Abstract
A data warehouse system is a necessity for fundamental decisions in every enterprise. The integration of data from several internal or external sources and the functionality of modern decision support systems like OLAP tools not only provide broad access to data but also raise security problems. Security concerns are more or less the same as those of other database systems but enriched especially with access and inference control in the multidimensional model. This paper presents an integrated approach for inference and access control not on the physical but on the conceptual level. The question is not only the restriction of relations, but rather the identification and evaluation of the inference problem of hierarchies and dimensions. The possibility to restrict or perturbate data in general, is not an adequate solution. We present some specific problems of a market research company and a solution with an indicator to discover possible attacks and so be able to restrict the access by mechanisms like aggregation, restriction or perturbation.
Chapter PDF
References
Inmon, W.H.: Building the Data Warehouse, 2. edition. New York, Chichester, Brisbane, Toronto, Singapur: John Wiley & Sons, Inc., 1996
Codd, E.F.; Codd, S.B.; Salley, C.T.: Providing OLAP (On-Line Analytical Processing) to User Analysts: An IT Mandate, White Paper, Arbor Software Cooporation, 1993
Sapia, C.; Blaschka, M.; Höfling, G.; Dinter, B.: Finding Your Way through Multidimensional Data Models, in: 9th International Workshop on Database and Expert Systems Applications (DEXA’98 Workshop, Vienna, Austria, Aug. 24–28), 1998
Lehner, W.; Albrecht, J.; Wedekind, H.: Multidimensional Normal Forms, in: 10th International Conference on Scientific and Statistical Data Management (SSDBM’98, Capri, Italy, July 1–3), 1998
Denning, D.E., Denning, P.J., Schwartz, M.D.: The Tracker: A Threat to Statisical Database Security, ACM Transactions on Database Systems, 4(1), March 1979, p. 76–96
Rowe, N.C.: Diophantine Inference on a Statitical Database, Infromation Processing Letters, 18, 1984, p. 25–31
Palley, M.A., Simonoff, J.S.: The Use of Regression Methodology for the Compromise of Confidential Infromation in Statistical Databases, ACM Transactions on Database Systems, 12(4), December 1987, p. 593–608
Delugach, H.S., Hinke, T.H.: Using Conceptual Graphs To Represent Database Inference Secruity Analysis, Journal Computing und Information Technology, 2(4), 1994, p. 291–307
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Steger, J., Günzel, H., Bauer, A. (2002). Identifying Security Holes in OLAP Applications. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_25
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_25
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive