPTER 5: BUSINESS ANALYTICS

CHAPTER 5: BUSINESS ANALYTICS Chapter 5: Business Analytics CHAPTER 5: BUSINESS ANALYTICS Objectives The objectives are: Describe Business Analytics. Explain the terminology associated with Business Analytics. Describe the data warehouse

More information

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data

More information

1. OLAP is an acronym for a. Online Analytical Processing b. Online Analysis Process c. Online Arithmetic Processing d. Object Linking and Processing

1. OLAP is an acronym for a. Online Analytical Processing b. Online Analysis Process c. Online Arithmetic Processing d. Object Linking and Processing 1. OLAP is an acronym for a. Online Analytical Processing b. Online Analysis Process c. Online Arithmetic Processing d. Object Linking and Processing 2. What is a Data warehouse a. A database application

More information

THE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE

THE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE THE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE Dr. Osama E.Sheta 1 and Ahmed Nour Eldeen 2 1,2 Department of Mathematics (Computer Science) Faculty of Science, Zagazig

More information

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,

More information

Towards Privacy aware Big Data analytics

Towards Privacy aware Big Data analytics Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy

More information

Nursing Diagnosis and Multidimensional Design

Nursing Diagnosis and Multidimensional Design Proceedings of the 3 rd INFORMS Workshop on Data Mining and Health Informatics (DM-HI 2008) J. Li, D. Aleman, R. Sikora, eds. NursingCareWare: Warehousing for Nursing Care Research and Knowledge Discovery

More information

OLAP. Business Intelligence OLAP definition & application Multidimensional data representation

OLAP. Business Intelligence OLAP definition & application Multidimensional data representation OLAP Business Intelligence OLAP definition & application Multidimensional data representation 1 Business Intelligence Accompanying the growth in data warehousing is an ever-increasing demand by users for

More information

Requirements are elicited from users and represented either informally by means of proper glossaries or formally (e.g., by means of goal-oriented

Requirements are elicited from users and represented either informally by means of proper glossaries or formally (e.g., by means of goal-oriented A Comphrehensive Approach to Data Warehouse Testing Matteo Golfarelli & Stefano Rizzi DEIS University of Bologna Agenda: 1. DW testing specificities 2. The methodological framework 3. What & How should

More information

A Survey on Data Warehouse Architecture

A Survey on Data Warehouse Architecture A Survey on Data Warehouse Architecture Rajiv Senapati 1, D.Anil Kumar 2 1 Assistant Professor, Department of IT, G.I.E.T, Gunupur, India 2 Associate Professor, Department of CSE, G.I.E.T, Gunupur, India

More information

A Modeling Tool for Multidimensional Data using the ADAPT Notation

A Modeling Tool for Multidimensional Data using the ADAPT Notation A Modeling Tool for Multidimensional Data using the ADAPT Notation Peter Gluchowski, Christian Kurze, Christian Schieder Chemnitz University of Technology {petergluchowski christiankurze christianschieder}@wirtschafttu-chemnitzde

More information

Improving Agility in Model-Driven Web Engineering

Improving Agility in Model-Driven Web Engineering Improving Agility in Model-Driven Web Engineering José Matías Rivero 1,2, Julián Grigera 1, Gustavo Rossi 1,2, Esteban Robles Luna 1, Nora Koch 3,4 1 LIFIA, Facultad de Informática, UNLP, La Plata, Argentina

More information

Two approaches to the integration of heterogeneous data warehouses

Two approaches to the integration of heterogeneous data warehouses Distrib Parallel Databases (2008) 23: 69 97 DOI 10.1007/s10619-007-7022-z Two approaches to the integration of heterogeneous data warehouses Riccardo Torlone Published online: 23 December 2007 Springer

More information

Reverse Engineering in Data Integration Software

Reverse Engineering in Data Integration Software Database Systems Journal vol. IV, no. 1/2013 11 Reverse Engineering in Data Integration Software Vlad DIACONITA The Bucharest Academy of Economic Studies diaconita.vlad@ie.ase.ro Integrated applications

More information

An Agent Based Etl System: Towards an Automatic Code Generation

An Agent Based Etl System: Towards an Automatic Code Generation World Applied Sciences Journal 31 (5): 979-987, 2014 ISSN 1818-4952 IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.31.05.268 An Agent Based Etl System: Towards an Automatic Code Generation Abderrahmane

More information