Skip to main content
Log in

IoT-enabled Web warehouse architecture: a secure approach

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for supporting the effective decision-making process. This paper presents a secure Web service-oriented architecture of the WWh. The proposed architecture provides the better scalability, availability of WWh, and secure analytical service for human and Internet of Things for effective decision making. In addition, the service-oriented architecture of WWh integrates intelligent devices for the process of decision making. The proposed architecture uses XML-based Web services to provide authentication, authorization, and data confidentiality and integrity. Experiments show that the proposed architecture is more reliable, scalable, and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Malik S, Shaikh MU (2008) Web warehouse: towards efficient distributed business management. In: Proceedings of the 12th IEEE international multitopic conference, pp 23–24

  2. Lihong J, Junliang X, Boyi X, Hongming C (2011) An automatic method of data warehouses multidimension modeling for distributed information systems. In: Proceeding of international conference on computer supported cooperative work in design, pp 9–16

  3. Yong B, Hongwei Y, Xueqiang Y (2011) Knowledge acquisition process based on data warehouse. Int Conf Comput Sci Netw Technol 4(6):2751–2755

    Google Scholar 

  4. Prez JM, Rafael RA, Maria JA, Torben BT (2008) Integrating data warehouses with web data: a survey. IEEE Trans Knowl Data Eng 20(7):940–955

    Article  Google Scholar 

  5. Tan X, David CY, Xiang F (2003) Web warehousing: web technology meets data warehousing. Technol Soc 25(1):131–148

    Article  Google Scholar 

  6. Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. Comput Inf Technol 5:199–205

    Google Scholar 

  7. Destercke S, Patrice B, Brigitte C (2013) Evaluating data reliability: an evidential answer with application to a web-enabled data warehouse. IEEE Trans Knowl Data Eng 25(1):92–105

    Article  Google Scholar 

  8. Katic N, Quirchmay G, Schiefer J, Stolba MASM, Tjo AM (1998) A prototype model for data warehouse security based on metadata. In: Ninth international workshop on database and expert systems applications, pp 300–308

  9. Piattini M, Jose AR (1999) Auditing data warehouse security. In: IEEE 33rd annual international carnahan conference on security technology, pp 255–261

  10. Burr WE (2003) Selecting the advanced encryption standard. IEEE Secur Priv 1(2):43–52

    Article  Google Scholar 

  11. Rivest RL, Adi SL (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  12. Hajer AH, Joonsang B, Chan YY (2011) Survey on certificateless public key cryptography. In: Proceeding of international conference for internet technology and secured transactions (ICITST), pp 53–58

  13. Sharma Y, Raghib N, Kumar A (2012) Building a data warehousing infrastructure based on service oriented architecture. In: Proceeding of international conference on cloud computing technologies on applications and management (ICCCTAM), pp 82–87

  14. Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. In: The proceeding of the fifth international conference on computer and information technology (CIT), pp 199–205

  15. Simitsis A, Panos V, Timos S (2005) State-space optimization of ETL workflows. IEEE Trans Knowl Data Eng 17(10):1404–1419

    Article  Google Scholar 

  16. MacGregor JM (2010) Apparatus and method for strategy map validation and visualization. U.S. Patent 7,730,023, issued June 1

  17. Blanco C, Eduardo FM, Juan T, Mario P (2008) Implementing multidimensional security into OLAP tools. In: Proceeding of the third international conference on availability, reliability and security(ARES 08), pp 1248–1253

  18. Bianchi RG, Yuki HG, Lopes STL (2013) On the performance and use of spatial OLAP tools. In: Proceeding of Latin American computing conference (CLEI), pp 1–12

  19. Chen M, Xuedong G, Hui FL (2010) Parallel DBSCAN with priority r-tree. In: Proceeding of the 2nd IEEE international conference on information management and engineering (ICIME), pp 508–511

  20. Jing Z, Song F (2009) Application of web and data warehouse in MDSS based on multi-agent systems. In: Proceeding of the international conference on management and service science (MASS), pp 1–4

  21. Balasubramanian N, Ruba A (2012) Security: a major threat for web services. In: Proceeding of the IEEE international conference on advanced communication control and computing technologies (ICACCCT), pp 104–109

  22. Masood A (2013) Cyber security for service oriented architectures in a Web 2.0 world: an overview of SOA vulnerabilities in financial services. In: Proceeding of the IEEE international conference technologies for homeland security (HST), pp 1–06

  23. Bi ZM, Xu L, Chengen W (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Ind Inf 10(2):1537–1546

    Article  Google Scholar 

  24. Weber RH (2009) Internet of things-need for a new legal environment. Comput Law Secur Rev 25(6):522–527

    Article  Google Scholar 

  25. Atzori L, Antonio I, Giacomo M (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  26. Pereira PP, Jens E, Rumen K, Jerker D, Asma R, Mia J (2013) Enabling cloud connectivity for mobile internet of things applications. In: Proceeding of the IEEE 7th international symposium on service oriented system engineering (SOSE), pp 518–526

  27. Nain G, Franois F, Brice M, Olivier B, Jean M J (2010) Integrating IoT and ios with a component-based approach. In: Proceeding of the 36th Euromicro conference software engineering and advanced applications (SEAA), pp 191–198

  28. Kiljander JA, Elia D, Morandi F, Hyttinen P, Takalo-Mattila J, Ylisaukko-Oja A, Soininen J, Salmon CT (2014) Semantic interoperability architecture for pervasive computing and internet of things. IEEE Trans Ind Inf Publ Inf 2:856–873

    Google Scholar 

  29. Zhang Y, Xiangdong Q (2005) Effectively maintaining single view consistency in web warehouses. In: Proceeding of the fifth international conference computer and information technology (CIT), pp 199–205

  30. Vaisman AA, Adrian I, Marcelo K (2006) Web-enabled Temporal OLAP. In: Proceeding of fourth Latin American web congress, pp 220–229

  31. Ester M, Hans-Peter K, Jrg S, Xiaowei X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 96:226–231

    Google Scholar 

  32. Durham, Erin-Elizabeth A, Xiaxia Y, Robert WH (2014) FDT 2.0: improving scalability of the fuzzy decision tree induction tool-integrating database storage. In: IEEE symposium on computational intelligence in healthcare and e-health (CICARE), pp 187–190

  33. Rodriguez A, Laio A (2014) Clustering by fast search and find of density peaks. Science 344(6191):1492–1496

    Article  Google Scholar 

  34. Priebe T, Gnther P (2000) Towards OLAP security design-survey and research issues. In: Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP, pp 33–40

Download references

Acknowledgments

This research is sponsored by National Natural Science Foundation of China (Nos. 61171014, 61371185, 61401029, 11401028), the Fundamental Research Funds for the Central Universities(Nos. 2014KJJCB32, 2013NT57, 2012LYB46), and by SRF for ROCS, SEM.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashid Mehmood.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehmood, R., Shaikh, M.U., Bie, R. et al. IoT-enabled Web warehouse architecture: a secure approach. Pers Ubiquit Comput 19, 1157–1167 (2015). https://doi.org/10.1007/s00779-015-0882-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-015-0882-8

Keywords

Navigation