International Conference and Workshop on Emerging Trends in Technology |
Foundation of Computer Science USA |
ICWET2012 - Number 2 |
March 2012 |
Authors: Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil |
265442a0-fdaa-4be1-b2c7-fb148a0e75d9 |
Preeti Patil, Nitin Chavan, Srikantha Rao, S B Patil . Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 2 (March 2012), 18-23.
Now days, many organizations outsource some of their important data to some outside trusted agents. This outsourced data coming from the data warehouse of the organization through ETL process may have some sensitive information. Though the agents are trusted one, the sensitive data may be given by them to some outside untrustworthy third party. This is known as data leakage. Such a data leakage may be the result of guilty agents or may be the third party has guessed or intruded the data by some other means. To find out whether the data has been given by agent or by some other means, the third party has guessed it, is very important issue. In this project, some data allocation techniques to trusted agents are presented that will improve the probability of identifying the guilty agents. The methods used do not modified the data. Also to find out the guilty agent is another sensitive topic. This paper proposes a system to find out the leakage of data and also the guilty agents. Few “realistic but fake” data can be injected to find out guilty agents.