A Study on Hash Chain-based Hadoop Security Scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jung, Young-Ae | - |
dc.contributor.author | Woo, Si-Jae | - |
dc.contributor.author | Yeo, Sang-Soo | - |
dc.date.accessioned | 2023-03-08T19:39:11Z | - |
dc.date.available | 2023-03-08T19:39:11Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64680 | - |
dc.description.abstract | Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation. Many research articles have studied its vulnerabilities and some of them proposed their own security schemes. This paper introduces PK scheme, one of Hadoop security schemes, and presents its well designed security protocol and also its performance problem. PK scheme is based on one-time token method, and pretty strong to prevent vulnerability of the block access token which acts as a proof of user's access right on data blocks. This paper introduces a novel approach making up its performance problem, and proposes efficient security scheme which is based on hash chain method. | - |
dc.format.extent | 5 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE | - |
dc.title | A Study on Hash Chain-based Hadoop Security Scheme | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.332 | - |
dc.identifier.bibliographicCitation | IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, pp 1831 - 1835 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000411670500310 | - |
dc.identifier.scopusid | 2-s2.0-84983409484 | - |
dc.citation.endPage | 1835 | - |
dc.citation.startPage | 1831 | - |
dc.citation.title | IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS | - |
dc.type.docType | Proceedings Paper | - |
dc.subject.keywordAuthor | big data | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | Hadoop | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | hash chain | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.