Advertisement

Cognitive Approaches for Medicine in Cloud Computing

  • Urszula Ogiela
  • Makoto Takizawa
  • Lidia Ogiela
Image & Signal Processing
Part of the following topical collections:
  1. New Technologies and Bio-inspired Approaches for Medical Data Analysis and Semantic Interpretation

Abstract

This paper will present the application potential of the cognitive approach to data interpretation, with special reference to medical areas. The possibilities of using the meaning approach to data description and analysis will be proposed for data analysis tasks in Cloud Computing. The methods of cognitive data management in Cloud Computing are aimed to support the processes of protecting data against unauthorised takeover and they serve to enhance the data management processes. The accomplishment of the proposed tasks will be the definition of algorithms for the execution of meaning data interpretation processes in safe Cloud Computing.

Highlights

• We proposed a cognitive methods for data description.

• Proposed a techniques for secure data in Cloud Computing.

• Application of cognitive approaches for medicine was described.

Keywords

Medical cognitive systems Data security Cloud computing 

Notes

Funding

This study was funded by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616

Compliance with Ethical Standards

Conflict of Interest

Authors declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Menezes, A., van Oorschot, P., and Vanstone, S., Handbook of applied cryptography. Waterloo: CRC Press, 2001.Google Scholar
  2. 2.
    Mora, M. et al., Design methods for software architectures in the service-oriented computing and cloud paradigms. Software-Practice & Experience 48(2):263–267, 2018.CrossRefGoogle Scholar
  3. 3.
    Ogiela, L., Semantic analysis in cognitive UBIAS & E-UBIAS systems. Computers & Mathematics with Applications 63(2):378–390, 2012.CrossRefGoogle Scholar
  4. 4.
    Ogiela, L., Intelligent techniques for secure financial management in cloud computing. Electronic Commerce Research and Applications 14(6):456–464, 2015.CrossRefGoogle Scholar
  5. 5.
    Ogiela, L., Cryptographic techniques of strategic data splitting and secure information management. Pervasive and Mobile Computing 29:130–141, 2016.CrossRefGoogle Scholar
  6. 6.
    L. Ogiela, M.R. Ogiela, “Data mining and semantic inference in cognitive systems”, in: F. Xhafa, L. Barolli, F. Palmieri, et al. (Eds.), 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), University Salerno, Salerno, Italy, 10-12 September 2014, pp. 257-261.Google Scholar
  7. 7.
    Ogiela, L., Ogiela, M. R., and Ogiela, U., “Efficiency of strategic data sharing and management protocols”, The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6-8, Fukuoka, Japan, pp. 198-201, 2016.Google Scholar
  8. 8.
    Ogiela, L., and Ogiela, M. R., Insider threats and cryptographic techniques in secure information management. IEEE Systems Journal 11(2):405–414, 2017.CrossRefGoogle Scholar
  9. 9.
    M.R. Ogiela, U. Ogiela, “Linguistic approach to cryptographic data sharing”, 2nd International Conference on Future Generation Communication and Networking, vol. 1-2, Hainan, China, 13-15 December 2008, pp. 377-380.Google Scholar
  10. 10.
    Ogiela, M. R., and Ogiela, U., “Secure information management in hierarchical structures”, in : T.H. Kim, H. Adeli, R.J. Robles, et al. (Eds.), 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15-17 June 2011, Advanced Computer Science and Information Technology, Book Series: Communications in Computer and Information Science, vol. 195, 2011, pp. 31-35.Google Scholar
  11. 11.
    Ogiela, U., and Ogiela, L., Linguistic technigues for cryptographic data sharing algorithms. Journal of Concurrency and Computation: Practice and Experience, in press.  https://doi.org/10.1002/cpe.4275.
  12. 12.
    Pengfei, H. et al., A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Generation Computer Systems-The International Journal of Escience 81:582–592, 2018.CrossRefGoogle Scholar
  13. 13.
    Schneier, B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Wiley, 1996.Google Scholar
  14. 14.
    Shen, J., at all., “Anonymous and Traceable Group Data Sharing in Cloud Computing”. IEEE Transactions on Information Forensics and Security 13:912–925, 2018.CrossRefGoogle Scholar
  15. 15.
    Suphannee, S., Iasonas, P., and Angelos, K., “I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs”, 1st IEEE European Symposium on Security and Privacy (Euro S&P), Saarbruecken, GERMANY, 21-24 Martch 2016, pp. 388-403.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Cryptography and Cognitive Informatics Research GroupAGH University of Science and TechnologyKrakowPoland
  2. 2.Department of Advanced SciencesHosei UniversityTokyoJapan

Personalised recommendations