Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 20 / Issue 2

available in:   PDF (1 MB) PS (3 MB)
 
get:  
Similar Docs BibTeX   Write a comment
  
get:  
Links into Future
 
DOI:   10.3217/jucs-020-02-0079

 

Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications

Carlos Blanco (University of Cantabria, Spain)

Ignacio García-Rodríguez de Guzmán (University of Castilla-La Mancha, Spain)

Eduardo Fernández-Medina (University of Castilla-La Mancha, Spain)

Juan Trujillo (University of Alicante, Spain)

Abstract: Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by using On-Line Analytical Processing (OLAP) tools. The establishment of security constraints in all development stages and operations of the DW is highly important since otherwise, unauthorized users may discover vital business information.

The final users of OLAP tools access and analyze the information from the corporate DW by using specific views or cubes based on the multidimensional modelling containing the facts and dimensions (with the corresponding classification hierarchies) that a decision maker or group of decision makers are interested in. Thus, it is important that security constraints will be also established over this metadata layer that connects the DW's repository with the decision makers, that is, directly over the multidimensional structures that final users manage. In doing so, we will not have to define specific security constraints for every particular user, thereby reducing the developing time and costs for secure OLAP applications.

In order to achieve this goal, a model driven architecture to automatically develop secure OLAP applications from models has been defined. This paper shows the benefits of this architecture by applying it to a case study in which an OLAP application for an airport DW is automatically developed from models. The architecture is composed of: (1) the secure conceptual modelling by using a UML profile; (2) the secure logical modelling for OLAP applications by using an extension of CWM; (3) the secure implementation into a specific OLAP tool, SQL Server Analysis Services (SSAS); and (4) the transformations needed to automatically generate logical models from conceptual models and the final secure implementation.

Keywords: MDA, OLAP, SSAS, Security, case study, confidentiality, data warehouses, model driven, transformations

Categories: H.2, H.2.1, H.2.2, K.6.5, L.4.0