A practical application of our MDD approach for modeling secure XML data warehouses

0
99

Authors: Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos

Tags: 2011, conceptual modeling

Data warehouses are systems that provide useful information to support the decision making process, thus improving organizations’ business processes. These systems integrate heterogeneous sources which are not only limited to their internal business data but also include data from the Web, the latter of which have become increasingly more important in the decision making process in recent years. This has motivated the extensive use of XML in the implementation of data warehouses, in a manner which facilitates data and metadata interchange among the heterogeneous data sources from the Web and the data warehouse. However, the business information that data warehouses manage is crucial and highly sensitive, and must be carefully protected. Security is thus a key issue in the design of data warehouses, regardless of the implementation technology used. It is important to note that the data available on the Web requires particular security considerations which have been specifically tailored to these systems in order to permit their particularities to be captured correctly. Unfortunately, although security issues have been considered in the development of traditional data warehouses, current research lacks approaches with which to consider security when the target platform is based on XML technology. In order to deal with this situation, in this paper we propose a methodological approach for the model driven development of secure XML data warehouses. We also specify a set of transformation rules that are able to automatically generate not only the corresponding XML structure of the data warehouse from secure conceptual data warehouse models, but also the security rules specified within the data warehouse XML structure, thus allowing both aspects to be implemented simultaneously. We additionally introduce our secure XML DW development approach, in which the secure conceptual DW data model, the PIM, is transformed into a secure XML DW, as a PSM, by applying a set of transformation rules. Our proposal is validated through the practical application of our model driven development approach for Modeling Secure XML Data Warehouses to a case study, which is based on a central Airport DW. We first describe the transformation rules defined, then use a step by step illustration to show how they will be applied to the secure conceptual model of the case study to obtain the Secure XML Data Warehouse, thus demonstrating the benefits of our proposal, and finally we analyze how to achieve the secure implementation into commercial database management systems, providing details of the secure implementation in Oracle XML DB 11 g

Read the full paper here: https://pdf.sciencedirectassets.com/271653/1-s2.0-S0167923612X00022/1-s2.0-S0167923611002144/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJIMEYCIQD8Q%2FC3QMypwPlNJNATr7rq0hFro5UQ7%2FzPvZ26esSgygIhALGsp0WMcxway1IoqXupOlRztdBNNmr7c0OPEw0%2BJDDYKr0DCMD%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQAxoMMDU5MDAzNTQ2ODY1Igz8r2oMZM60CxRE0psqkQMWk%2B0bQet0BoH9Yn88vcV3TB9%2FJLKJ8DCHOLzTQ0RNOz2AXzHmxkyGIwGSvixKRNeCJhQWzEplk6C0HyLBb%2FU81JG6zJFBvHeNwZl4h8rY3YEo0EODVdV5mC%2BgRzXOvpJiQSbO9WQoYdPsk%2BlT1AScOk8AbJpAWMGjfYYkDMoXdSw2hYOqL0PLjtdp6ubOmXEPQOJBV5cR2W8L7ld4stR%2BCKs8O%2FUicjD6fGvOrIEp4AR53Gt2bMrf4RpRm6pWUbpKWPEmPL2n04fDJThYvUURmhjxAVPhSDATBUqR2b3wAyUdoNReukcOO1qJZF6OU3Uu8eYbGw4tYfjAnUmKuyD%2BT%2B1UCdz%2F9DvF0ZH%2BzJ%2FhtLSj7WNmGsCVyUyWPsIbZJpKj00FF8F7XZEMBQLZlWZ99U5w25WRhJcj%2FG5RhaRxv1QlGJdBsS04W1YYrWFVzEypCQNku9c1npvSt8Zc%2BvStbOilUEc5Ts2L2J6iIZVAwGgmMkNiDvwAwAsQEWfkMu6fOcI2isP6WDgyf2AYvjhxCTCtxpT6BTrqAdq3T%2BLpleGR6UDW4m50zlS5cM8k7VGaahv5SbGQ5cnAiS%2FwyM93Se7kd3njyNrlqy%2Fp0qII1kvcJKQz8O1b9%2B12TsWM5ZcW3tb4LNdqQzjZCgi58gNDj91A6MxzCyipRbSmxs3Uk31xD5CUBtMVekGPtK1wpCx39TbFLTujtAeDrDS2STmsWTT2YbVCXQm%2BBwcnWqJXCsawXqH1zO0cyfWH7YLFWxDU%2Boj6gucazNxba%2FQPs%2FiAv5fOXRyAZe3j4drfJMgu4LDJF6umSDGzwkwePzZy0lqBYiMuri0ZpeTMlVZp0EU8iMchpA%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200825T152322Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTY2BDE5YOZ%2F20200825%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=2e683a34b27718b11ffc22b084083373a2ee35de60678da6ef675344cd53103f&hash=2273b0d572371bdd22c03f05d3c1c3c9097b244531dab7301e8f0260bfb22a58&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0167923611002144&tid=spdf-216a370c-c716-416f-8139-836329f4d4bd&sid=6675431d1f93d24bc00a2406701bcf4bbb2agxrqa&type=client