A Generic Data Privacy Approach for Relational Databases and Data Warehouses
Keywords:
relational, privacy, genericAbstract
Currently data privacy is a big challenge for relational databases and data warehouses. Data privacy concerns are extremely critical in today’s data driven world due to data privacy regulations like Global Data Protection Legislation (GDPR). Data privacy in relational databases and data warehouses is typically implemented using row and column level security. Currently most of the databases and data warehouses do not support row and column level security and very few of the databases and data warehouses support it in a very customized or specific way. This paper discusses an approach that can be used to achieve data privacy for relational databases and data warehouses in a generic and integrated way. A generic and integrated data privacy layer is proposed in this paper. This generic and integrated data privacy layer will provide row and column level security using rules and policies that can be defined at user, group or role level and will work with relational databases and data warehouses.
Downloads
References
D. Dayong, "Overview of Big Data and Hive," in Apache Hive Essentials, Packt Publishing, 2015. K. Shirudkar and D. Motwani, "Big Data Security," International Journal of Advance Research in Computer Science and Software Engineering, vol. 5, no. 3, pp. 1102-1105, 2015.
D. S. Terzi, R. Terzi, and S. Sagiroglu, "A Survey on Security and Privacy Issues in Big Data," in The 10th International Conference for Internet Technology and Secured Transactions, 2015.
V. N. Inukollu, S. Arsi and S. R. Ravuri, "Security Issues associated with Big Data in cloud computing," International Journal of Network Security & Its Applications (IJNSA), vol. 6, no. 3, pp. 51-55, 2014.
Y. Tian, "Towards the Development of Best Data Security for Big Data," Communications and Networks, vol. 9, pp. 291-301, 2017.
A. Gosain and A. Arora, "Security Issues in Data Warehouse: A Systematic Review," in International Conference on Intelligent Computing, Communication & Convergence, Bhubneshwar, 2015.
E. Fernandez-Medina, J. Trujillo, R. Villaroel and M. Piattini, "Access control and audit model for the multidimensional modeling," Decision Support System, Elsevier, vol. 42, pp. 1270-1289, 2005.
R. K. Sharma and V. Kapoor, "Implementing Row and Column Level Security in Hive," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 9, pp. 1329-1332, 2017.
K. Michael and K. W. Miller, "Big Data: New Opportunities and New Challenges," IEEE Computer Society, pp. 22-24, 2013.
F. Prasser, H. Spengler, R. Bild, J. Eicher and K. A. Kuhn, "Privacy-enhancing ETL-processes for biomedical data," International Journal of Medical Informatics, vol. 126, pp. 72-81, 2019.
J. Meszaros, "The conflict between privacy and scientific research in the GDPR," in Pacific Neighborhood Consortium Annual Conference and Joint Meetings (PNC), 2018.
Curt Cotner and Roger Lee Miller, “Row level security in Database Management System”, US patent no. 9,870,483 B2
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.