Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Study on Hash Chain-based Hadoop Security Scheme

Full metadata record
DC Field Value Language
dc.contributor.authorJung, Young-Ae-
dc.contributor.authorWoo, Si-Jae-
dc.contributor.authorYeo, Sang-Soo-
dc.date.accessioned2023-03-08T19:39:11Z-
dc.date.available2023-03-08T19:39:11Z-
dc.date.issued2015-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64680-
dc.description.abstractHadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation. Many research articles have studied its vulnerabilities and some of them proposed their own security schemes. This paper introduces PK scheme, one of Hadoop security schemes, and presents its well designed security protocol and also its performance problem. PK scheme is based on one-time token method, and pretty strong to prevent vulnerability of the block access token which acts as a proof of user's access right on data blocks. This paper introduces a novel approach making up its performance problem, and proposes efficient security scheme which is based on hash chain method.-
dc.format.extent5-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-
dc.titleA Study on Hash Chain-based Hadoop Security Scheme-
dc.typeArticle-
dc.identifier.doi10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.332-
dc.identifier.bibliographicCitationIEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, pp 1831 - 1835-
dc.description.isOpenAccessN-
dc.identifier.wosid000411670500310-
dc.identifier.scopusid2-s2.0-84983409484-
dc.citation.endPage1835-
dc.citation.startPage1831-
dc.citation.titleIEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS-
dc.type.docTypeProceedings Paper-
dc.subject.keywordAuthorbig data-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorHadoop-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorhash chain-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Business & Economics > Department of Industrial Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE