Abstract
This paper will describe new classes of secure secret sharing procedures applied for information and services management. In particular will be presented two classes of procedures which allow to share data and services, using personal biometric characteristics and mathematical linguistic approaches. Examples of application of such technologies will also be presented connected with distributed services in Cloud Computing infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electr. Commer. Res. Appl. 14(6), 456–464 (2015)
Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)
Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, London (2014)
Beimel, A., Farras, O., Mintz, Y.: Secret-sharing schemes for very dense graphs. J. Cryptol. 29(2), 336–362 (2016)
van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Waterloo (2001)
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612–613 (1979)
Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)
Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011, Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley (1996)
Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)
Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130–141 (2016)
Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016. International Conference on Advanced Information Networking and Applications, pp. 1059–1063 (2016)
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
This work was supported by JSPS KAKENHI grant number 15H0295.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, U., Takizawa, M., Ogiela, L. (2019). Linguistic and Biometric Approaches for Data and Services Management in Cloud Computing. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-02613-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02612-7
Online ISBN: 978-3-030-02613-4
eBook Packages: EngineeringEngineering (R0)