Abstract
Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for supporting the effective decision-making process. This paper presents a secure Web service-oriented architecture of the WWh. The proposed architecture provides the better scalability, availability of WWh, and secure analytical service for human and Internet of Things for effective decision making. In addition, the service-oriented architecture of WWh integrates intelligent devices for the process of decision making. The proposed architecture uses XML-based Web services to provide authentication, authorization, and data confidentiality and integrity. Experiments show that the proposed architecture is more reliable, scalable, and secure.
Similar content being viewed by others
References
Malik S, Shaikh MU (2008) Web warehouse: towards efficient distributed business management. In: Proceedings of the 12th IEEE international multitopic conference, pp 23–24
Lihong J, Junliang X, Boyi X, Hongming C (2011) An automatic method of data warehouses multidimension modeling for distributed information systems. In: Proceeding of international conference on computer supported cooperative work in design, pp 9–16
Yong B, Hongwei Y, Xueqiang Y (2011) Knowledge acquisition process based on data warehouse. Int Conf Comput Sci Netw Technol 4(6):2751–2755
Prez JM, Rafael RA, Maria JA, Torben BT (2008) Integrating data warehouses with web data: a survey. IEEE Trans Knowl Data Eng 20(7):940–955
Tan X, David CY, Xiang F (2003) Web warehousing: web technology meets data warehousing. Technol Soc 25(1):131–148
Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. Comput Inf Technol 5:199–205
Destercke S, Patrice B, Brigitte C (2013) Evaluating data reliability: an evidential answer with application to a web-enabled data warehouse. IEEE Trans Knowl Data Eng 25(1):92–105
Katic N, Quirchmay G, Schiefer J, Stolba MASM, Tjo AM (1998) A prototype model for data warehouse security based on metadata. In: Ninth international workshop on database and expert systems applications, pp 300–308
Piattini M, Jose AR (1999) Auditing data warehouse security. In: IEEE 33rd annual international carnahan conference on security technology, pp 255–261
Burr WE (2003) Selecting the advanced encryption standard. IEEE Secur Priv 1(2):43–52
Rivest RL, Adi SL (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Hajer AH, Joonsang B, Chan YY (2011) Survey on certificateless public key cryptography. In: Proceeding of international conference for internet technology and secured transactions (ICITST), pp 53–58
Sharma Y, Raghib N, Kumar A (2012) Building a data warehousing infrastructure based on service oriented architecture. In: Proceeding of international conference on cloud computing technologies on applications and management (ICCCTAM), pp 82–87
Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. In: The proceeding of the fifth international conference on computer and information technology (CIT), pp 199–205
Simitsis A, Panos V, Timos S (2005) State-space optimization of ETL workflows. IEEE Trans Knowl Data Eng 17(10):1404–1419
MacGregor JM (2010) Apparatus and method for strategy map validation and visualization. U.S. Patent 7,730,023, issued June 1
Blanco C, Eduardo FM, Juan T, Mario P (2008) Implementing multidimensional security into OLAP tools. In: Proceeding of the third international conference on availability, reliability and security(ARES 08), pp 1248–1253
Bianchi RG, Yuki HG, Lopes STL (2013) On the performance and use of spatial OLAP tools. In: Proceeding of Latin American computing conference (CLEI), pp 1–12
Chen M, Xuedong G, Hui FL (2010) Parallel DBSCAN with priority r-tree. In: Proceeding of the 2nd IEEE international conference on information management and engineering (ICIME), pp 508–511
Jing Z, Song F (2009) Application of web and data warehouse in MDSS based on multi-agent systems. In: Proceeding of the international conference on management and service science (MASS), pp 1–4
Balasubramanian N, Ruba A (2012) Security: a major threat for web services. In: Proceeding of the IEEE international conference on advanced communication control and computing technologies (ICACCCT), pp 104–109
Masood A (2013) Cyber security for service oriented architectures in a Web 2.0 world: an overview of SOA vulnerabilities in financial services. In: Proceeding of the IEEE international conference technologies for homeland security (HST), pp 1–06
Bi ZM, Xu L, Chengen W (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Ind Inf 10(2):1537–1546
Weber RH (2009) Internet of things-need for a new legal environment. Comput Law Secur Rev 25(6):522–527
Atzori L, Antonio I, Giacomo M (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Pereira PP, Jens E, Rumen K, Jerker D, Asma R, Mia J (2013) Enabling cloud connectivity for mobile internet of things applications. In: Proceeding of the IEEE 7th international symposium on service oriented system engineering (SOSE), pp 518–526
Nain G, Franois F, Brice M, Olivier B, Jean M J (2010) Integrating IoT and ios with a component-based approach. In: Proceeding of the 36th Euromicro conference software engineering and advanced applications (SEAA), pp 191–198
Kiljander JA, Elia D, Morandi F, Hyttinen P, Takalo-Mattila J, Ylisaukko-Oja A, Soininen J, Salmon CT (2014) Semantic interoperability architecture for pervasive computing and internet of things. IEEE Trans Ind Inf Publ Inf 2:856–873
Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. In: Proceeding of the fifth international conference computer and information technology (CIT), pp 199–205
Vaisman AA, Adrian I, Marcelo K (2006) Web-enabled Temporal OLAP. In: Proceeding of fourth Latin American web congress, pp 220–229
Ester M, Hans-Peter K, Jrg S, Xiaowei X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 96:226–231
Durham, Erin-Elizabeth A, Xiaxia Y, Robert WH (2014) FDT 2.0: improving scalability of the fuzzy decision tree induction tool-integrating database storage. In: IEEE symposium on computational intelligence in healthcare and e-health (CICARE), pp 187–190
Rodriguez A, Laio A (2014) Clustering by fast search and find of density peaks. Science 344(6191):1492–1496
Priebe T, Gnther P (2000) Towards OLAP security design-survey and research issues. In: Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP, pp 33–40
Acknowledgments
This research is sponsored by National Natural Science Foundation of China (Nos. 61171014, 61371185, 61401029, 11401028), the Fundamental Research Funds for the Central Universities(Nos. 2014KJJCB32, 2013NT57, 2012LYB46), and by SRF for ROCS, SEM.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mehmood, R., Shaikh, M.U., Bie, R. et al. IoT-enabled Web warehouse architecture: a secure approach. Pers Ubiquit Comput 19, 1157–1167 (2015). https://doi.org/10.1007/s00779-015-0882-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-015-0882-8