Abstract
At present some developed countries have put forward their digital continuity action plans. And the digital continuity has also become a hot spot in the research of electronic records. However, the technology and measures for the protection of the digital continuity are still lack.
In this paper, we first point out the necessity of ensuring the availability and completeness of the electronic record. Moreover, the technology framework of availability and completeness for electronic record are firstly proposed. Secondly, we make use of the coding theory to ensure the availability of electronic record. In addition, the technology of ensuring completeness for electronic record is constructed based on functional dependency theory, and the method of evaluating completeness of electronic record is present using the functional dependency theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
UK National Archives: Digital continuity marketing brochure: if you don’t protect your digital assets, they can’t protect you. Accessed 25 Feb 2018. http://www.Nationalarchives.gov.uk/documents/tna-digital-continuity.pdf. Hong, K.D., Son, Y..: A Study on the Smart Virtual Machine for Executing Virtual Machine Codes on Smart Platforms, pp. 93–106. Oxford University Press, Oxford (2015)
Gray, J.: What next? A few remaining problems in information technology, Manhattan (1999)
Hasan, R., Yurcik, W., Myagmar, S.: The evolution of storage service providers: techniques and challenges to outsourcing storage, ACM SSS 2005, pp. 1–8 (2005)
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
Zhangjie, F., Xinle, W., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Zhangjie, F., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)
Gargn, N., Bawa, S.: Comparative analysis of cloud data integrity auditing protocols. J. Netw. Comput. Appl. 66, 17–32 (2016)
Zhangjie, F., Xinle, W., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986–2997 (2017)
Ding, X., Wang, H., Zhang, X., Li, J., Gao, H.: Association relationships study of multi-dimensional data quality. J. Softw. 27(7), 1626–1644 (2016)
Acknowledgments
This work is supported by the NSFC (NO. 61772280, 61702236), Jiangsu Province Natural Science Research Program (NO. BK20130809, BK2012461) and the PAPD fund from NUIST.
This work is funded by Natural Science Foundation of Jiangsu Province under Grant BK20160955, a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Science Research Foundation of Nanjing University of Information Science and Technology under Grant20110430.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, J., Zhang, J., Ren, Y., Kim, HJ. (2018). Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11063. Springer, Cham. https://doi.org/10.1007/978-3-030-00006-6_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-00006-6_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00005-9
Online ISBN: 978-3-030-00006-6
eBook Packages: Computer ScienceComputer Science (R0)