The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Recently, as the installation and deletion of not only the Internet but also applications have become easy without any time or place constraints through 3G networks as well as other diverse interfaces such as Wi-Fi and Wibro, the amounts of data are increasing and the kinds of data are being diversified. However, socially large repercussions are arising because methods of protecting user data are insufficient. In the present paper, a security scheme is proposed that will link big data to attribution information to enable users to be provided with big data services from different networks in real time. The proposed scheme inserts attribution information at the beginning and end of contents for provision of big data contents services in real time so that both authentication and non-repudiation can be provided for the contents even if one of the two signatures is lost. In addition, the proposed scheme enhanced the security of contents data by transferring hash chain values to prevent attribution information from being unnecessarily exposed to any 3rd party.

Keywords

Big Data, Data Security, Hash Chain, Multiple Attribute
User