Literature DB >> 32570956

Intelligent Data Management and Security in Cloud Computing.

Lidia Ogiela1, Marek R Ogiela2, Hoon Ko3.   

Abstract

This paper will present the authors' own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors' solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.

Entities:  

Keywords:  cryptographic sharing algorithms; data security; service management processes

Year:  2020        PMID: 32570956     DOI: 10.3390/s20123458

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  5 in total

1.  Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing.

Authors:  Tong Li; Hai Zhao; Yaodong Tao; Donghua Huang; Chao Yang; Shuheng Xu
Journal:  Comput Intell Neurosci       Date:  2022-05-09

2.  Cluster Analysis Algorithm in the Analysis of College Students' Mental Health Education.

Authors:  Wanting Zheng
Journal:  Appl Bionics Biomech       Date:  2022-04-18       Impact factor: 1.664

3.  The Impact of Tax Reduction and Fee Reduction Based on Big Data Algorithm on the High-Quality Development of the Real Economy under the Action of Coupling Effect or Substitution Effect.

Authors:  Haiyan Zhang
Journal:  Comput Intell Neurosci       Date:  2022-08-10

4.  Assessment of Physical Fitness and Health Status of Athletes Based on Intelligent Medical Treatment under Machine Learning.

Authors:  Yunlong Tong
Journal:  Comput Intell Neurosci       Date:  2022-07-30

5.  Research and Application of the Data Mining Technology in Economic Intelligence System.

Authors:  Qingqing Chang; Jincheng Hu
Journal:  Comput Intell Neurosci       Date:  2022-03-15
  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.