Skip to main content
Log in

Towards cognitive service management and semantic information sharing in the Cloud

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an idea of intelligent service management processes in the Cloud. The main aspects are application of threshold schemes for secure distributed service providing. Authors propose a new idea of secure service management using sharing techniques. Those technigues are dedicated to secure processes as well as secret spllitting and sharing, and seems to be very usefull for securing all data/service and all parts of them. The proposed idea of cognitive service management and data/information sharing in the Cloud, include the use of cognitive data analysis algorithms, cryptographic data splitting and sharing techniques, schemes for hiding information and cognitive management systems. The novelty of proposed solutions lays in considering the characteristic and main profiles of provided cloud services, as well as semantic meaning of distributed information, thanks to the application of cognitive information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Albus JS, Meystel AM (2001) Engineering of mind – an introduction to the science of intelligent systems, A Wiley-Interscience Publication John Wiley & Sons, Inc

  2. Ateniese G, Blundo C, de Santis A, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106

    Article  MathSciNet  MATH  Google Scholar 

  3. Beguin P, Cresti A (1995) General short computational secret sharing schemes. Lect Notes Comput Sci 921:194–208

    Article  MATH  Google Scholar 

  4. Blakley B, Blakley GR, Chan AH, Massey JL (1993) Threshold schemes with disenrollment. In: Brickell EF (ed) advances in cryptology — CRYPTO’ 92. CRYPTO 1992. Lecture Notes in Computer Science, vol 740. Springer, Berlin, Heidelberg, pp 540–548

  5. Branquinho J (ed) (2001) The foundations of cognitive science. Clarendon Press, Oxford

    Google Scholar 

  6. Chomsky N (1988) Language and problems of knowledge: the Managua lectures. MIT Press, Cambridge

    Google Scholar 

  7. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (eds) Advances in cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg, pp 469–472

  8. Huaizahi L, Mukesh S (2007) Trust management in distributed systems. Computer 40(2):45–53

    Article  Google Scholar 

  9. Jatoth C, Gangadharan GR, Fiore U, Buyya R (2017) QoS-aware big service composition using MapReduce based evolutionary algorithm with guided mutation. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.07.042

  10. Mackenzie OJ (ed) (2006) Information science and knowledge management. Springer-Verlag, Berlin

    Google Scholar 

  11. Menezes A, van Oorschot P, Vanstone S (2001) Handbook of applied cryptography. CRC Press, Boca Raton

  12. Meystel AM, Albus JS (2002) Intelligent systems – architecture, design, and control. A Wiley-Interscience Publication John Wiley & Sons, Inc., Canada

    Google Scholar 

  13. Ogiela L (2012) Semantic analysis in cognitive UBIAS & E-UBIAS systems. Comput Math Appl 63(2):378–390

    Article  MathSciNet  Google Scholar 

  14. Ogiela L (2015) Advanced techniques for knowledge management and access to strategic information. Int J Inf Manag 35:154–159

    Article  Google Scholar 

  15. Ogiela L (2015) Intelligent techniques for secure financial management in cloud computing. Electron Commer Res Appl 14(6):456–464

    Article  Google Scholar 

  16. Ogiela L (2016) Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob Comput 29:130–141

    Article  Google Scholar 

  17. Ogiela MR, Ogiela U (2008) Linguistic approach to cryptographic data sharing, 2nd International Conference on Future Generation Communication and Networking, vol. 1–2, Hainan, PEOPLES R CHINA, 13–15 December, pp. 377–380

  18. Ogiela L, Ogiela MR (2014) Data mining and semantic inference in cognitive systems, in: Xhafa F., Barolli L., Palmieri F., et al. (Eds.), 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), University Salerno, Salerno, Italy, 10–12 September, pp. 257–261

  19. Ogiela MR, Ogiela U (2014) Secure information management using linguistic threshold approach. Advanced information and knowledge processing. Springer, London

  20. Ogiela L, Ogiela MR (2016) Bio-inspired cryptographic techniques in information management applications, the IEEE 30th international conference on advanced information networking and applications (IEEE AINA-2016), Crans-Montana, Switzerland, 23–25 March, pp. 1059–1063

  21. Ogiela MR, Ogiela L (2016) Data understanding techniques for management application and cryptography, in: Xhafa F., Barolli L., Snasel V., et al. (Eds.), 8th international conference on intelligent networking and collaborative systems (INCoS), Ostrava, Czech Republic, 07–09 September 2016, Book Series: International Conference on Intelligent Networking and Collaborative Systems, pp. 40–43

  22. Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414

    Article  Google Scholar 

  23. Ogiela U, Ogiela L (in press) Linguistic technigues for cryptographic data sharing algorithms. Journal of Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4275

  24. Ogiela L, Ogiela MR, Ogiela U (2016) Efficiency of strategic data sharing and management protocols, the 10th international conference on innovative mobile and internet services in ubiquitous computing (IMIS-2016), 6–8 July, Fukuoka, Japan, pp. 198–201

  25. Ogiela MR, Ogiela U (2011) Secure information management in hierarchical structures, in : Kim T.H., Adeli H., Robles R.J., et al. (Eds.), 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15-17 June 2011, Advanced Computer Science and Information Technology, Book Series: Communications in Computer and Information Science, vol. 195, pp. 31–35

  26. Ogiela U, Takizawa M, Ogiela L (2018) Security of selected secret sharing schemes, in: Barolli L., Enokido T. (Eds.), Innovative Mobile and Internet Services in Ubiquitous Computing, Advances in Intelligent Systems and Computing 612, Springer International Publishing AG, pp. 395–400

  27. Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York

  28. Shamir A. (1979) How to share a secret, communications of the ACM, s. 612–613

  29. Tipton HF (2007) Information security management handbook. Auerbach, Boca Raton

  30. van Bakel J (1984) Automatic semantic interpretation: a computer model of understanding natural language. Foris Publications, Dordrecht

    Google Scholar 

Download references

Acknowledgments

This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lidia Ogiela.

Additional information

Highlights

•We propose a cognitive approach for supporting data management.

•Proposed idea of semantic-based information sharing in the Cloud.

•Application of security solutions for supporting management processes.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ogiela, L., Ogiela, M.R. Towards cognitive service management and semantic information sharing in the Cloud. Multimed Tools Appl 77, 18625–18635 (2018). https://doi.org/10.1007/s11042-017-5302-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5302-9

Keywords

Navigation