• Title/Summary/Keyword: hash tree

Search Result 81, Processing Time 0.026 seconds

PPMMLG : A Phantom Protection Method based on Multi-Level Grid Technique for Multi-dimensional Index Structures (PPMMLG :다차원 색인구조를 위한 다중 레벨 그리드 방식의 유령현상 방지 기법)

  • Lee, Seok-Jae;Song, Seok-Il;Yoo, Jae-Soo
    • Journal of KIISE:Databases
    • /
    • v.32 no.3
    • /
    • pp.304-314
    • /
    • 2005
  • In this paper, we propose a new phantom protection method for multi-dimensional index structures that uses multi-level grid technique. The proposed mechanism is independent of the types of multi-dimensional index structures, i.e., it can be applied to all types of index structures such as tree-based, file-based and hash-based index structures. Also, it achieves low development cost and high concurrency with low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

Design and Performance Evaluation of an Efficient Index Mechanism for Real-Time MMDBMS (실시간 MMDBMS 를 위한 효율적인 색인 기법의 설계 및 성능평가)

  • Min, Young-Soo;Shin, Jae-Ryong;Yoo, Jae-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.61-64
    • /
    • 2001
  • 본 논문에서는 실시간 MMDBMS 를 위한 효율적인 색인 기법을 제안한다. 기존의 주기억장치 트리 기반 색인 구조는 범위 검색을 효과적으로 지원할 수 있지만 한 노드에 대한 접근시간과 평균 접근시간의 차이가 클 수 있기 때문에 실시간 특성을 보장하지 못하는 단점이 있다. 또한 해시 기반 색인 구조는 간단한 검색에서 접근 시간이 매우 빠르고 일정하지만 범위 검색을 지원하지 못하는 단점이 있다. 이러한 두 색인 구조의 단점을 해결하기 위해 본 논문에서는 동적 확장이 가능하며 검색 시간이 빠르고 실시간 특성을 지원할 수 있는 ECBH(Extendible Chained Bucket Hashing)와 범위 검색에 더욱 효과적인 $T^{\ast}$-트리를 상호보완적으로 결합하여 Hyper-TH(Hyper Tree-Hash)라는 실시간 MMDBMS 에 적합한 새로운 색인 기법을 제안하고 구현한다. 그리고 성능 평가를 통해 제안하는 색인 기법의 우수성을 증명한다.

  • PDF

Dynamic Group Key Management Using Bottom-up Hash Tree (상향식 해시 트리를 이용한 동적 그룹 키 관리 기법)

  • Kang, Yong-goo;Oh, Hee-kuck;Kim, Sang-jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.792-795
    • /
    • 2010
  • 사용자 그룹 서비스는 IPTV를 비롯한 다양한 분야에 걸쳐 응용되고 있으며, 안전한 그룹 통신을 위해 그룹 키를 사용한다. 그룹 키 관리를 보다 효율적으로 하기 위해 최근 많은 연구에서 트리를 이용한 기법을 제시하였다. 트리의 루트 노드로부터 하향식 방식으로 노드 값을 구성하고, 특히 이진트리를 이용하여 그룹 멤버의 가입과 탈퇴에 따라 그룹 키를 갱신하는데 소요되는 비용을 줄였다. 대부분의 연구에서 그룹 키를 갱신하는데 필요한 메시지 전송량이 lg(N) 수준이다. 본 논문에서는 단말 노드로부터 루트 노드 방향으로 노드 값을 구성한 상향식 해시 트리를 기반으로 그룹 키를 갱신하는데 필요한 메시지 전송량이 lg(1) 수준인 기법을 제안한다. 이 기법은 가입 또는 탈퇴가 발생했을 때 즉시 키를 갱신하여 동적이고, 기존의 기법들에 비해 서비스 제공자와 네트워크 대역폭의 부담이 감소하여 효율적이다.

A Comparison of Performance between STMP/MST and Existing Spatio-Temporal Moving Pattern Mining Methods (STMP/MST와 기존의 시공간 이동 패턴 탐사 기법들과의 성능 비교)

  • Lee, Yon-Sik;Kim, Eun-A
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.49-63
    • /
    • 2009
  • The performance of spatio-temporal moving pattern mining depends on how to analyze and process the huge set of spatio-temporal data due to the nature of it. The several method was presented in order to solve the problems in which existing spatio-temporal moving pattern mining methods[1-10] have, such as increasing execution time and required memory size during the pattern mining, but they did not solve properly yet. Thus, we proposed the STMP/MST method[11] as a preceding research in order to extract effectively sequential and/or periodical frequent occurrence moving patterns from the huge set of spatio-temporal moving data. The proposed method reduces patterns mining execution time, using the moving sequence tree based on hash tree. And also, to minimize the required memory space, it generalizes detailed historical data including spatio-temporal attributes into the real world scopes of space and time by using spatio-temporal concept hierarchy. In this paper, in order to verify the effectiveness of the STMP/MST method, we compared and analyzed performance with existing spatio-temporal moving pattern mining methods based on the quantity of mining data and minimum support factor.

  • PDF

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • Park, Dou-Joon;Min, Hye-Lan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1080-1083
    • /
    • 2005
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, in case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF

Cloud Assisted P2P Live Video Streaming over DHT Overlay Network (DHT 오버레이 네트워크에서 클라우드 보조의 P2P 라이브 비디오 스트리밍)

  • Lim, Pheng-Un;Choi, Chang-Yeol;Choi, Hwang-Kyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.89-99
    • /
    • 2017
  • Many works have attempted to solve the scalability, the availability, and the low-latency problems of peer-to-peer (P2P) live video streaming; yet, the problems still remain. While tree-based systems are vulnerable to churn, the mesh-based systems suffer from high delay and overhead. The DHT-aided chunk-driven overlay (DCO) [1] tried to tackle these problems by using the distributed hash table (DHT), which structures into a mesh-based overlay to efficiently share the video segment. However, DCO fully depends on the capacity of the users' device which is small and unstable, i.e., the users' device may leave and join the network anytime, and the video server's bandwidth can be insufficient when the number of users joining the network suddenly increases. Therefore, cloud assist is introduced to overcome those problems. Cloud assist can be used to enhance the availability, the low-latency, and the scalability of the system. In this paper, the DHT is used to maintain the location of the streaming segments in a distributed manner, and the cloud server is used to assist other peers when the bandwidth which required for sharing the video segment is insufficient. The simulation results show that by using the threshold and cloud assist, the availability and the low-latency of the video segments, and the scalability of the network are greatly improved.

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P.;Bose, S.;Kannan, A.;Jegatha Deborah, L.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.878-894
    • /
    • 2013
  • Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

Efficient Algorithms for Mining Association Rules Under the Interactive Environments (대화형 환경에서 효율적인 연관 규칙 알고리즘)

  • Lee, Jae-Moon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.339-346
    • /
    • 2001
  • A problem for mining association rules under the interactive environments is to mine repeatedly association rules with the different minimum support. This problem includes all subproblems except on the facts that mine repeatedly association rules with the s믇 database. This paper proposed the efficient algorithms to improve the performance by using the information of the candidate large itemsets which calculate the previous association rules. The proposed algorithms were compared with the conventional algorithm with respect to the execution time. The comparisons show that the proposed algorithms achieve 10∼30% more gain than the conventional algorithm.

  • PDF

An Efficient Phantom Protection Method for Concurrency Control in Multi-dimensional Index Structures (다차원 색인구조에서 동시성제어를 위한 효율적인 유령 방지 기법)

  • Yun Jong-Hyun;Song Seok-Il;Yoo Jae-Soo;Lee Seok-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.157-167
    • /
    • 2005
  • In this paper, we propose a new phantom protection method for multi-dimensional index structures. The proposed method uses a hybrid approach of predicate locking and granular locking mechanisms. The proposed mechanism is independent of the types of multi-dimensional index structures, i.e., it can be applied to all types of index structures such as tree-based, file-based and hash-based index structures. Also, it achieves low development cost and high concurrency with low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

  • PDF

Phantom Protection Method for Multi-dimensional Index Structures

  • Lee, Seok-Jae;Song, Seok-Il;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • v.3 no.2
    • /
    • pp.6-17
    • /
    • 2007
  • Emerging modem database applications require multi-dimensional index structures to provide high performance for data retrieval. In order for a multi-dimensional index structure to be integrated into a commercial database system, efficient techniques that provide transactional access to data through this index structure are necessary. The techniques must support all degrees of isolation offered by the database system. Especially degree 3 isolation, called "no phantom read," protects search ranges from concurrent insertions and the rollbacks of deletions. In this paper, we propose a new phantom protection method for multi-dimensional index structures that uses a multi-level grid technique. The proposed mechanism is independent of the type of the multi-dimensional index structure, i.e., it can be applied to all types of index structures such as tree-based, file-based, and hash-based index structures. In addition, it has a low development cost and achieves high concurrency with a low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.