Intelligent Data Management and Security in Cloud Computing

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing....

Full description

Bibliographic Details
Main Authors: Lidia Ogiela, Marek R. Ogiela, Hoon Ko
Format: Article
Language:English
Published: MDPI AG 2020-06-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/12/3458
_version_ 1797564834435301376
author Lidia Ogiela
Marek R. Ogiela
Hoon Ko
author_facet Lidia Ogiela
Marek R. Ogiela
Hoon Ko
author_sort Lidia Ogiela
collection DOAJ
description This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.
first_indexed 2024-03-10T19:03:32Z
format Article
id doaj.art-c37a2993f731493d905a268c4671b4c0
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T19:03:32Z
publishDate 2020-06-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-c37a2993f731493d905a268c4671b4c02023-11-20T04:17:57ZengMDPI AGSensors1424-82202020-06-012012345810.3390/s20123458Intelligent Data Management and Security in Cloud ComputingLidia Ogiela0Marek R. Ogiela1Hoon Ko2Department of Cryptography and Cognitive Informatics, Pedagogical University of Krakow, 30-084 Kraków, PolandCryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, 30-059 Kraków, PolandIT Research Institute, Chosun University, Gwangju 61452, KoreaThis paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.https://www.mdpi.com/1424-8220/20/12/3458cryptographic sharing algorithmsdata securityservice management processes
spellingShingle Lidia Ogiela
Marek R. Ogiela
Hoon Ko
Intelligent Data Management and Security in Cloud Computing
Sensors
cryptographic sharing algorithms
data security
service management processes
title Intelligent Data Management and Security in Cloud Computing
title_full Intelligent Data Management and Security in Cloud Computing
title_fullStr Intelligent Data Management and Security in Cloud Computing
title_full_unstemmed Intelligent Data Management and Security in Cloud Computing
title_short Intelligent Data Management and Security in Cloud Computing
title_sort intelligent data management and security in cloud computing
topic cryptographic sharing algorithms
data security
service management processes
url https://www.mdpi.com/1424-8220/20/12/3458
work_keys_str_mv AT lidiaogiela intelligentdatamanagementandsecurityincloudcomputing
AT marekrogiela intelligentdatamanagementandsecurityincloudcomputing
AT hoonko intelligentdatamanagementandsecurityincloudcomputing