Cognitive Approaches for Medicine in Cloud Computing
This paper will present the application potential of the cognitive approach to data interpretation, with special reference to medical areas. The possibilities of using the meaning approach to data description and analysis will be proposed for data analysis tasks in Cloud Computing. The methods of cognitive data management in Cloud Computing are aimed to support the processes of protecting data against unauthorised takeover and they serve to enhance the data management processes. The accomplishment of the proposed tasks will be the definition of algorithms for the execution of meaning data interpretation processes in safe Cloud Computing.
• We proposed a cognitive methods for data description.
• Proposed a techniques for secure data in Cloud Computing.
• Application of cognitive approaches for medicine was described.
KeywordsMedical cognitive systems Data security Cloud computing
Compliance with Ethical Standards
Conflict of Interest
Authors declares that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
- 1.Menezes, A., van Oorschot, P., and Vanstone, S., Handbook of applied cryptography. Waterloo: CRC Press, 2001.Google Scholar
- 6.L. Ogiela, M.R. Ogiela, “Data mining and semantic inference in cognitive systems”, in: F. Xhafa, L. Barolli, F. Palmieri, et al. (Eds.), 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), University Salerno, Salerno, Italy, 10-12 September 2014, pp. 257-261.Google Scholar
- 7.Ogiela, L., Ogiela, M. R., and Ogiela, U., “Efficiency of strategic data sharing and management protocols”, The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6-8, Fukuoka, Japan, pp. 198-201, 2016.Google Scholar
- 9.M.R. Ogiela, U. Ogiela, “Linguistic approach to cryptographic data sharing”, 2nd International Conference on Future Generation Communication and Networking, vol. 1-2, Hainan, China, 13-15 December 2008, pp. 377-380.Google Scholar
- 10.Ogiela, M. R., and Ogiela, U., “Secure information management in hierarchical structures”, in : T.H. Kim, H. Adeli, R.J. Robles, et al. (Eds.), 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15-17 June 2011, Advanced Computer Science and Information Technology, Book Series: Communications in Computer and Information Science, vol. 195, 2011, pp. 31-35.Google Scholar
- 11.Ogiela, U., and Ogiela, L., Linguistic technigues for cryptographic data sharing algorithms. Journal of Concurrency and Computation: Practice and Experience, in press. https://doi.org/10.1002/cpe.4275.
- 13.Schneier, B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Wiley, 1996.Google Scholar
- 15.Suphannee, S., Iasonas, P., and Angelos, K., “I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs”, 1st IEEE European Symposium on Security and Privacy (Euro S&P), Saarbruecken, GERMANY, 21-24 Martch 2016, pp. 388-403.Google Scholar