Skip to main content

2023 | OriginalPaper | Buchkapitel

Research on Data Watermark Tracing System in Hadoop Environment

verfasst von : Wenyu Qiao, Jiexi Wang

Erschienen in: Big Data and Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The application of big data requires effective tracing of data transmission and flow processes, so as to achieve effective determination of data authenticity and security. If network data is not effectively supervised, unexpected events such as data loss, leakage or tampering will occur, resulting in network data threats and risks that cannot be traced and responded to. The traditional data tracing methods are found difficult to meet the processing needs of massive data. Hence, data tracing in Hadoop environment is considered to better deal with the risk of data loss, tampering and leakage in the process of multiple data distribution. In this paper, the Hadoop environment system and its application in the field of data watermark tracing is explored. By analyzing the data tracing model and its implementation, a data watermark tracing system in Hadoop environment is established and the tracing process is examined. The experiments are designed and the efficiency of the proposed system is validated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, L., Zhou, G., Wang, L., Peng, Z.: Attribute level lineage and probabilistic computation of uncertain data. J. Softw. 25(04), 863–879 (2014)CrossRefMATH Wang, L., Zhou, G., Wang, L., Peng, Z.: Attribute level lineage and probabilistic computation of uncertain data. J. Softw. 25(04), 863–879 (2014)CrossRefMATH
3.
Zurück zum Zitat Hondo, F., et al.: Data provenance management for bioinformatics workflows using NoSQL database systems in a cloud computing environment. In: 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 1929–1934 (2017) Hondo, F., et al.: Data provenance management for bioinformatics workflows using NoSQL database systems in a cloud computing environment. In: 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 1929–1934 (2017)
4.
Zurück zum Zitat Gort, M.L.P., Olliaro, M., Cortesi, A.: Reducing multiple occurrences of meta-mark selection in relational data watermarking. IEEE Access 10, 62210–62231 (2022)CrossRef Gort, M.L.P., Olliaro, M., Cortesi, A.: Reducing multiple occurrences of meta-mark selection in relational data watermarking. IEEE Access 10, 62210–62231 (2022)CrossRef
5.
Zurück zum Zitat Chen, L., Shi, C., Yu, P., Shen, W., Gao, X., Yang, R.: Research and application of digital watermark tracing technology in data security protection of power grid. In: 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), pp. 530–533 (2020) Chen, L., Shi, C., Yu, P., Shen, W., Gao, X., Yang, R.: Research and application of digital watermark tracing technology in data security protection of power grid. In: 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI), pp. 530–533 (2020)
6.
Zurück zum Zitat Li, D., Li, Y., Yuan, C., Chen, H., Zhang, L.: Research on private cloud platform of seed tracing based on Hadoop parallel computing. In: 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), pp. 134–137 (2015) Li, D., Li, Y., Yuan, C., Chen, H., Zhang, L.: Research on private cloud platform of seed tracing based on Hadoop parallel computing. In: 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), pp. 134–137 (2015)
7.
Zurück zum Zitat Shen, X., Zhang, Y., Wang, T., Sun, Y.: Relational Database watermarking for data tracing. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 224–231 (2020) Shen, X., Zhang, Y., Wang, T., Sun, Y.: Relational Database watermarking for data tracing. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 224–231 (2020)
8.
Zurück zum Zitat Darwish, S.M., Selim, H.A., Elsherbiny, M.M.: Distortion free database watermarking system based on intelligent mechanism for content integrity and ownership control. J. Comput. 13(9), 1053–1066 (2018)CrossRef Darwish, S.M., Selim, H.A., Elsherbiny, M.M.: Distortion free database watermarking system based on intelligent mechanism for content integrity and ownership control. J. Comput. 13(9), 1053–1066 (2018)CrossRef
9.
Zurück zum Zitat Dwivedi, A.K., Sharma, B.K., Vyas, A.K.: Watermarking techniques for ownership protection of relational databases. Int. J. Emerg. Technol. Adv. Eng. 4(1), 368–375 (2014) Dwivedi, A.K., Sharma, B.K., Vyas, A.K.: Watermarking techniques for ownership protection of relational databases. Int. J. Emerg. Technol. Adv. Eng. 4(1), 368–375 (2014)
10.
Zurück zum Zitat Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus protocols for blockchain-based data provenance: challenges and opportunities. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 469–474 (2017) Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus protocols for blockchain-based data provenance: challenges and opportunities. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 469–474 (2017)
11.
Zurück zum Zitat Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468–477 (2017) Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468–477 (2017)
12.
Zurück zum Zitat Siledar, S., Tamane, S.: A distortion-free watermarking approach for verifying integrity of relational databases. In: 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), pp. 192–195 (2020) Siledar, S., Tamane, S.: A distortion-free watermarking approach for verifying integrity of relational databases. In: 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), pp. 192–195 (2020)
13.
Zurück zum Zitat Kamal, M., Tariq, S.: Light-weight security and data provenance for multi-hop internet of things. IEEE Access 6, 34439–34448 (2018)CrossRef Kamal, M., Tariq, S.: Light-weight security and data provenance for multi-hop internet of things. IEEE Access 6, 34439–34448 (2018)CrossRef
14.
Zurück zum Zitat Elkhodr, M., Alsinglawi, B., Alshehri, M.: Data provenance in the internet of things. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 727–731 (2018) Elkhodr, M., Alsinglawi, B., Alshehri, M.: Data provenance in the internet of things. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 727–731 (2018)
15.
Zurück zum Zitat Goyal, M., Anuranjana: Demonetization-Twitter data analysis using big data & Hadoop. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 156–158 (2019) Goyal, M., Anuranjana: Demonetization-Twitter data analysis using big data & Hadoop. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 156–158 (2019)
Metadaten
Titel
Research on Data Watermark Tracing System in Hadoop Environment
verfasst von
Wenyu Qiao
Jiexi Wang
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3300-6_7

Premium Partner