Virtual Data Warehouse Model Employing Crypto–Math Modus Operandi and Intelligent Sensor Algorithm for Cosseted Transference and Output Augmentation

  • Rajdeep Chowdhury
  • Olive Roy
  • Soupayan Datta
  • Saswata Dasgupta


A data warehouse is a storehouse which comprises all specifics and statistics of the institution. With the contemporary leaning of hacking beside the initiation of fresh hacking proficiency, the safekeeping for data warehouse has transpired to be an influential portion. The projected work exemplifies how an encryption technique is germane in the internal structure of a data warehouse. Apiece instant, any user endeavor for entrance to the information, the data in encrypted form is furnished to the user. Only an authenticated user would be able to obtain the original form of the data, because a well-defined decryption algorithm is installed at the authentic user’s end only. The formulation of the spotless Intelligent Sensor Algorithm and the proposed cryptographic modus operandi ascertain that there would be considerable attenuation of admittance time, with observance for the cosseted transference, enhanced infringement avoidance and output augmentation. The applicable employment of the proposed virtual data warehouse model with improved safekeeping might be in its noteworthy utility in an assortment of institution where accrual of cosseted information is of extreme extent. The assortment of associations is inclusive of edifying institutions, business communities, medicinal associations, classified enterprises and there on.


Virtual Data Warehouse Crypto–math Intelligent Sensor Encryptor Decryptor Pseudo Cryptographic Algorithm 


  1. 1.
    Pal, B., Chowdhury, R., Chatterjee, P., Dasgupta, S., & De, M. (2015). Performance enhancement of data warehouse using minimization of query processing proposal to improve ROI. International Journal of Application or Innovation in Engineering and Management, 4(12), 35–42. ISSN: 2319 4847. Indexed in Thomson Reuters Researcher ID–N–6095–2015.Google Scholar
  2. 2.
    Chowdhury, R., Datta, S., Dasgupta, S., & De, M. (2015). Implementation of central dogma based cryptographic algorithm in data warehouse for performance enhancement. International Journal of Advanced Computer Science and Applications, 6(11), 29–34, ISSN (Online): 2156 5570, ISSN (Print): 2158 107X.Google Scholar
  3. 3.
    Chowdhury, R., Dey, K. S., Datta, S., & Shaw, S. (2014). Design and implementation of proposed drawer model based data warehouse architecture incorporating DNA translation cryptographic algorithm for security enhancement. In Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2014, Organized by Sri Jayachamarajendra College of Engineering, Mysore (pp. 55–60). Proceedings in USB: CFP14AWQ-USB, ISBN–978-1-4799-6628-8, INSPEC Accession Number–14881472, Published and Archived in IEEE Digital Xplore, ISBN: 978-1-4799-6629-5.Google Scholar
  4. 4.
    Chowdhury, R., Chatterjee, P., Mitra, P., & Roy, O. (2014). Design and implementation of security mechanism for data warehouse performance enhancement using two tier user authentication techniques. International Journal of Innovative Research in Science, Engineering and Technology, 3(6), 165–172. ISSN (Online): 2319 8753, ISSN (Print): 2347 6710.Google Scholar
  5. 5.
    Chowdhury, R., Pal, B., Ghosh, A., & De, M. (2012). A data warehouse architectural design using proposed pseudo mesh schema. In Proceedings of First International Conference on Intelligent Infrastructure, CSI ICII 2012, 47th Annual National Convention of Computer Society of India, Science City Auditorium, Kolkata (pp. 138–141). Tata McGraw Hill Education Private Limited. ISBN (13)–978-1-25-906170-7, ISBN (10)–978-1-25-906170-1.Google Scholar
  6. 6.
    Chowdhury, R., & Pal, B. (2010). Proposed hybrid data warehouse architecture based on data model. International Journal of Computer Science and Communication, 1(2), 211–213. ISSN: 0973 7391.Google Scholar
  7. 7.
    Saurabh, A. K., & Nagpal, B. (2011). A survey on current security strategies in data warehouses. International Journal of Engineering Science and Technology, 3(4), 3484–3488. ISSN: 0975 5462.Google Scholar
  8. 8.
    Santos, R. J., Bernardino, J., & Vieira, M. (2011). A survey on data security in data warehousing: Issues, challenges and opportunities. In International Conference on Computer as a Tool, EUROCON IEEE, Lisbon (pp. 1–4). INSPEC Accession Number–12075581, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4244-7486-8.Google Scholar
  9. 9.
    Vieira, M., Vieira, J., & Madeira, H. (2008). Towards data security in affordable data warehouse. In 7th European dependable computing conference.Google Scholar
  10. 10.
    Patel, A., & Patel, J. M. (2012). Data modeling techniques for data warehouse. International Journal of Multidisciplinary Research, 2(2), 240–246.Google Scholar
  11. 11.
    Chaudhuri, S., & Dayal, U. (1997). An overview of data warehousing and OLAP technology. Newsletter ACM SIGMOD Record, 26(1), 65–74.CrossRefGoogle Scholar
  12. 12.
    Farhan, M. S., Marie, M. E., El-Fangary, L. M., & Helmy, Y. K. (2011). An integrated conceptual model for temporal data warehouse security. Computer and Information Science, 4(4), 46–57.Google Scholar
  13. 13.
    Golfarelli, M., Maio, D., & Rizzi, S. (1998). The dimensional fact model: A conceptual model for data warehouses. International Journal of Cooperative Information Systems, 7(2–3), 215–247.CrossRefGoogle Scholar
  14. 14.
    Golfarelli, M., & Rizzi, S. (1998). A methodological framework for data warehouse design. In Proceedings of ACM First International Workshop on Data Warehousing and OLAP, DOLAP, Washington (pp. 3–9).Google Scholar
  15. 15.
    Chowdhury, R., Bose, R., Sengupta, N., & De, M. (2012). Logarithmic formula generated seed based cryptographic technique using proposed alphanumeric number system and Rubik Rotation Algorithm. In Proceedings of IEEE 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012, Organized by Jadavpur University, Kolkata (pp. 564–567). Proceedings in CD: IEEE Catalog Number–CFP1207U-CDR, ISBN–978-1-4673-4698-6, Proceedings in Print: IEEE Catalog Number–CFP1207U-PRT, ISBN–978-1-4673-4697-9, INSPEC Accession Number–13285714, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-4700-6.Google Scholar
  16. 16.
    Chowdhury, R., Ghosh, S., & De, M. (2012). String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix. In Proceedings of IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision 2012, ICIEV 2012, Organized by University of Dhaka, Dhaka, Bangladesh (pp. 1152–1157). Proceedings in CD: IEEE Catalog Number–CFP1244S-CDR, ISBN–978-1-4673-1152-6, Proceedings in Print: IEEE Catalog Number–CFP1244S-PRT, ISBN–978-1-4673-1151-9, Conference Proceedings: ISSN: 2226 2105, INSPEC Accession Number–13058551, Published and Archived in IEEE Digital Xplore, ISBN–978-1-4673-1153-3.Google Scholar
  17. 17.
    Chowdhury, R., Dutta, S., & De, M. (2014). Towards design, analysis and performance enhancement of data warehouse by implementation and simulation of p2p technology on proposed pseudo mesh architecture. International Journal of Innovative Research in Science, Engineering and Technology, An ISO 3297:2007 Certified Organization, 3(6), 178–187. ISSN (Print): 2347 6710, ISSN (Online): 2319 8753.Google Scholar
  18. 18.
    Pal, B., Chattopadhyay, S., Mitra, S., Chowdhury, R., & De, M. (2012). Study and comparison of indexing models in data warehouse. International Journal of Software Engineering Research & Practices, 2(3), 1–8, ISSN (Print): 2231 2048, ISSN (Online): 2231 0320.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Rajdeep Chowdhury
    • 1
  • Olive Roy
    • 2
  • Soupayan Datta
    • 2
  • Saswata Dasgupta
    • 2
  1. 1.Department of Computer ApplicationJIS College of EngineeringKalyani, NadiaIndia
  2. 2.Department of Computer Science and EngineeringJIS College of EngineeringKalyani, NadiaIndia

Personalised recommendations