Title :
Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions
Author :
Al-Aqrabi, H. ; Lu Liu ; Hill, Richard ; ZhiJun Ding ; Antonopoulos, Nikos
Author_Institution :
Sch. of Comput. & Math., Univ. of Derby, Derby, UK
Abstract :
Business intelligence (BI) is a critical software system employed by the higher management of organizations for presenting business performance reports through Online Analytical Processing (OLAP) functionalities. BI faces sophisticated security issues given its strategic importance for higher management of business entities. Scholars have emphasized on enhanced session, presentation and application layer security in BI, in addition to the usual network and transport layer security controls. This is because an unauthorized user can gain access to highly sensitive consolidated business information in a BI system. To protect a BI environment, a number of controls are needed at the level of database objects, application files, and the underlying servers. In a cloud environment, the controls will be needed at all the components employed in the service-oriented architecture for hosting BI on the cloud. Hence, a BI environment (whether self-hosted or cloud-hosted) is expected to face significant security overheads. In this context, two models for securing BI on a cloud have been simulated in this paper. The first model is based on securing BI using a Unified Threat Management (UTM) cloud and the second model is based on distributed security controls embedded within the BI server arrays deployed throughout the Cloud. The simulation results revealed that the UTM model is expected to cause more overheads and bottlenecks per OLAP user than the distributed security model. However, the distributed security model is expected to pose administrative control effectiveness challenges than the UTM model. Based on the simulation results, it is recommended that BI security model on a Cloud should comprise of network, transport, session and presentation layers of security controls through UTM, and application layer security through the distributed security components. A mixed environment of both the models will ensure technical soundness of security controls, better security processes, - learly defined roles and accountabilities, and effectiveness of controls.
Keywords :
cloud computing; competitive intelligence; data mining; security of data; service-oriented architecture; OLAP functionalities; UTM; business entities; business intelligence security; clouds; critical software system; online analytical processing; security controls; security process; service-oriented architecture; unified threat management; Bismuth; Business; Data mining; Data warehouses; Databases; Security; Servers; Application Layer Security; Business Intelligence; Cloud Computing; Data Mart Security; Data Warehouse Security; Distributed Security Controls; OLAP Security; Object Level Security; Online Analytical Processing; Unified Threat Management;
Conference_Titel :
Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on
Conference_Location :
Redwood City
Print_ISBN :
978-1-4673-5659-6
DOI :
10.1109/SOSE.2013.36