Abstract
In this paper will be presented new ideas of application of security procedures for data and services management in distributed computer infrastructures, and in Cloud Computing. Services management in Cloud Computing will be connected with application of secure cognitive information systems supporting management activities and securing data using blockchain technologies and distributed ledger. Application of distributed ledger enables the development of decentralized management protocols, which allow verification of all performed operations by all authorized parties. Such protocols give the opportunity to create secure and efficient data sharing protocols in structures, where all authorized entities are equal and can independently verify the type of operations, and instances that process such data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Larios-Hernández, G.J.: Blockchain entrepreneurship opportunity in the practices of the unbanked. Bus. Horiz. 60, 865–874 (2017)
Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)
Jallow, A.K., Demian, P., Anumba, Ch.J., Baldwin, A.N.: An enterprise architecture framework for electronic requirements information management. Int. J. Inf. Manag. 37, 455–472 (2017)
Ogiela, L.: Cognitive information systems in management sciences. Elsevier, Academic Press (2017)
Ogiela, L., Ogiela, M.R. Management Information Systems. LNEE, vol. 331, pp. 449–456 (2015)
Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T.-h., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13577-4_15
Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.-h., Adeli, H., Robles, R.J., Balitanas, M. (eds.) AST 2011. CCIS, vol. 195, pp. 31–35. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24267-0_5
Kshetri, N.: Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10), 1027–1038 (2017)
Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)
Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Italy, pp. 257–261 (2014)
Ogiela, L.: Towards cognitive economy. Soft. Comput. 18, 1675–1683 (2014)
Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016 - The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, pp. 1055–1058 (2016). https://doi.org/10.1109/aina.2016.159
Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 - The 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, pp. 1050–1054 (2017). https://doi.org/10.1109/aina.2017.164
Hahn, Ch., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Express 2, 135–139 (2016)
Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Futur. Gener. Comput. Syst. 88, 173–190 (2018)
Alsuhibany, S.: Evaluating the usability of optimizing text-based CAPTCHA generation. Int. J. Adv. Comput. Sci. Appl. 7(8), 164–169 (2016)
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J., Jurafsky, D.: How good are humans at solving CAPTCHAs? A large scale evaluation. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 399–413 (2010)
Krzyworzeka, N., Ogiela, L.: Visual CAPTCHA for data understanding and cognitive management. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) BWCCA 2017. LNDECT, vol. 12, pp. 249–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-69811-3_22
Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008: Fourth International Conference on Natural Computation, vol. 6, Proceedings, Jian, Peoples R China, 18–20 October, pp. 245–247 (2008)
Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)
Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., Perez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640–2653 (2017)
Carniani, E., Costantino, G., Marino, F., Martinelli, F., Mori, P.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(4), 20–40 (2016)
Kim, J.S., Pan, S.B.: A study on EMG-based biometrics. J. Internet Serv. Inf. Secur. (JISIS) 7(2), 19–31 (2017)
Acknowledgements
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ogiela, M.R., Ogiela, L. (2019). Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies. In: You, I., Chen, HC., Sharma, V., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2017. Communications in Computer and Information Science, vol 971. Springer, Singapore. https://doi.org/10.1007/978-981-13-3732-1_8
Download citation
DOI: https://doi.org/10.1007/978-981-13-3732-1_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3731-4
Online ISBN: 978-981-13-3732-1
eBook Packages: Computer ScienceComputer Science (R0)