Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.10.271

An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain  

Jeong, Yoon-Su (Dept. of Information and Communication Convergence engineering, Mokwon University)
Kim, Yong-Tae (Dept. of Multimedia Engineering, Hannam, University)
Park, Gil-Cheol (Dept. of Multimedia Engineering, Hannam, University)
Publication Information
Journal of Digital Convergence / v.13, no.10, 2015 , pp. 271-278 More about this Journal
Abstract
Recently, bit data is difficult to easily collect the desired data because big data is collected via the Internet. Big data is higher than the rate at which the data type and the period of time for which data is collected depending on the size of data increases. In particular, since the data of all different by the intended use and the type of data processing accuracy and computational cost is one of the important items. In this paper, we propose data processing method using a dual-chain in a manner to minimize the computational cost of the data when data is correctly extracted at the same time a multi-layered process through the desired number of the user and different kinds of data on the Internet. The proposed scheme is classified into a hierarchical data in accordance with the intended use and method to extract various kinds of data. At this time, multi-processing and tie the data hash with the double chain to enhance the accuracy of the reading. In addition, the proposed method is to organize the data in the hash chain for easy access to the hierarchically classified data and reduced the cost of processing the data. Experimental results, the proposed method is the accuracy of the data on average 7.8% higher than conventional techniques, processing costs were reduced by 4.9% of the data.
Keywords
Big Data; Data Management; Double Hash Chain; Hierarchical Multi-processing; Data Accuracy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Hu, Y. Wen, T. S. Chua, X. Li, "Toward Scalable Systems for Big Data Anaqlytics: A Technology Tutorial", IEEE Access, vol. 2, pp. 652-687, 2014.   DOI   ScienceOn
2 P. Russom, "Big Data Analytics", TDWI Research Fourth Quarter, pp. 6, Dec. 2011.
3 V. Gadepally, J. Kepner. "Big data dimensional analysis", 2014 IEEE High Performance Extreme Computing Conference(HPEC) pp. 1-6, Sep. 2014.
4 Y. Demchenko, C. De Laat, P. Membrey, "Defining architecture components of the Big data Ecosystem", 2014 International conference on Collaboration Technologies and Systems(CTS), pp.104-112, May, 2014.
5 J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, A. H. Byers, "Big Data: The Next Frontier for Innovation, Competition and Productivity", Mckinsey Global Institute, pp. 1-137. 2011.
6 P. Shen, Y. Zhou, K. Chen, "A Probability based Subnet Selection Method for Hot Event Detection in Sina Weibo Microblogging", 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1410-1413, Aug. 2013.
7 K. Chen, Y. Zhou, H. Zha, J. He, P. Shen, X. Yang, "Cost-Effective Node Monitoring for Online Hot Event Detection in Sina Weibo", In Proceedings of the 22nd international conference on World Wide Web, ACM. pp. 107-108, April. 2013.
8 D. Kempe, J. Klenberg, E. Tardos, "Maximizing the spread of influence through a social netowrk", In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137-146, Aug. 2003.
9 K. M. P. Shrivastba, M. A. Rizvi, S. Singh, "Big Data Privacy Based on Differential Privacy a Hope for Big Data", 2014 International conference on Computational Intelligence and Communication Networks, pp. 776-781. Nov. 2014.
10 A. Katal, M. Wazid, R. H. Goudar, "Big data: Issues, challenges, tools and Good practices ", 2013 Sixth International Conference on Contemporary Computing(IC3), pp. 404-409, Aug. 2013.
11 Y. C. Jung. "Big Data revolution and media policy issues", KISDI Premium Report, Vol. 12, No. 2, pp. 1-22, 2012.
12 S. H. Kim, N. U. Kim, t. M. Chung, "Attribute Relationship Evaluation Methodology for Big Data Seucrity", 2013 International Conference on IT Convergence and Security(ICITCS), pp. 1-4, Dec. 2013.
13 S. Y. Son, "Big data, online marketing and privacy protection", KISDI Premium Report, Vol. 13, No. 1, pp.1-26, 2013.
14 J. T. Kim, B. J. Oh, J. Y. Park, "Standard Trends for the BigData Technologies", 2013 Electronics and Telecommunications Trends, Vol. 28, No. 1, pp. 92-99, 2013.
15 Laurent, E. and V.D. Gligor, "A key-management scheme for distributed sensor networks". Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, pp. 41-47, Nov. 2002.
16 M. Paryasto, A. Alamsyah, B. Rahardjo, Kuspriyanto, "Big-data security management issues", 2014 2nd International Conference on Information and Communication Technology(ICoICT), pp. 59-63, May, 2014.