Cargando…

Intelligent Data Management and Security in Cloud Computing

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing....

Descripción completa

Detalles Bibliográficos
Autores principales: Ogiela, Lidia, Ogiela, Marek R., Ko, Hoon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349833/
https://www.ncbi.nlm.nih.gov/pubmed/32570956
http://dx.doi.org/10.3390/s20123458
_version_ 1783557146260013056
author Ogiela, Lidia
Ogiela, Marek R.
Ko, Hoon
author_facet Ogiela, Lidia
Ogiela, Marek R.
Ko, Hoon
author_sort Ogiela, Lidia
collection PubMed
description This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.
format Online
Article
Text
id pubmed-7349833
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73498332020-07-15 Intelligent Data Management and Security in Cloud Computing Ogiela, Lidia Ogiela, Marek R. Ko, Hoon Sensors (Basel) Article This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network. MDPI 2020-06-18 /pmc/articles/PMC7349833/ /pubmed/32570956 http://dx.doi.org/10.3390/s20123458 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ogiela, Lidia
Ogiela, Marek R.
Ko, Hoon
Intelligent Data Management and Security in Cloud Computing
title Intelligent Data Management and Security in Cloud Computing
title_full Intelligent Data Management and Security in Cloud Computing
title_fullStr Intelligent Data Management and Security in Cloud Computing
title_full_unstemmed Intelligent Data Management and Security in Cloud Computing
title_short Intelligent Data Management and Security in Cloud Computing
title_sort intelligent data management and security in cloud computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349833/
https://www.ncbi.nlm.nih.gov/pubmed/32570956
http://dx.doi.org/10.3390/s20123458
work_keys_str_mv AT ogielalidia intelligentdatamanagementandsecurityincloudcomputing
AT ogielamarekr intelligentdatamanagementandsecurityincloudcomputing
AT kohoon intelligentdatamanagementandsecurityincloudcomputing