ABSTRACT
The major premise of big data circulation is to identify the ownership of data resource. This paper summed some feasible techniques and methods for confirming big data property which are data citation technology, data provenance technology, data reversible hiding technology, computer forensic technology and block chain technology. The ownership of information property which from different sizes, different formats and different storage condition on distributed heterogeneous platforms can be confirmed by comprehensive application of these techniques and methods based on the coupling interface between them in the practice of big data.
- White, H. 1982. Citation analysis of data files use {J}.Library Trends. 31 (3), 467--477.Google Scholar
- Jim, G. One Science---A transformed scientific method{C}/ / Tony H, Stewart T, Kirstin T. 2009.The Fourth Paradigm: Data-intensive Scientific Discovery. Redmond, WA: Microsoft Research. 19--33.Google Scholar
- Altman, M. and King, G. 2007. A proposed standard for the scholarly citation of quantitative data {J/OL}. D-Lib Magazine. 13 (3 /4). {2017-02-08} http://www.dlib.org/dlib/march07/altman/03altman.html.Google Scholar
- Green, T. 2017. We need publishing standards for datasets and data tables. OECD Publishing White Paper {EB/OL}. http://www.ingentaconnect.com/content/alpsp/lp/2009/00000022/00000004/art00011?Google ScholarCross Ref
- Li Dandan and Wu Zhenxin. 2013. Research on research data citation {J}.Library Journal. (5), 65--71.Google Scholar
- Altman, M. 2008. A Fingerprint Method for Scientific Data Verification //Advances in Computer and Information Sciences and Engineering. 311--316.Google Scholar
- Qu Baoqiang and Wang Kai. 2015. Emergence and development of the data paper {J}.Library & Information. (5), 1--8.Google Scholar
- Hey, T. 2012. The Fourth Paradigm: Data-Intensive Scientific Discovery {M}// E-Science and Information Management. Springer Berlin Heidelberg, 1.Google Scholar
- Wang Weihua, Hu Lianglin and Shen Zhihong. 2013. Development of scientific data reference specification {J}. China Science & Technology Resources Review. (1), 36--40.Google Scholar
- Hou Jinghuan, Fang Jingyi. 2013. Review on data citation in the context of big data {J}. Journal of Library Science in China. (1), 112--118.Google Scholar
- Wang Cuiping, Li Baiyang. 2015. Research on data--intensive sciences--oriented data citation analysis {J}. Information and Documentation Services. (3), 10--14.Google Scholar
- Mayernik, M. 2013. Bridging Data Lifecycles: Tracking Data Use via Data Citations Workshop Report{R/OL}. http://nldr.library.ucar.edu/repository/assets/technotes/TECH-NOTE-000-000-000-860.Google Scholar
- Dai Chaofan, Wang Tao, Zhang Pengcheng. 2010. Survey of data provenance technique {J}. Application research of computers. 27 (9), 3216--3221.Google Scholar
- Simmhan, Y. L., Plale B. and Gannon D. 2005. A survey of data provenance in e-science {J}. Acm Sigmod Record. 34 (3), 31--36. Google ScholarDigital Library
- Chiticariu L, Tan W C and Vijayvargiya G. 2005. DB Notes: a post-it system for relational databases based on provenance{C}// ACM SIGMOD International Conference on Management of Data. Baltimore, Maryland, USA, June. DBLP, 942--944. Google ScholarDigital Library
- Zhao Y, Wilde M and Foster I. 2006. Applying the Virtual Data Provenance Model {J}. Lecture notes Computer. Sci. 4145, 148--161. Google ScholarDigital Library
- Li Yazi. 2007. Data provenance's annotation schema and description model {J}. New Technology of Library and Information Service. (7), 10--13.Google Scholar
- Bose R. 2002. A conceptual framework for composing and managing scientific data lineage{C}// International Conference on Scientific and Statistical Database Management. DBLP, 15--19. Google ScholarDigital Library
- Deng Zhonghua and Wei Yinzhen. 2014. Study on the method of provenance in science workflow for data publishing {J}. Library & Information. (3), 61--66.Google Scholar
- Wang Y R. and Madnick S E. 1990. A polygon model for heterogeneous database systems: the source tagging perspective{C}// Proceedings of International Conference on Very Large Data Bases. Brisbane, Queensland, Australia, DBLP, 519--538. Google ScholarDigital Library
- Fan H. 2002. Tracing Data Lineage Using Automated Schema Transformation Pathways {M}// Advances in Databases. Springer Berlin Heidelberg, 50--53. Google ScholarDigital Library
- Buneman P, Khanna S. and Tan W C. 2004. Why and Where: A Characterization of Data Provenance{C}// International Conference on Database Theory. Springer-Verlag. 316--330. Google ScholarDigital Library
- Green T J, Karvounarakis G, and Tannen V. 2007. Provenance semi-rings {J}. Pods'07 Bejing. 72 (3), 289--292. Google ScholarDigital Library
- Ram S. and Liu J. 2009. A New Perspective on Semantics of Data Provenance{C}// International Workshop on the Role of Semantic Web in Provenance Management. DBLP. Google ScholarDigital Library
- Freire J. and Anand M K. 2007. Provenance in scientific workflow systems {J}. Bulletin of the Technical Committee on Data Engineering. 30 (4), 44--50.Google Scholar
- Golbeck J. and Hendler J. 2008. A Semantic Web approach to the provenance challenge {J}. Concurrency & Computation Practice & Experience. 20 (5), 431--439. Google ScholarDigital Library
- Wei Yinzhen and Deng Zhonghua. 2015. A provenance framework for scientific workflow {J}. Information Studies: Theory & Application. (7), 115--118, 114.Google Scholar
- Hey T., Tansley S. and Tolle K. 2009. The fourth paradigm {M}. Microsoft Press. 17--18.Google Scholar
- Cui Y. and Widom J. 2003. Lineage tracing for general data warehouse transformations {J}. The VLDB Journal. 12 (1), 41--58. Google ScholarDigital Library
- Chen Ying. 2008. A Data Provenance Model Based on the Double - helical Structure of DNA. {J} New Technology of Library and Information Service. (10), 11--15.Google Scholar
- Moreau L. and Groth P. 2013. PROV-Overview: An overview of the PROV family of documents {J}. PW3C Note. (4), 1--9.Google Scholar
- CCSDS Secretariat, Program Integration Division (Code M-), National Aeronautics and Space Administration. Reference Model for an Open Archival Information System (OAIS){M}. Washington DC, USA. CCSDS. Secretariat. 2002.Google Scholar
- Lin Fangfang and Zhao Hui. 2016. Research on data traceability model and DC meta data mapping {J}. Digital Library Forum. (3), 10--16.Google Scholar
- Ke Jie, Dong Hanbin, Liang Yiwen, Tan Chengyu and Ai Yong. 2015. APROV based representation of data provenance for ETL process {J}. Journal of SiChuan University, (5), 123--129.Google Scholar
- Freitas A, Kampgen B, Oliveira J G, et al. 2012. Representing Interoperable Provenance Descriptions for ETL Workflows{M}. // The Semantic Web: ESWC 2012 Satellite Events. Berlin: Springer, 43--57.Google Scholar
- Petitcolas F A P, Anderson R J. and Kuhn M G. 1999. Information hiding-a survey {J}. Proceedings of the IEEE. 87 (7), 1062--1078.Google ScholarCross Ref
- Katzenbeisser S. and Petitcolas F A. 2000. Information Hiding Techniques for Steganography and Digital Watermarking {J}. Edpacs the Edp Audit Control & Security Newsletter. 28 (6), 95--172.Google Scholar
- Artz D. 2001. Digital steganography: hiding data within data {J}. Internet Computing IEEE. 5 (3), 75--80. Google ScholarDigital Library
- Fridrich J., Goljan M. and Du R. 2001. Invertible authentication {C}∥Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, USA. 197--208.Google Scholar
- Celik M U., Sharma G. and Tekalp A M., et al. 2005. Lossless generalized-LSB data embedding {J}. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society. 14 (2), 253--66. Google ScholarDigital Library
- Agrawal R. and Kiernan J. 2002. Watermarking Relational Database {J}. Journal of Pla University of Science & Technology. 3 (1), 71--79.Google Scholar
- Fu Y, Jin C. and Ma C. 2007. A Novel Relational Database Watermarking Algorithm{M}// Intelligence and Security Informatics. Springer Berlin Heidelberg. Google ScholarDigital Library
- Sion A P. 2011. Watermarking Relational Databases {J}. Proceedings of SPIE - The International Society for Optical Engineering. 8349 (1), 79.Google Scholar
- Zhang Yong, Zhao Dongning and Li Deyi. 2003. Digital watermarking for relational databases {J} Computer Engineering and Applications. (25), 193--195.Google Scholar
- Yu Zhiqiang. 2008. Watermarking techniques for multimedia authentication and copyright protection {D}.Xi'an: Northwestern Polytechnical University.Google Scholar
- He Jianbang, Lue Guonian and Wu Pingsheng. 2010. Study on property right protection of geographic information {M}. Beijing: Science Press. 337--418.Google Scholar
- Jiang Bin. Research on text carrier information hiding and related technology.{D}. Zhengzhou: PLA information engineering university,2008.Google Scholar
- Scheindlin S A. and Rabkin J. 2000. Electronic Discovery in Federal Civil Litigation: Is Rule 34 Up to the Task? {J}. Boston College Law Review. 41 (2), 327--382.Google Scholar
- Kruse Ii W G. and Heiser J G. 2001. Computer forensics: incident response essentials {M}. Addison Wesley Pub Co Inc.Google Scholar
- Zhang Chao. 2010. Under cloud calculative environment electronic data investigation and evidence collection {J}. Netinfo Security. (11), 52--54.Google Scholar
- Wu Shaobing. 2012. Research of key technologies of electronic evidence forensics based on cloud computing environment. {J}. Computer Science. (11), 139--142.Google Scholar
- Jin Bo, Yang Tao, Wu Songyang, Huang Daoli and Guo Hong. 2016. Review of digital forensics {J}.Chinese Journal of Forensic Sciences. (1), 62--74.Google Scholar
- Guo Hong and Xu ZhiQiang. 2016. Status and trends of electronic data forensics equipment and software {J}.Secrecy Science and Technology. (3), 28--34.Google Scholar
- Shao Zehui. 2014. The method of tracing data based on trusted digital forensics {D}. Nanjing: Nanjing University of Posts and Telecommunications,Google Scholar
- Satoshi Nakamoto. 2017. Bitcoin: A Peer-to-Peer Electronic Cash System. {EB/OL}. https://bitcoin.org/bitcoin.pdfGoogle Scholar
- Swan M. 2015. Blockchain: Blueprint for a New Economy {M}. USA: O'Reilly Media, Inc. Google ScholarDigital Library
- Yuan Yong and Wang Feiyue. 2016. Blockchain: The state of the art and future trends {J}. Acta Automatica Sinica, (4), 481--494.Google Scholar
- Shen Xin, Pei Qingqi and Liu Xuefeng. 2016. Survey of block chain {J}. Chinese journal of network and information security. (11), 11--20.Google Scholar
- Zhao He, Li Xiaofeng, Zhan Likui and Wu Zhongcheng. 2015. Data integrity protection method for microorganism sampling robots based on blockchain technology {J}. Huangzhong University of Sci and Tech, (Z1), 216--219.Google Scholar
- Huang Yonggang. 2016. Block chain technology-based security of electronic health records {J}. Chinese Journal of Medical Library and Information Science. (10), 38--40.Google Scholar
- Liu Nan, Wei Jinwu and Liu Lu. 2016. Big data exchange based on information chain {J}. Telecommunications Science. (10), 130--13.Google Scholar
Index Terms
- An Overview of Techniques for Confirming Big Data Property Rights
Recommendations
Big data analytics in Cloud computing: an overview
AbstractBig Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable ...
A Brief Survey on Big Data in Healthcare
This article presents a brief introduction to big data and big data analytics and also their roles in the healthcare system. A definite range of scientific researches about big data analytics in the healthcare system have been reviewed. The definition ...
Comments