Enhancing Security in Banking Environment Using Business Intelligence

Enhancing Security in Banking Environment Using Business Intelligence

Sonali Mathur, Shankar Lal Gupta, Payal Pahwa
Copyright: © 2020 |Pages: 14
DOI: 10.4018/IJIRR.2020100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data warehouses are the most valuable assets of an organization and are basically used for critical business and decision-making purposes. Data from different sources is integrated into the data warehouse. Thus, security issues arise as data is moved from one place to another. Data warehouse security addresses the methodologies that can be used to secure the data warehouse by protecting information from being accessed by unauthorized users for maintaining the reliability of the data warehouse. A data warehouse invariably contains information which needs to be considered extremely sensitive and confidential. Protecting this information is invariably very important as data in the data warehouse is accessed by users at various levels in the organization. The authors propose a method to protect information based on an encryption scheme which secures the data in the data warehouse. This article presents the most feasible security algorithm that can be used for securing the data stored in the operational database so as to prevent unauthorized access.
Article Preview
Top

1. Introduction

All the organizations nowadays are fetching data into the computer systems for every process of their organizations. The banking industry too has become highly competitive. The key strategies for many banks are to reduce their costs and increase their revenues. The most important task in banking industry is to handle large volume of data accumulated from the large number of transactions executed daily. Data warehouses are used as they are capable of integrating data from multiple sources providing good quality, transformed data from which meaningful information can be extracted by the organizations management for taking strategic business decisions by performing data analysis. With the advent of computerization of processes of an organization, volumes of data collection have increased in data warehouses and thus on the other hand, the users accessing and using the data have also increased. Banking industry is using the data for prediction and analysis for stock market, investors and customers (Sharma, 2018). The concept of social Big Data also helps the organizations to utilize large volume of data comprising of user’s area of interest, thereby providing better user insight to increase their revenues and improve the decision-making process (Abu-Salih et al., 2019). Prevention of unauthorised users from accessing or modifying data, data is susceptible to be stolen by hackers, availability of data to the users at the right time and log being recorded of users activities in the system are some of the basic requirements of security. These security requirements are more important in a data warehouse as a data warehouse contains data integrated from various sources, thus chances of malicious individual stealing information from a data warehouse can be one of the major lucrative targets in an organization. With the increase in the number of users accessing the data warehouse systems, security becomes an area of concern which needs to be taken care in order to maintain the confidentiality, integrity and availability of the data to all the users accessing it. Data security is also a concern when the data is getting stored in the Cloud as the owners are worried that the data can be lost or can be used by unauthorized users (Yang & Jia, 2012). Thus, in today’s scenario data security primarily must be handled wherever data is getting stored. The trio confidentiality, integrity, and availability are the three basic building blocks of information security (Whitman et al., 2012) which are identically referred to as the security attributes, security properties, security goals, fundamental aspects of security, basic building blocks of security or critical information characteristics in literature. Some security approaches for the trio have also been studied in literature thereby emphasizing ways by which security of the data warehouses can be increased (Aleem et al., 2015).

Confidentiality of data refers to accessing of information by only authorized users, entities or processes (Beckers, 2015). In terms of a data warehouse, it conveys that only the users who have been granted the right to access the data are the authorized personnel’s who can access the data and security is maintained through authorized users logging in using username and passwords.

Integrity of data guarantees accuracy and completeness of data (Boritz, 2005). With respect to the data warehouse, it conveys that the data has been received from authentic sources and has not modified by any unauthorized user in an undefined manner.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing